An overview of steganography techniques applied to the protection of biometric data

M Douglas, K Bailey, M Leeney, K Curran - Multimedia Tools and …, 2018 - Springer
Identification of persons by way of biometric features is an emerging phenomenon. Over the
years, biometric recognition has received much attention due to its need for security …

A hybrid encryption/hiding method for secure transmission of biometric data in multimodal authentication system

EB Tarif, S Wibowo, S Wasimi, A Tareef - Multimedia Tools and …, 2018 - Springer
Biometric security is a fast growing area that gains an increasing interest in the last decades.
Digital encryption and hiding techniques provide an efficient solution to protect biometric …

[HTML][HTML] A novel encryption scheme for securing biometric templates based on 2D discrete wavelet transform and 3D Lorenz-chaotic system

D Kumar, AB Joshi, S Singh - Results in Optics, 2021 - Elsevier
This research paper proposes a novel encryption and decryption scheme for biometric
templates using two dimensional discrete wavelet transform (2D-DWT) and three …

Biometric watermarking schemes based on QR decomposition and Schur decomposition in the RIDWT domain

SY Altay, G Ulutas - Signal, Image and Video Processing, 2024 - Springer
This paper introduces two robust and optimized watermarking techniques designed to
protect the copyright of color digital images. These techniques involve embedding a …

[HTML][HTML] Artificial Neural Networks and Gene Expression Programing based age estimation using facial features

BZ Laskar, S Majumder - journal of king saud university-computer and …, 2015 - Elsevier
This work is about estimating human age automatically through analysis of facial images. It
has got a lot of real-world applications. Due to prompt advances in the fields of machine …

[HTML][HTML] QSAR study for carcinogenic potency of aromatic amines based on GEP and MLPs

F Song, A Zhang, H Liang, L Cui, W Li, H Si… - International Journal of …, 2016 - mdpi.com
A new analysis strategy was used to classify the carcinogenicity of aromatic amines. The
physical-chemical parameters are closely related to the carcinogenicity of compounds …

A grid based iris biometric watermarking using wavelet transform

C Duraipandi, A Pratap… - … Conference on Recent …, 2014 - ieeexplore.ieee.org
Watermarking is the most smart and appropriate technique for copyright protection and
security of multimedia data. Watermarking has been recommended for the civilizing security …

Machine learning methods used in evaluations of secure biometric system components

B Arslan, M Ulker, S Sagiroglu - 2017 16th IEEE International …, 2017 - ieeexplore.ieee.org
This paper provides a comprehensive overview of theories, methodologies, techniques,
standards and frameworks of biometric systems. The studies conducted between 2007-2017 …

Identification of under-detected periodicity in time-series microarray data by using empirical mode decomposition

CR Chen, WY Shu, CW Chang, IC Hsu - PloS one, 2014 - journals.plos.org
Detecting periodicity signals from time-series microarray data is commonly used to facilitate
the understanding of the critical roles and underlying mechanisms of regulatory …