-
1
Analysis of the synthetic periocular iris images for robust Presentation Attacks Detection algorithms
Published 2022-07-01Get full text
Article -
2
Face Spoof Attack Recognition Using Discriminative Image Patches
Published 2016-01-01“…Experimental analysis on two publicly available databases (Idiap REPLAY-ATTACK and CASIA-FASD) shows promising results compared to existing works.…”
Get full text
Article -
3
Presentation Attack Detection using iris periocular visual spectrum images
Published 2024-12-01“…The analysis was carried out by evaluating the performance of five Convolutional Neural Networks (CNN) using both facial and periocular iris images for PAD with two different attack instruments. …”
Get full text
Article -
4
Verification of color characteristics of document images captured in uncontrolled conditions
Published 2024-08-01Get full text
Article -
5
Improved Method of Detection Falsification Results the Digital Image in Conditions of Attacks
Published 2016-08-01Get full text
Article -
6
-
7
Resilient Multimedia Embedding in DICOM Images: A Robustness Evaluation Under Multiple Attacks
Published 2025-01-01“…To assess the robustness of the embedded data, a series of attacks are applied to the DICOM images, including zero attack, salt and pepper attack, Gaussian attack, and speckle noise attack. …”
Get full text
Article -
8
Research on adversarial attacks and defense performance of image classification models for automated driving systems
Published 2025-01-01“…However, output and judgment errors generated by these models due to the presence of adversarial examples, impose a great impact on the security and safety associated with their applications in automated driving systems. A sensitivity analysis-based noise superposition attack strategy was employed to perform white-box adversarial attacks against ResNet, a typical image classification model. …”
Get full text
Article -
9
Rapid analysis of shipworm attack - a novel digital tool for assessing shipworm damage (RANDA)
Published 2025-09-01Get full text
Article -
10
Encrypted image retrieval in multi-key settings based on edge computing
Published 2020-04-01“…Aiming at the fact that the existing encrypted image retrieval schemes do not consider different keys to encrypt images,a multi-key encrypted image retrieval system based on edge computing (including basic scheme and enhanced scheme) based on local sensitive hashing,secure nearest neighbor and proxy re-encryption technologies was proposed.The retrieval efficiency and accuracy were improved and the extra computational cost of query users was reduced.Security analysis shows that the basic scheme can only resist the known ciphertext attack,while the enhanced scheme can resist the known background attack.The experimental performance test based on the real-world dataset shows that the proposed schemes are feasible in practical application scenarios.…”
Get full text
Article -
11
Encrypted image retrieval in multi-key settings based on edge computing
Published 2020-04-01“…Aiming at the fact that the existing encrypted image retrieval schemes do not consider different keys to encrypt images,a multi-key encrypted image retrieval system based on edge computing (including basic scheme and enhanced scheme) based on local sensitive hashing,secure nearest neighbor and proxy re-encryption technologies was proposed.The retrieval efficiency and accuracy were improved and the extra computational cost of query users was reduced.Security analysis shows that the basic scheme can only resist the known ciphertext attack,while the enhanced scheme can resist the known background attack.The experimental performance test based on the real-world dataset shows that the proposed schemes are feasible in practical application scenarios.…”
Get full text
Article -
12
Improving Location-Based Thermal Emission Side-Channel Analysis Using Iterative Transfer Learning
Published 2025-01-01Get full text
Article -
13
Comprehensive Review and Analysis of Image Encryption Techniques
Published 2025-01-01“…The rapid growth of digital media has increased the need to protect image data from unauthorized access, particularly in fields such as medical imaging, military communication, and online content distribution. …”
Get full text
Article -
14
Integrity verified lightweight ciphering for secure medical image sharing between embedded SoCs
Published 2025-03-01“…The encrypted DICOM images achieve an average entropy value of 7.99752, a PSNR of 5.872 dB, NPCR of 99.66128%, and a UACI of 33.55964%, while the noise attack analysis further demonstrates its robustness. …”
Get full text
Article -
15
A big data analysis algorithm for massive sensor medical images
Published 2024-11-01“…The smart sensor-based big data analysis recommendation system has significant privacy and security concerns when using sensor medical images for suggestions and monitoring. …”
Get full text
Article -
16
A dual-image encryption scheme for sensitive region of traffic image using public key cryptosystem and novel chaotic map
Published 2025-06-01“…Abstract Intelligent transport systems (ITS) extensively employ traffic images for traffic flow analysis, accident detection and other tasks. …”
Get full text
Article -
17
Implementation of MS Circle Map in Digital Image Encryption
Published 2025-06-01“…The proposed method features a large key space, high key sensitivity, and strong resistance to brute force, statistical, and differential attacks. Performance evaluation through key space analysis, initial value sensitivity, entropy, correlation coefficient, NPCR, and UACI shows that the encrypted image using MS Circle Map has strong security properties. …”
Get full text
Article -
18
Siamese Denoising Autoencoders for Enhancing Adversarial Robustness in Medical Image Analysis
Published 2025-01-01Get full text
Article -
19
An Efficient Privacy-preserving Deep Learning Scheme for Medical Image Analysis
Published 2020-12-01“…In recent privacy has emerged as one of the major concerns of deep learning, since it requires huge amount of personal data. Medical Image Analysis is one of the prominent areas where sensitive data are shared to a third party service provider. …”
Get full text
Article -
20
A Reliable Image Watermarking Scheme Based on Redistributed Image Normalization and SVD
Published 2016-01-01“…To investigate the robustness of the scheme several attacks are applied to seriously distort the watermarked image. …”
Get full text
Article