Index for secur

_securable_
securable networked scheme with face authentication

_secure_
Achieving a Decentralized and secure Cab Sharing System Using Blockchain Technology
Adaptive secure Watermarking Scheme Using Double Random-Phase Encoding Technique, An
Advanced framework for highly secure and cloud-based storage of colour images
AI-Enabled Cryptographic Key Management Model for secure Communications in the Internet of Vehicles
Application of Full-Duplex Wireless Technique into secure MIMO Communication: Achievable Secrecy Rate based Optimization
Architectural Principles for secure Streaming and Secure Adaptation in the Developing Scalable Video Coding (SVC) Standard
Architectural Principles for secure Streaming and Secure Adaptation in the Developing Scalable Video Coding (SVC) Standard
Artificial Noise Aided Hybrid Precoding Design for secure mmWave MISO Systems With Partial Channel Knowledge
Attribute-Based secure Data Aggregation for Isolated IoT-Enabled Maritime Transportation Systems
Bayesian Approach to Spread Spectrum Watermark Detection and secure Copyright Protection for Digital Image Libraries, A
Beamforming for secure Wireless Information and Power Transfer in Terrestrial Networks Coexisting With Satellite Networks
Binary feature fusion for discriminative and secure multi-biometric cryptosystems
Blockchain and Learning-Based secure and Intelligent Task Offloading for Vehicular Fog Computing
Blockchain Empowered secure Video Sharing With Access Control for Vehicular Edge Computing
Blockchain-Based Authentication Scheme and secure Architecture for IoT-Enabled Maritime Transportation Systems, A
Blockchain-based Iris Authentication in Order to secure Iot Access and Digital Money Spending
Blockchain-Based secure Communication of Intelligent Transportation Digital Twins System
Blockchain-Based secure Computation Offloading in Vehicular Networks
Blockchain-Based secure Mist Computing Network Architecture for Intelligent Transportation Systems
BlockEV: Efficient and secure Charging Station Selection for Electric Vehicles
BPR: Blockchain-Enabled Efficient and secure Parking Reservation Framework With Block Size Dynamic Adjustment Method
Cancelable Biometrics Vault: A secure Key-Binding Biometric Cryptosystem based on Chaffing and Winnowing
Cancelable indexing based on low-rank approximation of correlation-invariant random filtering for fast and secure biometric identification
Chaotic Synchronization and secure Communication Using Contraction Theory
class of authentication digital watermarks for secure multimedia communication, A
Coding Aspects of secure GNSS Receivers
Collusion-Traceable secure Multimedia Distribution Based on Controllable Modulation
Combination of Symmetric Hash Functions for secure Fingerprint Matching
Combined secure approach based on whale optimization to improve the data classification for data analytics
Comments on A secure and Lightweight Drones-Access Protocol for Smart City Surveillance
Comments on Dual Authentication and Key Management Techniques for secure Data Transmission in Vehicular Ad Hoc Networks
Compression-Then-Encryption-Based secure Watermarking Technique for Smart Healthcare System
Compressive Sensing Based secure Watermark Detection and Privacy Preserving Storage Framework, A
Constructing Immune Cover for secure Steganography Based on an Artificial Immune System Approach
Constructing Immunized Stego-Image for secure Steganography via Artificial Immune System
Construction of a Bayesian decision theory-based secure multimodal fusion framework for soft biometric traits
Cooperative Precoding for Wireless Energy Transfer and secure Cognitive Radio Coexistence Systems
Cooperative secure Beamforming for AF Relay Networks With Multiple Eavesdroppers
Data Ownership and secure Medical Data Transmission using Optimal Multiple Key-Based Homomorphic Encryption with Hyperledger Blockchain
DECENT: Decentralized and Efficient Key Management to secure Communication in Dense and Dynamic Environments
Deep Learning-Based Blockchain Mechanism for secure Internet of Drones Environment, A
Deep secure Encoding for Face Template Protection
Deep-NC: A secure image transmission using deep learning and network coding
DeepDIST: A Black-Box Anti-Collusion Framework for secure Distribution of Deep Models
DePass: A secure hash-based authentication scheme
Design and Analysis of secure Distributed Estimator for Vehicular Platooning in Adversarial Environment
Design and ARM-Embedded Implementation of a Chaotic Map-Based Real-Time secure Video Communication System
Design and FPGA implementation of a wireless hyperchaotic communication system for secure real-time image transmission
Design and FPGA-Based Realization of a Chaotic secure Video Communication System
Design of Provably secure Authentication Protocol for Edge-Centric Maritime Transportation System
Designing a secure and Scalable Service Model Using Blockchain and MQTT for IoT Devices
Determining Achievable Rates for secure, Zero Divergence, Steganography
Diffie-Hellman process and its use in secure and authenticated VC networks
DisBezant: secure and Robust Federated Learning Against Byzantine Attack in IoT-Enabled MTS
Distortion Design for secure Adaptive 3-D Mesh Steganography
Distributed Adaptive Platoon secure Control on Unmanned Vehicles System for Lane Change Under Compound Attacks
Distributed secure Platoon Control of Connected Vehicles Subject to DoS Attack: Theory and Application
Dither-based secure image hashing using distributed coding
Dual Authentication and Key Management Techniques for secure Data Transmission in Vehicular Ad Hoc Networks
Dynamic Keypad: Digit Shuffling for secure PIN Entry in a Virtual World
Dynamic signature verification for secure retrieval of classified information
Edge-Centric secure Service Provisioning in IoT-Enabled Maritime Transportation Systems
Efficient and Physically secure Privacy-Preserving Key-Agreement Protocol for Vehicular Ad-Hoc Network, An
efficient and secure cipher scheme for images confidentiality preservation, An
Efficient and secure cipher scheme with dynamic key-dependent mode of operation
Efficient and secure Identity-Based Signature System for Underwater Green Transport System, An
Efficient and secure Image Communication System Based on Compressed Sensing for IoT Monitoring Applications
Efficient and secure Routing Protocol Based on Artificial Intelligence Algorithms With UAV-Assisted for Vehicular Ad Hoc Networks in Intelligent Transportation Systems
Efficient Group Handover Authentication for secure 5G-Based Communications in Platoons
Efficient Privacy-Preserving Dual Authentication and Key Agreement Scheme for secure V2V Communications in an IoV Paradigm
Efficiently secure image transmission against tampering in wireless visual sensor networks
Enabling Better Medical Image Classification Through secure Collaboration
Enabling Manageable and secure Hybrid P2P-CDN Video-on-Demand Streaming Services Through Coordinating Blockchain and Zero Knowledge
Enabling secure and Fast Indexing for Privacy-Assured Healthcare Monitoring via Compressive Sensing
Energy-Efficient and secure Beamforming for Self-Sustainable Relay-Aided Multicast Networks
ENSEI: Efficient secure Inference via Frequency-Domain Homomorphic Convolution for Privacy-Preserving Visual Recognition
Event-Based Distributed secure Control of Unmanned Surface Vehicles With DoS Attacks
Event-Based secure Leader-Following Consensus Control for Multiagent Systems With Multiple Cyber Attacks
FALCON: A Fourier Transform Based Approach for Fast and secure Convolutional Neural Network Predictions
Fast and secure Multihop Broadcast Solutions for Intervehicular Communication
Fast and secure Real-Time Video Encryption
