JPEG image width estimation for file carving. | 0 | 0.34 | 2018 |
A novel watermarking for DIBR 3D images with geometric rectification based on feature points | 3 | 0.38 | 2017 |
A Robust Depth-Image-Based-Rendering 3D Image Hashing Scheme Based on Histogram Shape. | 0 | 0.34 | 2016 |
Quantum realization of the nearest-neighbor interpolation method for FRQI and NEQR | 9 | 0.54 | 2016 |
An Adaptive Filter for Aeromagnetic Compensation Based on Wavelet Multiresolution Analysis. | 2 | 0.49 | 2016 |
Exposing frame deletion by detecting abrupt changes in video streams. | 3 | 0.39 | 2016 |
Meaningful visual secret sharing based on error diffusion and random grids | 1 | 0.34 | 2016 |
Study on the security of the authentication scheme with key recycling in QKD. | 0 | 0.34 | 2016 |
PCET based copy-move forgery detection in images under geometric transforms | 12 | 0.50 | 2016 |
Decoding schedule generating method for successive-cancellation decoder of polar codes. | 2 | 0.37 | 2016 |
Threshold progressive visual cryptography construction with unexpanded shares | 7 | 0.50 | 2016 |
A New Reduced-Latency SC Decoder for Polar Codes | 1 | 0.43 | 2015 |
Random grid-based visual secret sharing with multiple decryptions. | 8 | 0.53 | 2015 |
Identify the Copy & Paste Frames in Compressed Surveillance Video Based on Stream Parameters. | 0 | 0.34 | 2015 |
Co-Saliency Detection Linearly Combining Single-View Saliency And Foreground Correspondence | 2 | 0.35 | 2015 |
Linear discriminant multi-set canonical correlations analysis (LDMCCA): an efficient approach for feature fusion of finger biometrics | 6 | 0.43 | 2015 |
Improving Weights for Graph-Based Image Fragment Reassembly | 0 | 0.34 | 2015 |
Finger multibiometric cryptosystem based on score-level fusion | 1 | 0.35 | 2015 |
An Adaptive Improved Winnow Algorithm | 0 | 0.34 | 2015 |
Qualified matching feature collection for feature point-based copy-move forgery detection | 0 | 0.34 | 2015 |
Generalized random grids-based threshold visual cryptography with meaningful shares. | 8 | 0.47 | 2015 |
Background contrast based salient region detection. | 2 | 0.38 | 2014 |
Perceptual Image Hashing for DIBR 3D Images Based on Ring Partition and SIFT Feature Points | 0 | 0.34 | 2014 |
Comment on: Novel image encryption/decryption based on quantum fourier transform and double phase encoding | 3 | 0.43 | 2014 |
A Novel Finger Vein Image Quality Evaluation Method Based on Triangular Norm | 6 | 0.46 | 2014 |
An enhanced thermal face recognition method based on multiscale complex fusion for Gabor coefficients | 7 | 0.44 | 2014 |
Quantum image encryption based on restricted geometric and color transformations | 15 | 0.95 | 2014 |
Copy-Rotation-Move Forgery Detection Using the MROGH Descriptor | 0 | 0.34 | 2014 |
Threshold Visual Secret Sharing Based on Boolean Operations and Random Grids. | 0 | 0.34 | 2014 |
Study on error reconciliation in quantum key distribution. | 1 | 0.37 | 2014 |
Dynamic watermarking scheme for quantum images based on Hadamard transform | 28 | 1.35 | 2014 |
An adaptive transfer scheme based on sparse representation for figure-ground segmentation | 0 | 0.34 | 2014 |
Saliency detection based on integrated features | 3 | 0.38 | 2014 |
Threshold construction from specific cases in visual cryptography without the pixel expansion. | 19 | 0.71 | 2014 |
A new image encryption scheme based on cyclic elliptic curve and chaotic system | 21 | 1.08 | 2014 |
Finger multibiometric cryptosystems: Fusion strategy and template security | 3 | 0.37 | 2014 |
Region Diversity Based Saliency Density Maximization For Salient Object Detection | 0 | 0.34 | 2013 |
Corrigendum to "T. Chen, K. Tsao, Threshold visual secret sharing by random grids" [J. Syst. Softw. 84(2011) 1197-1208]. | 0 | 0.34 | 2013 |
Detection of Image Region Duplication Using Spin Image. | 0 | 0.34 | 2013 |
Feature-Level Fusion of Finger Biometrics Based on Multi-set Canonical Correlation Analysis. | 1 | 0.35 | 2013 |
Two-directional two-dimensional modified Fisher principal component analysis: An efficient approach for thermal face verification | 3 | 0.37 | 2013 |
A new approach to chaotic image encryption based on quantum chaotic system, exploiting color spaces | 24 | 1.21 | 2013 |
Hiding traces of double compression in JPEG images based on Tabu Search. | 0 | 0.34 | 2013 |
A Fully Automatic Player Detection Method Based on One-Class SVM. | 2 | 0.40 | 2013 |
An effective preprocessing method for finger vein recognition | 4 | 0.47 | 2013 |
A Countermeasure Against Double Compression Based Image Forensic | 0 | 0.34 | 2012 |
A novel evaluation method for perceptual hash algorithm in authentication mode | 1 | 0.39 | 2012 |
Elliptic curve ElGamal based homomorphic image encryption scheme for sharing secret images | 12 | 0.94 | 2012 |
A novel coding method for multiple system barcode based on QR code | 0 | 0.34 | 2012 |
A Fourier series based expression deformation model for 3D face recognition | 0 | 0.34 | 2012 |