|
|
|
Fang Ren, Xuan Shi, Enya Tang and Mengmeng Zeng
To protect the security of medical images and to improve the embedding ability of data in encrypted medical images, this paper proposes a permutation ordered binary (POB) number system-based hiding and authentication scheme for medical images, which incl...
ver más
|
|
|
|
|
|
|
Mahbuba Begum, Sumaita Binte Shorif, Mohammad Shorif Uddin, Jannatul Ferdush, Tony Jan, Alistair Barros and Md Whaiduzzaman
Digital multimedia elements such as text, image, audio, and video can be easily manipulated because of the rapid rise of multimedia technology, making data protection a prime concern. Hence, copyright protection, content authentication, and integrity ver...
ver más
|
|
|
|
|
|
|
Todd Dobbs, Abdullah-Al-Raihan Nayeem, Isaac Cho and Zbigniew Ras
Art authentication is the process of identifying the artist who created a piece of artwork and is manifested through events of provenance, such as art gallery exhibitions and financial transactions. Art authentication has visual influence via the uniquen...
ver más
|
|
|
|
|
|
|
Anfal Ahmed Aleidan, Qaisar Abbas, Yassine Daadaa, Imran Qureshi, Ganeshkumar Perumal, Mostafa E. A. Ibrahim and Alaa E. S. Ahmed
User authentication has become necessary in different life domains. Traditional authentication methods like personal information numbers (PINs), password ID cards, and tokens are vulnerable to attacks. For secure authentication, methods like biometrics h...
ver más
|
|
|
|
|
|
|
Yanmin Lei, Dong Pan, Zhibin Feng and Junru Qian
With the development of deep learning technology, more and more researchers are interested in ear recognition. Human ear recognition is a biometric identification technology based on human ear feature information and it is often used for authentication a...
ver más
|
|
|
|
|
|
|
Kaimeng Ding, Shiping Chen, Jiming Yu, Yanan Liu and Jie Zhu
Aiming at the deficiency that blockchain technology is too sensitive to the binary-level changes of high resolution remote sensing (HRRS) images, we propose a new subject-sensitive hashing algorithm specially for HRRS image blockchains. To implement this...
ver más
|
|
|
|
|
|
|
Aliya Rexit, Mahpirat Muhammat, Xuebin Xu, Wenxiong Kang, Alimjan Aysa and Kurban Ubul
Handwritten signatures have traditionally been used as a common form of recognition and authentication in tasks such as financial transactions and document authentication. However, there are few studies on minority languages such as Uyghur and Kazakh use...
ver más
|
|
|
|
|
|
|
Rogelio Reyes-Reyes, Clara Cruz-Ramos, Volodymyr Ponomaryov, Beatriz P. Garcia-Salgado and Javier Molina-Garcia
In this paper, a fragile watermarking scheme for color image authentication and self-recovery with high tampering rates is proposed. The original image is sub-sampled and divided into non-overlapping blocks, where a watermark used for recovery purposes i...
ver más
|
|
|
|
|
|
|
Nasima Begum, Md Azim Hossain Akash, Sayma Rahman, Jungpil Shin, Md Rashedul Islam and Md Ezharul Islam
Handwriting analysis is playing an important role in user authentication or online writer identification for more than a decade. It has a significant role in different applications such as e-security, signature biometrics, e-health, gesture analysis, dia...
ver más
|
|
|
|
|
|
|
Tony Gwyn, Kaushik Roy and Mustafa Atay
In the realm of computer security, the username/password standard is becoming increasingly antiquated. Usage of the same username and password across various accounts can leave a user open to potential vulnerabilities. Authentication methods of the futur...
ver más
|
|
|
|