Fast and secure Steganography Based on J-UNIWARD
Feature transformation of biometric templates for secure biometric systems based on error correcting codes
Feeling Is Believing: A secure Template Exchange Protocol
Finding a secure Place: A Map-Based Crowdsourcing System for People With Autism
Fingerprint Multicast in secure Video Streaming
Fingerprint shell: secure representation of fingerprint template
Flexible and secure Cross-Domain Signcrypted Data Authorization in Multi-Platoon Vehicular Networks
Future Intelligent and secure Vehicular Network Toward 6G: Machine-Learning Approaches
Generating provably secure cancelable fingerprint templates based on correlation-invariant random filtering
Guest Editorial Introduction to the Special Issue on Deep Learning Models for Safe and secure Intelligent Transportation Systems
Hand-based multimodal identification system with secure biometric template storage
HAP and UAVs Collaboration Framework for Uplink secure Rate Maximization in NOMA-Enabled IoT Networks, An
Hardware Implementation of Fingerprint Verification for secure Biometric Authentication Systems, A
Hierarchical watermarking for secure image authentication with localization
High capacity and secure digital steganography to palette-based images
Highly Transparent and secure Scheme for Concealing Text Within Audio
Histogram-Based Intrusion Detection and Filtering Framework for secure and Safe In-Vehicle Networks
Hybrid N-Inception-LSTM-Based Aircraft Coordinate Prediction Method for secure Air Traffic
Hyperchaotic Synchronization secure Communication Based on State Observer
Identity-Based Authentication Mechanism for secure Information Sharing in the Maritime Transport System
ill-posed operator for secure image authentication, An
Image fingerprinting system based on collusion secure code and watermarking method
Image Recapture Prevention Using secure Display Schemes on Polarized 3D System
Image Representation Using Voronoi Tessellation: Adaptive and secure
Improved Selective Encryption Techniques for secure Transmission of MPEG Video Bit-Streams
improved spread transform dither modulation for robust and secure watermarking, An
Improved Spread Transform Dither Modulation: A New Modulation Technique for secure Watermarking
Intelligent and secure Clustering in Wireless Sensor Network (WSN)-Based Intelligent Transportation Systems
Intelligent Reflecting Surfaces Assisted secure Transmission Without Eavesdropper's CSI
Introducing secure modes of operation for optical encryption
Investigating the Prospect of Leveraging Blockchain and Machine Learning to secure Vehicular Networks: A Survey
JC-BioAPI Compliant Smart Card with Biometrics for secure Access Control, A
Joint Cooperative Beamforming and Jamming to secure AF Relay Systems With Individual Power Constraint and No Eavesdropper's CSI
Joint secure Design of Downlink and D2D Cooperation Strategies for Multi-User Systems
Joint secure Offloading and Resource Allocation for Vehicular Edge Computing Network: A Multi-Agent Deep Reinforcement Learning Approach
Joint security and performance enhancement for secure arithmetic coding
Joint Transmit and Reflective Beamformer Design for secure Estimation in IRS-Aided WSNs
KeyEncoder: A secure and usable EEG-based cryptographic key generation mechanism
Leveraging the Mixed-Text Segmentation Problem to Design secure Handwritten CAPTCHAs
Marriage of Cryptography and Watermarking: Beneficial and Challenging for secure Watermarking and Detection, The
MIMO Beamforming for secure and Energy-Efficient Wireless Communication
Multi party secure data access management in cloud using user centric block chain data encryption
Multimodal Fusion-Based Image Hiding Algorithm for secure Healthcare System
Near-Optimal Time Function for secure Dynamic Visual Cryptography
new class of image registration for guaranteeing secure data management, A
New secure Image Transmission Technique via Secret-Fragment-Visible Mosaic Images by Nearly Reversible Color Transformations, A
NOMA-Assisted secure Offloading for Vehicular Edge Computing Networks With Asynchronous Deep Reinforcement Learning
Novel and secure plaintext-related image encryption algorithm based on compressive sensing and tent-sine system
Novel Graph-Based Machine Learning Technique to secure Smart Vehicles in Intelligent Transportation Systems
Novel secure H.264 Transcoder using Selective Encryption, A
Observer based discrete-time chaotic systems synchronization for secure image transmission
Obtaining cryptographic keys using feature level fusion of iris and face biometrics for secure user authentication
On secure VANET-Based Ad Dissemination With Pragmatic Cost and Effect Control
On the Elliptic Curve Cryptography for Privacy-Aware secure ACO-AODV Routing in Intent-Based Internet of Vehicles for Smart Cities
On the Optimal Linear Network Coding Design for Information Theoretically secure Unicast Streaming
On the Performance of secure Full-Duplex Relaying under Composite Fading Channels
On the provably secure CEW based on orthogonal decomposition
On the secure Energy Efficiency of TAS/MRC With Relaying and Jamming Strategies
Optimal Parameter Design for Estimation Theoretic secure Broadcast
Optimal Power Allocation for secure Estimation of Multiple Parameters
Optimal Transmission Topology Construction and secure Linear Network Coding Design for Virtual-Source Multicast With Integral Link Rates
Optimal Transport for secure Spread-Spectrum Watermarking of Still Images
Outage-Aware secure Beamforming in MISO Wireless Interference Networks
PASS: Privacy aware secure signature scheme for surveillance systems
Passive Beamforming and Trajectory Optimization for Reconfigurable Intelligent Surface-Assisted UAV secure Communication
Performance Evaluation for secure Communications in Mobile Internet of Vehicles With Joint Reactive Jamming and Eavesdropping Attacks
Privacy preserving biometric-based remote authentication with secure processing unit on untrusted server
Privacy Protected Surveillance Using secure Visual Object Coding
Privacy protecting visual processing for secure video surveillance
Privacy-Preserving Biometric Identification Using secure Multiparty Computation: An Overview and Recent Trends
Privacy-Preserving-Based secure Framework Using Blockchain-Enabled Deep-Learning in Cooperative Intelligent Transport System, A
Producing secure multimodal biometric descriptors using artificial neural networks
Provably secure and Anonymous V2I and V2V Authentication Protocol for VANETs
Provably secure Generative Steganography Based on Autoregressive Model
Provably secure Mobile User Authentication Scheme for Big Data Collection in IoT-Enabled Maritime Intelligent Transportation System, A
Provably secure Robust Image Steganography
Provably secure Steganography: Achieving Zero K-L Divergence using Statistical Restoration
Quality-Optimized and secure End-to-End Authentication for Media Delivery
QueryCom: secure Message Communication and Data Searching Protocols for Smart Transportation
Random and Adversarial Bit Error Robustness: Energy-Efficient and secure DNN Accelerators
Rank-Two Beamformed secure Multicasting for Wireless Information and Power Transfer
Reliable and secure Distributed Smart Road Pricing System for Smart Cities
Remote Sensing Images secure Distribution Scheme Based on Deep Information Hiding
Reply to Comments on Dual Authentication and Key Management Techniques for secure Data Transmission in Vehicular Ad Hoc Networks
Research on secure Transmission Performance of Electric Vehicles Under Nakagami-m Channel
Robust AN-Aided secure Transmission Scheme in MISO Channels with Simultaneous Wireless Information and Power Transfer
