首页
OALib 期刊
快速投稿通道
我的图书馆
常见问题
关于我们
关注我们+
Biomedical & Life Sciences
Business & Economics
Chemistry & Materials Science
Computer Science & Communications
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sciences & Humanities
Biomedical & Life Sciences
Business & Economics
Chemistry & Materials Science
Computer Science & Communications
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sciences & Humanities
LinkedIn (OALib Group)
LinkedIn (OALib Company Page)
Facebook
Twitter
全部
标题
作者
关键词
摘要
OALib Journal期刊
ISSN: 2333-9721
费用:99美元
投递稿件
为什么选择我们?
>>
- 开源期刊
- 同行审议
- 快速出刊
- 终身存储
- 免费检索
- 免费推广
- 更多...
- 搜索引擎
EURASIP Journal on Information Security
ISSN Print: 1687-4161
ISSN Online:
主页:
http://jis.eurasipjournals.com/
分享:
Go
Intrusion detection model based on selective packet sampling
Bakhoum Ezzat
Research of Spatial Domain Image Digital Watermarking Payload
Jia-Fa Mao
,
Ru Zhang
,
Xin-Xin Niu
,
Yi-Xian Yang
Hierarchical Spread Spectrum Fingerprinting Scheme Based on the CDMA Technique
Kuribayashi Minoru
Binary Biometric Representation through Pairwise Adaptive Phase Quantization
Chen Chun
,
Veldhuis Raymond
Video-Object Oriented Biometrics Hiding for User Authentication under Error-Prone Transmissions
Klimis Ntalianis
,
Nicolas Tsapatsoulis
,
Athanasios Drigas
A survey on biometric cryptosystems and cancelable biometrics
Rathgeb Christian
,
Uhl Andreas
Video-Object Oriented Biometrics Hiding for User Authentication under Error-Prone Transmissions
Ntalianis Klimis
,
Tsapatsoulis Nicolas
,
Drigas Athanasios
Research of Spatial Domain Image Digital Watermarking Payload
Mao Jia-Fa
,
Zhang Ru
,
Niu Xin-Xin
,
Yang Yi-Xian
Binary Biometric Representation through Pairwise Adaptive Phase Quantization
Chun Chen
,
Raymond Veldhuis
Hierarchical Spread Spectrum Fingerprinting Scheme Based on the CDMA Technique
Minoru Kuribayashi
2DPCA fractal features and genetic algorithm for efficient face representation and recognition
Ben Jemaa Yousra
,
Derbel Ahmed
,
Ben Jmaa Ahmed
On the Implementation of Spread Spectrum Fingerprinting in Asymmetric Cryptographic Protocol
Minoru Kuribayashi
Logistic Map-Based Fragile Watermarking for Pixel Level Tamper Detection and Resistance
Shan Suthaharan
A Simple Scheme for Constructing Fault-Tolerant Passwords from Biometric Data
Vladimir B. Balakirsky
,
A. J. Han Vinck
Reversible Watermarking Techniques: An Overview and a Classification
Roberto Caldelli
,
Francesco Filippini
,
Rudy Becarelli
GUC100 Multisensor Fingerprint Database for In-House (Semipublic) Performance Test
Davrondzhon Gafurov
,
Patrick Bours
,
Bian Yang
,
Christoph Busch
Secure Arithmetic Coding with Error Detection Capability
Mahnaz Sinaie
,
Vahid Tabataba Vakili
Logistic Map-Based Fragile Watermarking for Pixel Level Tamper Detection and Resistance
Suthaharan Shan
Reversible Watermarking Techniques: An Overview and a Classification
Caldelli Roberto
,
Filippini Francesco
,
Becarelli Rudy
GUC100 Multisensor Fingerprint Database for In-House (Semipublic) Performance Test
Gafurov Davrondzhon
,
Bours Patrick
,
Yang Bian
,
Busch Christoph
Secure Arithmetic Coding with Error Detection Capability
Sinaie Mahnaz
,
