Search alternatives:
image » images (Expand Search)
Showing 1 - 20 results of 261 for search 'attack image analysis', query time: 0.12s Refine Results
  1. 1
  2. 2

    Face Spoof Attack Recognition Using Discriminative Image Patches by Zahid Akhtar, Gian Luca Foresti

    Published 2016-01-01
    “…Experimental analysis on two publicly available databases (Idiap REPLAY-ATTACK and CASIA-FASD) shows promising results compared to existing works.…”
    Get full text
    Article
  3. 3
  4. 4

    Presentation Attack Detection using iris periocular visual spectrum images by Andrés Valenzuela, Juan E. Tapia, Violeta Chang, Christoph Busch

    Published 2024-12-01
    “…The analysis was carried out by evaluating the performance of five Convolutional Neural Networks (CNN) using both facial and periocular iris images for PAD with two different attack instruments. …”
    Get full text
    Article
  5. 5

    Resilient Multimedia Embedding in DICOM Images: A Robustness Evaluation Under Multiple Attacks by Ramyashree, P. S. Venugopala, S. Raghavendra, Vijay S. Kubihal, B. Ashwini

    Published 2025-01-01
    “…To assess the robustness of the embedded data, a series of attacks are applied to the DICOM images, including zero attack, salt and pepper attack, Gaussian attack, and speckle noise attack. …”
    Get full text
    Article
  6. 6
  7. 7
  8. 8

    Research on adversarial attacks and defense performance of image classification models for automated driving systems by TANG Jun, HUANG Wenjing, LI Shuang, WU Zili

    Published 2025-01-01
    “…However, output and judgment errors generated by these models due to the presence of adversarial examples, impose a great impact on the security and safety associated with their applications in automated driving systems. A sensitivity analysis-based noise superposition attack strategy was employed to perform white-box adversarial attacks against ResNet, a typical image classification model. …”
    Get full text
    Article
  9. 9
  10. 10
  11. 11

    Investigating imperceptibility of adversarial attacks on tabular data: An empirical analysis by Zhipeng He, Chun Ouyang, Laith Alzubaidi, Alistair Barros, Catarina Moreira

    Published 2025-03-01
    “…While these attacks have been extensively studied in unstructured data like images, applying them to structured data, such as tabular data, presents new challenges. …”
    Get full text
    Article
  12. 12

    Encrypted image retrieval in multi-key settings based on edge computing by Yingying LI, Jianfeng MA, Yinbin MIAO

    Published 2020-04-01
    “…Aiming at the fact that the existing encrypted image retrieval schemes do not consider different keys to encrypt images,a multi-key encrypted image retrieval system based on edge computing (including basic scheme and enhanced scheme) based on local sensitive hashing,secure nearest neighbor and proxy re-encryption technologies was proposed.The retrieval efficiency and accuracy were improved and the extra computational cost of query users was reduced.Security analysis shows that the basic scheme can only resist the known ciphertext attack,while the enhanced scheme can resist the known background attack.The experimental performance test based on the real-world dataset shows that the proposed schemes are feasible in practical application scenarios.…”
    Get full text
    Article
  13. 13

    Encrypted image retrieval in multi-key settings based on edge computing by Yingying LI, Jianfeng MA, Yinbin MIAO

    Published 2020-04-01
    “…Aiming at the fact that the existing encrypted image retrieval schemes do not consider different keys to encrypt images,a multi-key encrypted image retrieval system based on edge computing (including basic scheme and enhanced scheme) based on local sensitive hashing,secure nearest neighbor and proxy re-encryption technologies was proposed.The retrieval efficiency and accuracy were improved and the extra computational cost of query users was reduced.Security analysis shows that the basic scheme can only resist the known ciphertext attack,while the enhanced scheme can resist the known background attack.The experimental performance test based on the real-world dataset shows that the proposed schemes are feasible in practical application scenarios.…”
    Get full text
    Article
  14. 14

    Integrity verified lightweight ciphering for secure medical image sharing between embedded SoCs by Siva Janakiraman, Vinoth Raj R, R. Sivaraman, A. Sridevi, Har Narayan Upadhyay, Rengarajan Amirtharajan

    Published 2025-03-01
    “…The encrypted DICOM images achieve an average entropy value of 7.99752, a PSNR of 5.872 dB, NPCR of 99.66128%, and a UACI of 33.55964%, while the noise attack analysis further demonstrates its robustness. …”
    Get full text
    Article
  15. 15
  16. 16

    Efficient Method for Robust Backdoor Detection and Removal in Feature Space Using Clean Data by Donik Vrsnak, Marko Subasic, Sven Loncaric

    Published 2025-01-01
    “…These attacks pose a significant security threat in critical applications, such as street sign or pedestrian recognition for autonomous vehicles, biometric authentication, image retrieval, semantic labeling, etc. …”
    Get full text
    Article
  17. 17

    Comprehensive Review and Analysis of Image Encryption Techniques by K. Mahalakshmi, Sivakumar Nagarajan

    Published 2025-01-01
    “…The rapid growth of digital media has increased the need to protect image data from unauthorized access, particularly in fields such as medical imaging, military communication, and online content distribution. …”
    Get full text
    Article
  18. 18
  19. 19
  20. 20