Robust and secure Data Hiding for PDF Text Document
Robust and secure fractional wavelet image watermarking
Robust and secure Image Fingerprinting Learned by Neural Network
robust and secure perceptual hashing system based on a quantization step analysis, A
Robust and secure Transmission over Insecure Channel through Higher Level Bit Replacement
Robust biometric authentication system with a secure user template
Robust image identification with secure features for JPEG images
Robust Reversible Watermarking in Encrypted Image With secure Multi-Party Based on Lightweight Cryptography
Robust secure Transmit Design in MIMO Channels with Simultaneous Wireless Information and Power Transfer
Rotation-Invariant secure Image Watermarking Algorithm Incorporating Steerable Pyramid Transform, A
SAGENT: a novel technique for document modeling for secure access and distribution
Scrambling-based tool for secure protection of JPEG images
SDSS: secure Data Sharing Scheme for Edge Enabled IoV Networks
secure Adaptive Control for Cooperative Driving of Autonomous Connected Vehicles in the Presence of Heterogeneous Communication Delays and Cyberattacks, A
secure algorithm for biometric-based digital image watermarking in DCT domain, A
secure and Disambiguating Approach for Generative Linguistic Steganography, A
secure and Efficient Authenticated Key Management Scheme for UAV-Assisted Infrastructure-Less IoVs
secure and Efficient Authentication Scheme for Access Control in Mobile Pay-TV Systems, A
secure and Efficient Blockchain-Based Knowledge Sharing for Intelligent Connected Vehicles
secure and Efficient Data Sharing Among Vehicles Based on Consortium Blockchain
secure and Efficient Transmissions of Fingerprint Images for Embedded Processors
secure and Intelligent Framework for Vehicle Health Monitoring Exploiting Big-Data Analytics, A
secure and Lightweight Drones-Access Protocol for Smart City Surveillance, A
secure and Localizing Watermarking Technique for Image Authentication, A
secure and Non-Blind Watermarking Scheme for Color Images
secure and Practical Sample-then-lock Scheme for Iris Recognition, A
secure and Privacy-Preserving Smartphone-Based Traffic Information Systems
secure and Privacy-Preserving Technique Based on Contrast-Enhancement Reversible Data Hiding and Plaintext Encryption for Medical Images, A
secure and Robust Authentication Scheme for Video Transcoding, A
secure and Robust Digital Watermarking Technique by the Block Cipher Rc6 and Secure Hash Algorithm, A
secure and Robust Digital Watermarking Technique by the Block Cipher Rc6 and Secure Hash Algorithm, A
secure and robust host-adapted color image watermarking using inter-layered wavelet-packets
secure and Robust Iris Recognition Using Random Projections and Sparse Representations
secure and robust SIFT with resistance to chosen-plaintext attack
secure and Robust Two-Phase Image Authentication
secure and Temporary Access Delegation With Equality Test for Cloud-Assisted IoV
secure Arrays for Digital Watermarking
secure Authentication and Key Management Protocol for Deployment of Internet of Vehicles (IoV) Concerning Intelligent Transport Systems
secure authentication watermarking for halftone and binary images, A
secure Beamforming in Downlink MIMO Nonorthogonal Multiple Access Networks
secure Binary Image Steganography Based on Fused Distortion Measurement
secure Binary Image Steganography With Distortion Measurement Based on Prediction
secure biometric template generation for multi-factor authentication
secure Biometric Templates from Fingerprint-Face Features
secure Biometrics: Concepts, Authentication Architectures, and Challenges
secure Blind Image Steganographic Technique Using Discrete Fourier Transformation
secure Blockchain Enabled V2V Communication System Using Smart Contracts, A
secure chaotic dual encryption scheme for H.264/AVC video conferencing protection
secure Client Side Watermarking with Limited Key Size
secure collaboration using Slepian-Wolf codes
secure Communications With Asymptotically Gaussian Compressed Encryption
secure computing with the MPEG RVC framework
secure Content Delivery for Connected and Autonomous Trucks: A Coalition Formation Game Approach
secure Data Sharing With Flexible Cross-Domain Authorization in Autonomous Vehicle Systems
secure Decentralized Image Classification With Multiparty Homomorphic Encryption
secure delivery of images over open networks
secure digital camera based fingerprint verification system, A
secure Digital Watermarking Scheme for MPEG-2 Video Copyright Protection, A
secure distortion computation among untrusting parties using homomorphic encryption
secure Distributed Adaptive Platooning Control of Automated Vehicles Over Vehicular Ad-Hoc Networks Under Denial-of-Service Attacks
secure Distribution Scheme for Compressed Data Streams
secure Dynamic Mix Zone Pseudonym Changing Scheme Based on Traffic Context Prediction, A
secure ear biometrics using circular kernel principal component analysis, Chebyshev transform hashing and Bose-Chaudhuri-Hocquenghem error-correcting codes
secure Fingerprint Authentication with Homomorphic Encryption
secure fingerprint embedding based on modified GDFT based parametric transform
secure Fingerprint Matching with External Registration
secure Fingerprint Matching with Generic Local Structures
secure fingerprint template generation mechanism using visual secret sharing with inverse halftoning, A
secure Fragile Digital Watermarking Technique for Image Authentication
secure FSM-based arithmetic codes
secure Halftone Image Steganography Based on Feature Space and Layer Embedding
secure high capacity full-gray-scale-level multi-image information hiding and secret image authentication scheme via Tchebichef moments, A
secure high capacity tetris-based scheme for data hiding
secure Identification Documents Via Pattern Recognition and Public-key Cryptography
secure identity and access management system for decentralising user data using blockchain, A
secure image authentication algorithm with pixel-level tamper localization, A
secure Image Filtering
secure image hashing via minimum distortion estimation
secure image sharing scheme based on SVD and Fractional Fourier Transform, A
secure Image Watermarking Based on LWT and SVD
secure Intelligent System for Internet of Vehicles: Case Study on Traffic Forecasting, A
secure Internet-Based Personal Identity Verification System Using Lossless Watermarking and Fingerprint Recognition, A
secure Iris Recognition Based on Local Intensity Variations
secure JPEG steganography by LSB+ matching and multi-band embedding
secure latent fingerprint storage and self-recovered reconstruction using POB number system
secure Lightweight Texture Encryption Scheme, A
secure media streaming and secure adaptation for non-scalable video
secure media streaming and secure adaptation for non-scalable video
secure media streaming mechanism combining encryption, authentication, and transcoding, A
secure Medical Image Encryption for Remote Virtual Doctor System Based On H-IoT Applications Over 5G Network: a Comparison Study
secure medical images based on data hiding using a hybrid scheme with the Hamming code, LSB, and OPAP
secure Minutiae-Based Fingerprint Templates Using Random Triangle Hashing
secure model on Advanced Fake Image-Feature Network (AFIFN) based on deep learning for image forgery detection, A
secure MQ coder: An efficient way to protect JPEG 2000 images in wireless multimedia sensor networks
secure Multicast Transmission for Massive MIMO With Statistical Channel State Information
secure multicasting of images via joint privacy-preserving fingerprinting, decryption, and authentication
secure Multilayer Perceptron Based on Homomorphic Encryption
