Cancellable face recognition based on fractional-order Lorenz chaotic system and Haar wavelet fusion
Cancellable biometrics is the art of generating distorted or encrypted templates of original
biometric templates. The evolution of cancellable biometrics is attributed to the advanced …
biometric templates. The evolution of cancellable biometrics is attributed to the advanced …
Efficient and secure cancelable biometric authentication framework based on genetic encryption algorithm
W El-Shafai, FAHE Mohamed… - IEEE …, 2021 - ieeexplore.ieee.org
Various cancelable biometric techniques have been proposed to maintain user data
security. In this work, a cancelable biometric framework is introduced to satisfy user data …
security. In this work, a cancelable biometric framework is introduced to satisfy user data …
Traditional and deep-learning-based denoising methods for medical images
Visual information is extremely important in today's world. Visual information transmitted in
the form of digital images has become a critical mode of communication. As a result, digital …
the form of digital images has become a critical mode of communication. As a result, digital …
Fingerprint image encryption using phase retrieval algorithm in gyrator wavelet transform domain using QR decomposition
In this paper, we propose a novel optical asymmetric fingerprint image encryption technique
that uses QR decomposition in gyrator wavelet transform domain. A fingerprint image is …
that uses QR decomposition in gyrator wavelet transform domain. A fingerprint image is …
Cancelable biometric security system based on advanced chaotic maps
HAA El-Hameed, N Ramadan, W El-Shafai… - The Visual …, 2021 - Springer
In recent years, the protection of human biometrics has witnessed an exponential growth.
Fingerprint recognition has been utilized for cell phone authentication, biometric passports …
Fingerprint recognition has been utilized for cell phone authentication, biometric passports …
[PDF][PDF] Proposed biometric security system based on deep learning and chaos algorithms
Nowadays, there is tremendous growth in biometric authentication and cybersecurity
applications. Thus, the efficient way of storing and securing personal biometric patterns is …
applications. Thus, the efficient way of storing and securing personal biometric patterns is …
Blockchain for Credibility in Educational Development: Key Technology, Application Potential, and Performance Evaluation
Y Wang, X Cong, L Zi, Q **ang - Security and Communication …, 2023 - Wiley Online Library
Blockchain proposes many innovative technologies to establish credible mechanisms in an
open environment and therefore, it becomes a promising solution to the problem of …
open environment and therefore, it becomes a promising solution to the problem of …
[PDF][PDF] A fractional fourier based medical image authentication approach
Patient medical information in all forms is crucial to keep private and secure, particularly
when medical data communication occurs through insecure channels. Therefore, there is a …
when medical data communication occurs through insecure channels. Therefore, there is a …
[PDF][PDF] An efficient medical image deep fusion model based on convolutional neural networks
Medical image fusion is considered the best method for obtaining one image with rich
details for efficient medical diagnosis and therapy. Deep learning provides a high …
details for efficient medical diagnosis and therapy. Deep learning provides a high …
[PDF][PDF] Efficient hardware design of a secure cancellable biometric cryptosystem
Biometric security is a growing trend, as it supports the authentication of persons using
confidential biometric data. Most of the transmitted data in multimedia systems are …
confidential biometric data. Most of the transmitted data in multimedia systems are …