-
1
Analysis of the synthetic periocular iris images for robust Presentation Attacks Detection algorithms
Published 2022-07-01Get full text
Article -
2
Face Spoof Attack Recognition Using Discriminative Image Patches
Published 2016-01-01“…Experimental analysis on two publicly available databases (Idiap REPLAY-ATTACK and CASIA-FASD) shows promising results compared to existing works.…”
Get full text
Article -
3
Improved Method of Detection Falsification Results the Digital Image in Conditions of Attacks
Published 2016-08-01Get full text
Article -
4
Presentation Attack Detection using iris periocular visual spectrum images
Published 2024-12-01“…The analysis was carried out by evaluating the performance of five Convolutional Neural Networks (CNN) using both facial and periocular iris images for PAD with two different attack instruments. …”
Get full text
Article -
5
Resilient Multimedia Embedding in DICOM Images: A Robustness Evaluation Under Multiple Attacks
Published 2025-01-01“…To assess the robustness of the embedded data, a series of attacks are applied to the DICOM images, including zero attack, salt and pepper attack, Gaussian attack, and speckle noise attack. …”
Get full text
Article -
6
Rapid analysis of shipworm attack - a novel digital tool for assessing shipworm damage (RANDA)
Published 2025-09-01Get full text
Article -
7
Verification of color characteristics of document images captured in uncontrolled conditions
Published 2024-08-01Get full text
Article -
8
Research on adversarial attacks and defense performance of image classification models for automated driving systems
Published 2025-01-01“…However, output and judgment errors generated by these models due to the presence of adversarial examples, impose a great impact on the security and safety associated with their applications in automated driving systems. A sensitivity analysis-based noise superposition attack strategy was employed to perform white-box adversarial attacks against ResNet, a typical image classification model. …”
Get full text
Article -
9
Improving Location-Based Thermal Emission Side-Channel Analysis Using Iterative Transfer Learning
Published 2025-01-01Get full text
Article -
10
-
11
Investigating imperceptibility of adversarial attacks on tabular data: An empirical analysis
Published 2025-03-01“…While these attacks have been extensively studied in unstructured data like images, applying them to structured data, such as tabular data, presents new challenges. …”
Get full text
Article -
12
Encrypted image retrieval in multi-key settings based on edge computing
Published 2020-04-01“…Aiming at the fact that the existing encrypted image retrieval schemes do not consider different keys to encrypt images,a multi-key encrypted image retrieval system based on edge computing (including basic scheme and enhanced scheme) based on local sensitive hashing,secure nearest neighbor and proxy re-encryption technologies was proposed.The retrieval efficiency and accuracy were improved and the extra computational cost of query users was reduced.Security analysis shows that the basic scheme can only resist the known ciphertext attack,while the enhanced scheme can resist the known background attack.The experimental performance test based on the real-world dataset shows that the proposed schemes are feasible in practical application scenarios.…”
Get full text
Article -
13
Encrypted image retrieval in multi-key settings based on edge computing
Published 2020-04-01“…Aiming at the fact that the existing encrypted image retrieval schemes do not consider different keys to encrypt images,a multi-key encrypted image retrieval system based on edge computing (including basic scheme and enhanced scheme) based on local sensitive hashing,secure nearest neighbor and proxy re-encryption technologies was proposed.The retrieval efficiency and accuracy were improved and the extra computational cost of query users was reduced.Security analysis shows that the basic scheme can only resist the known ciphertext attack,while the enhanced scheme can resist the known background attack.The experimental performance test based on the real-world dataset shows that the proposed schemes are feasible in practical application scenarios.…”
Get full text
Article -
14
Integrity verified lightweight ciphering for secure medical image sharing between embedded SoCs
Published 2025-03-01“…The encrypted DICOM images achieve an average entropy value of 7.99752, a PSNR of 5.872 dB, NPCR of 99.66128%, and a UACI of 33.55964%, while the noise attack analysis further demonstrates its robustness. …”
Get full text
Article -
15
Impaired glymphatic function contributes to high-frequency attacks in patients with episodic migraine
Published 2025-06-01Get full text
Article -
16
Efficient Method for Robust Backdoor Detection and Removal in Feature Space Using Clean Data
Published 2025-01-01“…These attacks pose a significant security threat in critical applications, such as street sign or pedestrian recognition for autonomous vehicles, biometric authentication, image retrieval, semantic labeling, etc. …”
Get full text
Article -
17
Comprehensive Review and Analysis of Image Encryption Techniques
Published 2025-01-01“…The rapid growth of digital media has increased the need to protect image data from unauthorized access, particularly in fields such as medical imaging, military communication, and online content distribution. …”
Get full text
Article -
18
-
19
-
20
A review of machine learning applications in heart health
Published 2025-08-01Get full text
Article