secure multimodal biometric system based on diffused graphs and optimal score fusion
secure Multimodal Biometric Verification Scheme, A
secure OMP Computation Maintaining Sparse Representations and Its Application to EtC Systems
secure Outsourced SIFT: Accurate and Efficient Privacy-Preserving Image SIFT Feature Extraction
secure Privacy-Preserving V2V Communication in 5G-V2X Supporting Network Slicing
secure Protocol for Data Hiding in Compressed Fingerprint Images, A
secure Quantization Index Modulation Watermark Detection
secure Quaternion Feistel Cipher for DICOM Images
secure real-time image protection scheme with near-duplicate detection in cloud computing
secure Relay and Jammer Selection for Physical Layer Security
secure remote matching with privacy: Scrambled support vector vaulted verification (S2V3)
secure Reversible Image Data Hiding Over Encrypted Domain via Key Modulation
secure reversible visible image watermarking with authentication
secure Robust JPEG Steganography Based on AutoEncoder With Adaptive BCH Encoding
secure scalable streaming and secure transcoving with JPEG2000
secure scalable streaming and secure transcoving with JPEG2000
secure Scalable Streaming Enabling Transcoding Without Decryption
secure Self-Recovery Image Authentication Using Randomly-Sized Blocks
secure semi-blind watermarking based on iteration mapping and image features
secure Service Offloading for Internet of Vehicles in SDN-Enabled Mobile Edge Computing
secure Similar Image Matching (SESIM): An Improved Privacy Preserving Image Retrieval Protocol over Encrypted Cloud Database
secure Smart Homes: Opportunities and Challenges
secure speech biometric templates for user authentication
secure Spread Image Watermarking Scheme in 3D-DCT Domain
secure spread spectrum watermarking for images, audio and video
secure Spread Spectrum Watermarking for Multimedia
secure spread-spectrum data embedding with PN-sequence masking
secure Steganographic Scheme against Statistical Analyses, A
secure storage and matching of latent fingerprints using phase shifting digital holography
secure Traffic Monitoring With Spatio-Temporal Metadata Protection Using Oblivious RAM
secure transcoders for single layer video data
secure transcoding for compressive multimedia sensing
secure transcoding with JPSEC confidentiality and authentication
secure transfer of medical images using hybrid encryption: Authentication, confidentiality, integrity
secure Transmission in Cellular V2X Communications Using Deep Q-Learning
secure Transmission in Cooperative Networks with Weak Eavesdroppers
secure Transmission Scheme Based on Joint Radar and Communication in Mobile Vehicular Networks
secure Transmissions via Compressive Sensing in Multicarrier Systems
secure transport and adaptation of MC-EZBC video utilizing H.264-based transport protocols
secure V2V and V2I Technologies for the Next-Generation Intelligent Transportation Systems
secure Vehicular Communications With Varying QoS and Environments: A Unified Cross-Layer Policy-Adaptation Approach
secure video distribution scheme based on partial encryption
secure Video Multicast Based on Desynchronized Fingerprint and Partial Encryption
secure Video Watermarking via Embedding Strength Modulation
secure Watermark Embedding Through Partial Encryption
secure Watermarking for JPEG-2000, A
secure Watermarking for Multimedia Content Protection: A Review of its Benefits and Open Issues
secure watermarking scheme against watermark attacks in the encrypted domain
secure watermarking technique without loss of robustness, A
secure wavelet transform, The
secure Wireless Communication via Movable-Antenna Array
secure, Intelligent Electric Vehicle Ecosystem for Safe Integration With the Smart Grid, A
self-embedding secure fragile watermarking scheme with high quality recovery, A
SEMBA: secure multi-biometric authentication
Sensar: secure(tm) Iris Identification System
Short N-secure Fingerprinting Code for Image
Simultaneous Encryption and Compression of Digital Images Based on secure-JPEG Encoding
SIRC: A secure Incentive Scheme for Reliable Cooperative Downloading in Highway VANETs
Smart Software secures Surveillance Systems
SP-CIDS: secure and Private Collaborative IDS for VANETs
Special Issue on Image security: secure imaging--is it necessary?
Special issue on real time biometrics and secure media
SSDA: secure Source-Free Domain Adaptation
Statistical Meta-Analysis of Presentation Attacks for secure Multibiometric Systems
Statistical Restoration for Robust and secure Steganography
Survey on Post-Quantum Public-Key Signature Schemes for secure Vehicular Communications, A
SviaB: secure and verifiable multi-instance iris remote authentication using blockchain
Symmetric hash functions for secure fingerprint biometric systems
System For A New 2-Dimensional Code: secure 2D Code, A
Tamper-Resistant Broadcasting Scheme for secure Communication in Internet of Autonomous Vehicles, A
Theoretical Framework for Constructing Matching Algorithms secure against Wolf Attack, A
Three measures for secure palmprint identification
Topological Approach to secure Message Dissemination in Vehicular Networks, A
Toward a Novel LSB-based Collusion-secure Fingerprinting Schema for 3D Video
Toward a secure Public-key Blockwise Fragile Authentication Watermarking
Toward Encrypted Cloud Media Center With secure Deduplication
Toward secure public-key blockwise fragile authentication watermarking
TRAMS: A secure Vehicular Crowdsensing Scheme Based on Multi-Authority Attribute-Based Signature
Transportation 5.0: The DAO to Safe, secure, and Sustainable Intelligent Transportation Systems
TrustStream: A secure and Scalable Architecture for Large-Scale Internet Media Streaming
Two-Phase Anomaly Detection Model for secure Intelligent Transportation Ride-Hailing Trajectories, A
Unconditionally provably secure cancellable biometrics based on a quotient polynomial ring
User-Centred System for End-to-End secure Multimedia Content Delivery: From Content Annotation to Consumer Consumption, A
VIRSBS project: Visual intelligent recognition for secure banking services, The
Virtual Community Based secure Service Discovery and Access for 3D Video Streaming Applications
W-EHR: A Wireless Distributed Framework for secure Dissemination of Electronic Healthcare Records
Watermarking in secure image retrieval
Wavelet-Based Fragile Watermarking Scheme for secure Image Authentication, A
Wearables-Fashion With a Purpose: A New Generation of Wearable Devices Uses Signal Processing to Make Life Easier, Healthier, and More secure [Special Reports]
Web-Based secure System for the Distributed Printing of Documents and Images, A
Workshop on Research and Innovation for secure Societies
355 for secure

_secured_
3-Dimensional secured Fingerprint Shell
Blockchain-Based Lightweight and secured V2V Communication in the Internet of Vehicles
Content Sharing Based on Personal Information in Virtually secured Space
Efficient secured Lossless Coding Of Medical Images: Using Region Based Modified Spiht and Modified Run Length Coding for Character Representation
Fast and secured Visual Content Hiding in Lossy Compressed Images and Video Streams
Magnetic Resonant Beamforming for secured Wireless Power Transfer
Multimodal Biometric-Based Authentication with secured Templates
novel approach for secured multimodal biometric authentication based on data fusion technique, A
P2SF-IoV: A Privacy-Preservation-Based secured Framework for Internet of Vehicles
Robust Magnetic Resonant Beamforming for secured Wireless Power Transfer
secured and Cooperative Publish/Subscribe Scheme in Autonomous Vehicular Networks