Vakili VahidTabataba
On the Implementation of Spread Spectrum Fingerprinting in Asymmetric Cryptographic Protocol
Kuribayashi Minoru
A Simple Scheme for Constructing Fault-Tolerant Passwords from Biometric Data
Balakirsky VladimirB
,
Vinck AJHan
Compression Independent Reversible Encryption for Privacy in Video Surveillance
Paula Carrillo
,
Hari Kalva
,
Spyros Magliveras
Enhancing Privacy Protection in Multimedia Systems
Sen-ching Samson Cheung
,
Deepa Kundur
,
Andrew Senior
How Reed-Solomon Codes Can Improve Steganographic Schemes
Fontaine Caroline
,
Galand Fabien
An Extended Image Hashing Concept: Content-Based Fingerprinting Using FJLT
Xudong Lv
,
Z. Jane Wang
Reliable Steganalysis Using a Minimum Set of Samples and Features
Yoan Miche
,
Patrick Bas
,
Amaury Lendasse
,
Christian Jutten
One-Time Key Based Phase Scrambling for Phase-Only Correlation between Visually Protected Images
Izumi Ito
,
Hitoshi Kiya
Anonymous Biometric Access Control
Shuiming Ye
,
Ying Luo
,
Jian Zhao
,
Sen-Ching S. Cheung
Video Data Hiding for Managing Privacy Information in Surveillance Systems
Jithendra K. Paruchuri
,
Sen-ching S. Cheung
,
Michael W. Hail
Video Data Hiding for Managing Privacy Information in Surveillance Systems
Paruchuri JithendraK
,
Cheung Sen-chingS
,
Hail MichaelW
Improving the Security of CardSpace
Alrodhan WaleedA
,
Mitchell ChrisJ
Secure Steganography in Multimedia Content
Goljan Miroslav
,
Westfeld Andreas
High-Rate Data-Hiding Robust to Linear Filtering for Colored Hosts
Michele Scagliola
,
Fernando Pérez-González
,
Pietro Guccione
Recoverable Privacy Protection for Video Content Distribution
Guangzhen Li
,
Yoshimichi Ito
,
Xiaoyi Yu
,
Naoko Nitta
Encrypted Domain DCT Based on Homomorphic Cryptosystems
Tiziano Bianchi
,
Alessandro Piva
,
Mauro Barni
Overview on Selective Encryption of Image and Video: Challenges and Perspectives
A. Massoudi
,
F. Lefebvre
,
C. De Vleeschouwer
,
B. Macq
Recoverable Privacy Protection for Video Content Distribution
Li Guangzhen
,
Ito Yoshimichi
,
Yu Xiaoyi
,
Nitta Naoko
Steganography in 3D Geometries and Images by Adjacent Bin Mapping
Wu Hao-Tian
,
Dugelay Jean-Luc
An Extended Image Hashing Concept: Content-Based Fingerprinting Using FJLT
Lv Xudong
,
Wang ZJane
Anonymous Biometric Access Control
Ye Shuiming
,
Luo Ying
,
Zhao Jian
,
Cheung Sen-ChingS
One-Time Key Based Phase Scrambling for Phase-Only Correlation between Visually Protected Images
Ito Izumi
,
Kiya Hitoshi
Improving the Security of CardSpace
Waleed A. Alrodhan
,
Chris J. Mitchell
Peak-Shaped-Based Steganographic Technique for JPEG Images
Lorenzo Rossi
,
Fabio Garzia
,
Roberto Cusani
How Reed-Solomon Codes Can Improve Steganographic Schemes
Caroline Fontaine
,
Fabien Galand
Peak-Shaped-Based Steganographic Technique for JPEG Images
Rossi Lorenzo
,
Garzia Fabio
,
Cusani Roberto
High-Rate Data-Hiding Robust to Linear Filtering for Colored Hosts
Scagliola Michele
,
Pérez-González Fernando
,
Guccione Pietro
Experimental Assessment of the Reliability for Watermarking and Fingerprinting Schemes
Frédéric Cérou
,
Teddy Furon
,
Arnaud Guyader
Secure Steganography in Multimedia Content
Miroslav Goljan
,
Andreas Westfeld
Go