Pattern mining approaches used in sensor-based biometric recognition: a review
Sensing technologies place significant interest in the use of biometrics for the recognition
and assessment of individuals. Pattern mining techniques have established a critical step in …
and assessment of individuals. Pattern mining techniques have established a critical step in …
Multimodal biometric authentication with secured templates—A review
SK Choudhary, AK Naik - 2019 3rd international conference on …, 2019 - ieeexplore.ieee.org
The advent of internet is highly triggering people towards the digital era. The inexpensive
data availability to common people also aids for the abundant data communication. In the …
data availability to common people also aids for the abundant data communication. In the …
A robust digital video watermarking based on CT-SVD domain and chaotic DNA sequences for copyright protection
With the growing use of the digital world and its associated challenges, the use of digital
watermarking is a popular and appropriate way of protecting digital content against illegal …
watermarking is a popular and appropriate way of protecting digital content against illegal …
A blind and robust color images watermarking method based on block transform and secured by modified 3-dimensional Hénon map
This paper proposes a blind and robust color image watermarking method based on a new
three-dimensional Hénon chaotic map and uses integer wavelet transform, discrete wavelet …
three-dimensional Hénon chaotic map and uses integer wavelet transform, discrete wavelet …
A dual watermarking scheme for identity protection
A novel dual watermarking scheme with potential applications in identity protection, media
integrity maintenance and copyright protection in both electronic and printed media is …
integrity maintenance and copyright protection in both electronic and printed media is …
[HTML][HTML] A new approach for palmprint image encryption based on hybrid chaotic maps
Biometric data has gain great interests as being precise authenticators. Saving and
transmitting biometric data in the form of images over public networks needs a fast, lossless …
transmitting biometric data in the form of images over public networks needs a fast, lossless …
Constructing fingerprint sweat pore database based on donor–acceptor luminescent materials for personal identification
X Zhao, Z Liu, Y Duan, Z Xu, X Feng, Z Li… - Chemical Engineering …, 2024 - Elsevier
Human sweat pores, as the level-3 fingerprint information, are important biometric traits used
for authentication. The imaging of sweat pores is of great interest for multiple applications …
for authentication. The imaging of sweat pores is of great interest for multiple applications …
[PDF][PDF] Hybrid Watermarking and Encryption Techniques for Securing Medical Images.
Securing medical data while transmission on the network is required because it is sensitive
and life-dependent data. Many methods are used for protection, such as Steganography …
and life-dependent data. Many methods are used for protection, such as Steganography …
Data protection in palmprint recognition via dynamic random invisible watermark embedding
Palmprint recognition is one of the most popular biometric technologies. Recent researches
mainly focus on the recognition performance, while pay less attention to the data protection …
mainly focus on the recognition performance, while pay less attention to the data protection …
Robust and reliable image copyright protection scheme using downsampling and block transform in integer wavelet domain
L Zhang, D Wei - Digital Signal Processing, 2020 - Elsevier
In this paper, a robust watermarking algorithm in integer wavelet domain using
downsampling is proposed. The innovations of this paper can be summarized as follows …
downsampling is proposed. The innovations of this paper can be summarized as follows …