Smartphone application for medical images secured exchange based on encryption using the matrix product and the exclusive addition
12 for secur

_securedl_
securedl: A privacy preserving deep learning model for image recognition over cloud

_securic_
securics

_securimetric_
securimetrics

_securing_
Agreement-Induced Data Verification Model for securing Vehicular Communication in Intelligent Transportation Systems
ART: An Attack-Resistant Trust Management Scheme for securing Vehicular Ad Hoc Networks
Authenticating and securing healthcare records: A deep learning-based zero watermarking approach
Biohashing for securing Minutiae Template
Blockchain Solution for securing Real Property Transactions: A Case Study for Serbia, A
Blockchain-Integrated Multiagent Deep Reinforcement Learning for securing Cooperative Adaptive Cruise Control
Canadian Geospatial Data Infrastructure (CGDI) and securing arctic seabird sustainability: an SDI success story, The
combined watermarking approach for securing biometric data, A
Crypto-stego System for securing Text and Image Data
DCT-Based Data Hiding for securing ROI of Color Images
Distributed source coding for securing a hand-based biometric recognition system
Drifting Phase of SARAL: securing Stable Ocean Mesoscale Sampling with an Unmaintained Decaying Altitude, The
DSIT: A Dynamic Lightweight Cryptography Algorithm for securing Image in IoT Communication
Energy-Aware Encryption for securing Video Transmission in Internet of Multimedia Things
Evolutionary Deep Learning-Based Anomaly Detection Model for securing Vehicles, An
Fast Forward Full-Duplex Cooperative Relay Scheme for securing Wireless Communications, A
hybrid biometric cryptosystem for securing fingerprint minutiae templates, A
novel approach for securing data against adversary attacks in UAV embedded HetNet using identity based authentication scheme, A
PassBYOP: Bring Your Own Picture for securing Graphical Passwords
securing access approach to virtual worlds based on 3D mesh watermarking of avatar's face, A
securing biometric user template using modified minutiae attributes
securing DICOM images by a new encryption algorithm using Arnold transform and Vigenere cipher
securing Electronic Medical Records Using Biometric Authentication
securing Fingerprint Template: Fuzzy Vault with Helper Data
securing fingerprint template: Fuzzy vault with minutiae descriptors
securing fingerprint templates using fused structures
securing Images Online: A Protection Mechanism That Does Not Involve Watermarking
securing IoT Based Maritime Transportation System Through Entropy-Based Dual-Stack Machine Learning Framework
securing Iot With Blockchain
securing Multimedia Content Using Joint Compression and Encryption
securing SIFT: Privacy-Preserving Outsourcing Computation of Feature Extractions Over Encrypted Image Data
securing the architecture of the JPEG compression by an dynamic encryption
securing the internet of vehicles through lightweight block ciphers
securing Wireless Sensor Networks by Using Location Information
Use of Emergable Watermarks as Copy Indicators for securing Video Content
35 for securing

_securities_
Device for examining securities

_security_
25th ICPR: Real-time Visual Surveillance as-a-Service (VSaaS) for smart security solutions
3D Imaging for Safety and security
3D Modeling of Indoor Environments for a Robotic security Guard
3D Sensors Provide security, Better Games
3D Site Modelling and Verification of Plant Design for Nuclear security Applications
3D Visual security (3DVS) score to measure the visual security level of selectively encrypted 3D objects, A
3D Visual security (3DVS) score to measure the visual security level of selectively encrypted 3D objects, A
5G Vehicle-to-Everything Services: Gearing Up for security and Privacy
AACS-compatible multimedia joint encryption and fingerprinting: security issues and some solutions
Access control system with high level security using fingerprints
Accuracy Assessment of Global Food security-Support Analysis Data (GFSAD) Cropland Extent Maps Produced at Three Different Spatial Resolutions
Activity Analysis for Video security Systems
Adaptation-aware encryption of scalable H.264/AVC video for content security
Adaptive Network security System for IoT-Enabled Maritime Transportation, An
Adaptive security for Human Surveillance Using Multimodal Open Set Biometric Recognition
Advanced 3D Imaging for Safety and security
Adversarial Biometric Recognition: A review on biometric system security from the adversarial machine-learning perspective
Airborne 3D imaging possibilities for defense and security
Airborne Based High Performance Crowd Monitoring for security Applications
Analysis of the security of Perceptual Image Hashing Based on Non-Negative Matrix Factorization
Analysis of Time-multiplexed security Videos
Anomaly Detection in Radiation Sensor Data With Application to Transportation security
Application of human facial features recognition to automobile security and convenience
Applied image processing to multimedia information security
AR-Based Hologram Detection on security Documents Using a Mobile Phone
Assessment of Forest Ecological security in China Based on DPSIRM Model: Taking 11 Provincial Administrative Regions along the Yangtze River Basin as Examples
Attention-based prohibited item detection in X-ray images during security checking
Automatic Segmentation of Unknown Objects, with Application to Baggage security
Automotive security: Threat Forewarning and ECU Source Mapping Derived From Physical Features of Network Signals
Autonomous Vehicle: security by Design
Autonomous Vehicles security: Challenges and Solutions Using Blockchain and Artificial Intelligence
Ballistic Ground Penetrating Radar Equipment for Blast-Exposed security Applications
Behavioral security in Covert Communication Systems
Beyond Smart Homes: An In-Depth Analysis of Smart Aging Care System security
Biometric Authentication: System security and User Privacy
Biometric ontology for semantic biometric-as-a-service (BaaS) applications: a border security use case
Biometric Recognition: security and Privacy Concerns
Biometric security Application for Person Authentication Using Retinal Vessel Feature
Biometric Systems Utilising Health Data from Wearable Devices: Applications and Future Challenges in Computer security
Biometric User Authentication for Heightened Information security
Biometrics security and Privacy Protection, From the Guest Editors
Biometrics, Privacy Issues, security Issues
Biometrics: A New Era in security
Biometrics: In Search of Identity and security (Q & A)
Blind Watermarking Scheme Based on Visual Model for Copyright security, A
Blockchain in Big Data security for Intelligent Transportation With 6G
Blockchain-Based Cyber-Physical security for Electrical Vehicle Aided Smart Grid Ecosystem
Bright and Dark Sides of Computer Vision: Challenges and Opportunities for Privacy and security, The
Buffer Occupancy Feedback security Control and Changing Encryption Keys to Protect MOD Services
Building an intelligent video and image analysis evaluation platform for public security
Camera Array Management Based on UPnP security
Camera Placement Based on Vehicle Traffic for Better City security Surveillance
Cancelable Iris template generation by aggregating patch level ordinal relations with its holistically extended performance and security analysis
CBTC security and Reliability Enhancements by a Key-Based Direct Sequence Spread Spectrum Technique
Chaff point generation mechanism for improving fuzzy vault security
Changes in Croplands as a Result of Large Scale Mining and the Associated Impact on Food security Studied Using Time-Series Landsat Images
Cloud Multimedia Data security by Optimization-Assisted Cryptographic Technique
Cloud security based attack detection using transductive learning integrated with Hidden Markov Model
Cognitive AmBC-NOMA IoV-MTS Networks With IQI: Reliability and security Analysis
Combining Multiple Matchers for a High security Fingerprint Verification System
Comment on SFVCC: Chaotic map-based security framework for vehicular cloud computing
Communication security Analysis of Intelligent Transportation System Using 5G Internet of Things From the Perspective of Big Data
comprehensive security analysis of match-in-database fingerprint biometric system, A
Comprehensive survey on security services in vehicular ad-hoc networks
Computer Vision for Homeland security: A Perspective on its Promise and Pitfalls
Computer-access security systems using keystroke dynamics
Consortium Blockchain-Based security and Efficient Resource Trading in V2V-Assisted Intelligent Transport Systems
Construction and Analysis of Ecological security Patterns in the Southern Anhui Region of China from a Circuit Theory Perspective
Construction and Optimization of Ecological security Pattern in the Loess Plateau of China Based on the Minimum Cumulative Resistance (MCR) Model
Construction of an Ecological security Pattern in an Urban-Lake Symbiosis Area: A Case Study of Hefei Metropolitan Area
Construction of an Ecological security Pattern in Rapidly Urbanizing Areas Based on Ecosystem Sustainability, Stability, and Integrity
Construction of Ecological security Pattern under Rapid Urbanization in the Loess Plateau: A Case Study of Taiyuan City, The
Construction of Regional Ecological security Patterns Based on Multi-Criteria Decision Making and Circuit Theory
content security protection scheme in JPEG compressed domain, A
Convolutional Neural Network for Visual security Evaluation
Cooperative Location-Sensing Network Based on Vehicular Communication security Against Attacks
Cooperative Precoding and Artificial Noise Design for security Over Interference Channels
Coprime Blur Scheme for Data security in Video Surveillance, A
cost effective method for automobile security based on detection and recognition of human face, A
Cost Reassignment for Improving security of Adaptive Steganography Using an Artificial Immune System
Critical Infrastructure security Against Drone Attacks Using Visual Analytics
Cross-modal Image Synthesis within Dual-Energy X-ray security Imagery
Crowdsensing Multimedia Data: security and Privacy Issues
Crypto-compression scheme based on the DWT for medical image security
Data security based on homographic function
Data security Through Zero-Knowledge Proof and Statistical Fingerprinting in Vehicle-to-Healthcare Everything (V2HX) Communications
Data-Driven Cyber security in Perspective: Intelligent Traffic Analysis
Data-driven multimedia forensics and security
Dataset security for Machine Learning: Data Poisoning, Backdoor Attacks, and Defenses
Decision-Support System for Safety and security Assessment and Management in Smart Cities
Deep Learning Based Semi-Supervised Control for Vertical security of Maglev Vehicle With Guaranteed Bounded Airgap
Deep Learning for security in Digital Twins of Cooperative Intelligent Transportation Systems
Defeating Lattice-Based Data Hiding Code Via Decoding security Hole
Design of Blockchain enabled intrusion detection model for detecting security attacks using deep learning
Detecting hidden objects: security imaging using millimetre-waves and terahertz
Detection of people in military and security context images
Development of Smart Cities in Taiwan From The Perspective of Cloud Computing security
Development of Spatial Model for Food security Prediction Using Remote Sensing Data in West Java, Indonesia
Differential Fault Attack on security Vehicle System Applied SIMON Block Cipher, A
Differential security Barriers for Virtual Emotion Detection in Maritime Transportation Stations With Cooperative Mobile Robots and UAVs
Direct visualization of cryptographic keys for enhanced security
Distortion metrics for predicting authentication functionality of printed security deterrents
DNS Rebinding Threat Modeling and security Analysis for Local Area Network of Maritime Transportation Systems
Document Images Watermarking for security Issue using Fully Convolutional Networks
Dramatic Loss of Agricultural Land Due to Urban Expansion Threatens Food security in the Nile Delta, Egypt
Dual Modulated QR Codes for Proximal Privacy and security
Ecological security Assessment of Grain-for-Green Program Typical Areas in Northern China Based on Multi-Source Remote Sensing Data
Ecological security Pattern and Its Constraint on Urban Expansion of a Black Soil Farming Area in Northeast China, The
Ecological security Patterns at Different Spatial Scales on the Loess Plateau
Editorial Special Issue on Application of Advanced Intelligent Methods in Vehicle to Smart Grid Communications: security, Reliability, and Resiliency
Editorial: Research advances in computer graphics and multimedia security
Effect of saturated pixels on security of steganographic schemes for digital images
efficient privacy protection scheme for data security in video surveillance, An
Efficient security Mediated Certificateless Signature Scheme, An
Efficient security System for CABAC Bin-Strings of H.264/SVC, An
Embedded face and biometric technologies for national and border security
Embedded Intelligence for Safety and security Machine Vision Applications
Emotion-Aware Multimedia Systems security
Empirical evaluation of combining unobtrusiveness and security requirements in multimodal biometric systems
End-to-End Object Separation for Threat Detection in Large-Scale X-Ray security Images
End-To-End security for Video Distribution: The Combination of Encryption, Watermarking, and Video Adaptation
Enhanced decision-making for public safety and security: The multi-agency situational awareness system initiative
Enhanced Federated Learning for Edge Data security in Intelligent Transportation Systems
Enhancing biometric security with wavelet quantization watermarking based two-stage multimodal authentication
Enhancing Login security Through the Use of Keystroke Input Dynamics
Error-Diffused Image security Improving Using Overall Minimal-Error Searching
Estimating Yields of Household Fields in Rural Subsistence Farming Systems to Study Food security in Burkina Faso
Evaluation and Improvement of Digital Watermarking Algorithm Based on Cryptographic security Models
Evaluation Framework for Electric Vehicle security Risk Assessment
evaluation of deep learning based object detection strategies for threat object detection in baggage security imagery, An
Evaluation of Food security Based on Remote Sensing Data: Taking Egypt as an Example
evaluation of region based object detection strategies within X-ray baggage security imagery, An
Explosive Cyber security Threats During COVID-19 Pandemic and a Novel Tree-Based Broad Learning System to Overcome
Explosives detection systems (EDS) for aviation security
Fine-Grained Access Control and security Approach for Intelligent Vehicular Transport in 6G Communication System, A
Flip visual cryptography (FVC) with perfect security, conditionally-optimal contrast, and no expansion
Food Vulnerability And Alluvial Farming for Food security in Central Dry Zone Area of Myanmar
Forgery Quality and Its Implications for Behavioral Biometric security
Formal Approach to Design and security Verification of Operating Systems for Intelligent Transportation Systems Based on Object Model, A
Fragile image watermarking using a gradient image for improved localization and security
Further comments on SFVCC: Chaotic map-based security framework for vehicular cloud computing
Gabriella: An Online System for Real-Time Activity Detection in Untrimmed security Videos
Global Monitoring For Food security And Sustainable Land Management - Recent Advances Of Remote Sensing Applications To African And Siberian Show Cases
GSM Based security Analysis for Add-SS Watermarking
GTSM: Graph-Transient security Model for Intelligent Transportation System Information Exchange
Guest Editorial Introduction to the Special Issue on Large-Scale Video Analytics for Enhanced security: Algorithms and Systems
Guest Editorial security, Reliability, and Safety in IoT-Enabled Maritime Transportation Systems
Halftone-Image security Improving Using Overall Minimal-Error Searching
Handbook of Remote Biometrics for Surveillance and security
Hierarchical Image Authentication Watermark with Improved Localization and security, A
High security Iris verification system based on random secret integration
How Many Facilities are Needed? Evaluating Configurations of Subway security Check Systems via a Hybrid Queueing Model
Human face classification for security system
Human face security system using alternative linear discriminant analysis based classifier
hybrid fusion method of fingerprint identification for high security applications, A
iBotGuard: an Internet-based Intelligent Robot security system using Invariant Face Recognition against intruder
Identifying deficits of visual security metrics for images
Identifying Ecological security Patterns Meeting Future Urban Expansion in Changsha-Zhuzhou-Xiangtan Urban Agglomeration, China
IEEE security and Privacy Magazine
IEEE Trans. Information security Forensics
IEEE Transactions on Information Forensics and security
illuminance-reflectance nonlinear video enhancement model for homeland security applications, An
Image Encryption and Compression for Medical Image security
Image security system using recursive cellular automata substitution
Imaging for Forensics and security: From Theory to Practice
Impact of Image Choices on the Usability and security of Click Based Graphical Passwords, The
implementation and performance evaluation of a space variant OT-MACH filter for a security detection application using FLIR sensor, An
Improve security of fragile watermarking via parameterized wavelet
Improving Physical Layer security in Vehicles and Pedestrians Networks With Ambient Backscatter Communication
Improving the security of LTE-R for High-Speed Railway: From the Access Authentication View
In)security of an Efficient Fingerprinting Scheme with Symmetric and Commutative Encryption of IWDW 2005
Indexing-Min-Max Hashing: Relaxing the security-Performance Tradeoff for Cancelable Fingerprint Templates
Indistinguishability of Compressed Encryption With Circulant Matrices for Wireless security
Information security Display Technology with Multi-view Effect
Information security display via uncrowded window
Information Theoretic Framework for Biometric security Systems, An
Installation for quality control of printed sheets, especially security paper
Institute for the Protection and security of the Citizen
integrated surveillance system for outdoor security, An
Integrated UAV-Based Real-Time Mapping for security Applications
Intelligence and security informatics for homeland security: information, communication, and transportation
Intelligence and security informatics for homeland security: information, communication, and transportation
Intelligent CCTV for Mass Transport security: Challenges and Opportunities for Video and Face Processing
Intelligent Data security Threat Discovery Model Based on Grid Data
Intelligent Video security System Using Object Tracking and Shape Recognition, An
Interactive Montages of Sprites for Indexing and Summarizing security Video
Interative Grahical User Interface for Maritime security Services, An
International Workshop on Recent Advances in Digital security: Biometrics and Forensics
Internet of things assisted public security management platform for urban transportation using hybridised cryptographic-integrated steganography
Interpretable security analysis of cancellable biometrics using constrained-optimized similarity-based attack
Introduction to the special issue on robustness, security and regulation aspects in current biometric systems (RSRA-BS)
Intrusion Detection and Network Information security Based on Deep Learning Algorithm in Urban Rail Transit Management System
Invariant characterization of DOVID security features using a photometric descriptor
IoT-based Smart Environments: State of the Art, security Threats and Solutions
Iris Biometric security Challenges and Possible Solutions: For your eyes only? Using the iris as a key
Iris Biometrics: From Segmentation to Template security
Iris imaging telephone security module and method
Join Cryptography and Digital Watermarking for 3D Multiresolution Meshes security
Joint security and performance enhancement for secure arithmetic coding
Joint security and Resources Allocation Scheme Design in Edge Intelligence Enabled CBTCs: A Two-Level Game Theoretic Approach
Joint security and robustness enhancement for quantization based data embedding
Joint security and robustness enhancement for quantization embedding
Joint Task Offloading, Resource Allocation, and security Assurance for Mobile Edge Computing-Enabled UAV-Assisted VANETs
Joint Watermarking-Encryption-ECC for Patient Record security in Wavelet Domain
Knowledge-Based Framework for Image Enhancement in Aviation security, A
Land-Use Optimization Based on Ecological security Pattern: A Case Study of Baicheng, Northeast China
Landscape Ecological Risk and Ecological security Pattern Construction in World Natural Heritage Sites: A Case Study of Bayinbuluke, Xinjiang, China
Large Encrypting Binary Images with Higher security
Large group activity security risk assessment and risk early warning based on random forest algorithm
Learning an video frame-based face detection system for security fields
Learning-Based Object Identification and Segmentation Using Dual-Energy CT Images for security
Lightweight Privacy-Preserving System for the security of Remote Sensing Images on IoT, A
Lip biometric template security framework using spatial steganography
Localisation algorithm for security access control in railway communications
Localization and security Enhancement of Block-based Image Authentication
Lossless ROI Medical Image Watermarking Technique with Enhanced security and High Payload Embedding
Low-Power security Modules Optimized for WSNs
Machine Authentication of security Documents
Machine Learning Algorithms for Modeling and Mapping of Groundwater Pollution Risk: A Study to Reach Water security and Sustainable Development (Sdg) Goals in a Mediterranean Aquifer System
Many-Objective Optimization Based Intrusion Detection for in-Vehicle Network security
Materials-based 3D segmentation of unknown objects from dual-energy computed tomography imagery in baggage security screening
Method and apparatus for uniquely identifying individuals by particular physical characteristics and security system utilizing the same
Method and apparatus to reduce false alarms in exit/entrance situations for residential security monitoring
Method to Enhance Face Biometric security, A
Methodology for Mapping the Ecological security Pattern and Ecological Network in the Arid Region of Xinjiang, China
Metro railway security algorithms with realworld experience adapted to the RATP dataset
Mind Your Mind: EEG-Based Brain-Computer Interfaces and Their security in Cyber Space
Modeling IrisCode and Its Variants as Convex Polyhedral Cones and Its security Implications
Modified twofish algorithm for increasing security and efficiency in the encryption of video signals
Monitoring Services for Food security: Successful Transfer of Technology to the Sudanese Government
Motion compensation of submillimeter wave 3D imaging radar data for security screening
Multi-biometric template protection: A security analysis of binarized statistical features for bloom filters on smartphones
Multi-Source Hydrological Data Products to Monitor High Asian River Basins and Regional Water security
Multi-Task Semantic Segmentation Network for Threat Detection in X-Ray security Images, A
Multi-type relational clustering for enterprise cyber-security networks
Multi-user Based Watermarking System with Two-security-Level Keys, A
Multi-view Object Detection Using Epipolar Constraints within Cluttered X-ray security Imagery
Multibiometric Template security Using Fuzzy Vault
Multimedia Content Representation, Classification and security
Multimedia content security with random key generation approach in cloud computing
Multimodal Biometrics for Enhanced Mobile Device security
Multitier Biometric Template security Using Cryptographic Salts and Personal Image Identification
Natural Revocability in Handwritten Signatures to Enhance Biometric security
NDFT-based Audio Watermarking Scheme with High security
Network friendly media security: rationales, solutions, and open issues
Network optimization using defender system in cloud computing security based intrusion detection system withgame theory deep neural network (IDSGT-DNN)
Network security Using Biometric and Cryptography
new approach towards increased security in cyber-physical systems, A
new cryptographic primitive for noise tolerant template security, A
New Fractional Random Wavelet Transform for Fingerprint security, A
New GAN-Based Anomaly Detection (GBAD) Approach for Multi-Threat Object Classification on Large-Scale X-Ray security Images, A
New JPEG Steganographic Scheme with High security Performance
New security Scheme based on Palmprint Biometrics for Signature, A
NoSQL-SQL Hybrid Organization and Management Approach for Real-Time Geospatial Data: A Case Study of Public security Video Surveillance, A
Novel SCAN-CA-based image security system using SCAN and 2-D von Neumann cellular automata
Novel security Framework for Medical Data in IoT Ecosystems, A
novel selective encryption scheme for H.264/AVC video with improved visual security, A
Novel Spatial-Temporal Multi-Scale Alignment Graph Neural Network security Model for Vehicles Prediction, A
Novel walk-through imaging system for security screening
Object classification in 3D baggage security computed tomography imagery using visual codebooks
Object detection in security applications using dominant edge directions
On Automatic Authenticity Verification of Printed security Documents
On biometric encryption using fingerprint and it's security evaluation
On intelligent surveillance systems and face recognition for mass transport security
On Perception and Reality in Wireless Air Traffic Communication security
On privacy and security in distributed visual sensor networks
On security and Sparsity of Linear Classifiers for Adversarial Settings
On security Enhancement of Steganography via Generative Adversarial Image
On security Notions of Steganographic Systems
On the Feasibility of Split Learning, Transfer Learning and Federated Learning for Preserving security in ITS Systems
On the Interrelation of security, QoS, and Safety in Cooperative ITS
On the security defects of an image encryption scheme
On the security of a Hybrid SVD-DCT Watermarking Method Based on LPSNR
On the security of a new image encryption scheme based on a chaotic function
On the security of a visual cryptography scheme for color images
On the security of an image encryption method
On the security of an MPEG-Video Encryption Scheme Based on Secret Huffman Tables
On The security of Block Permutation and Co-XOR in Reversible Data Hiding
On the security of Block Scrambling-Based EtC Systems against Extended Jigsaw Puzzle Solver Attacks
On the security of multiple Huffman table based encryption
On the security of Networked Control Systems in Smart Vehicle and Its Adaptive Cruise Control
On the security of non-forgeable robust hash functions
On the security of Secret Sharing Over a Ring and the Fast Implementation
On the security of singular value based watermarking
On the security of the digest function in the SARI image authentication system
On the security of the SARI image authentication system
Optical coherence tomography used for security and fingerprint-sensing applications
Optical fingerprint security verification using separate target and reference planes and a uniqueness comparison scheme
Optical Techniques for Information security
Optics and Photonics for security and Defense
Optimal Aviation security Screening Strategies With Dynamic Passenger Risk Updates
Optimized security Algorithms for Intelligent and Autonomous Vehicular Transportation Systems
Over-Complete-Dictionary-Based Improved Spread Spectrum Watermarking security
overview of concealed weapons detection for homeland security, An
overview of through the wall surveillance for homeland security, An
Partial-NOMA Based Physical Layer security: Forwarding Design and Secrecy Analysis
Passenger acceptance of counter-terrorism security measures in stations
Performance and security-enhanced fuzzy vault scheme based on ridge features for distorted fingerprints
Performance of Transmit Antenna Selection Physical Layer security Schemes
Performing Attack Halting Process with Digital Pattern and Proactive Model Resolving the security Issues in IoT Based Models
Person search over security video surveillance systems using deep learning methods: A review
Personal digital bodyguards for e-security, e-learning and e-health: A prospective survey
Personal security in travel by public transport: The role of traveller information and associated technologies
PHY Layer security Based on Protected Zone and Artificial Noise
Physically Based Object Contour Edge Display Using Adjustable Linear Polarization Ratio for Passive Millimeter-Wave security Imaging
Portable information security display system via Spatial PsychoVisual Modulation
Potential Fish Ground Breeding Area Based On Localized Criteria For Sustainable Food security
Practical security Architecture for In-Vehicle CAN-FD, A
Practical security of Non-Invertible Watermarking Schemes
Practical Wireless Attack on the Connected Car and security Protocol for In-Vehicle CAN, A
Predicting Detection Performance on security X-Ray Images as a Function of Image Quality
Privacy and security Issues Related to Match Scores
proposal for a person/photograph distinction method with applications to security systems, A
Protection motivation theory using multi-factor authentication for providing security over social networking sites
Public security Video and Image Analysis Challenge: A Retrospective
Quantifying the Impacts of the 2020 Flood on Crop Production and Food security in the Middle Reaches of the Yangtze River, China
Quantitative Model Construction for Sustainable security Patterns in Social-Ecological Links Using Remote Sensing and Machine Learning
Railway Cyber-security in the Era of Interconnected Systems: A Survey
Re-Evaluation of the security of a Family of Image Diffusion Mechanisms
Real time security framework for detecting abnormal events at ATM installations
Real-time airport security checkpoint surveillance using a camera network
Redundant image representations in security applications
Reliable and Fast Fingerprint Identification for security Applications
Remote Sensing for International Peace and security: Its Role and Implications
Remote Sensing from Space: Supporting International Peace and security
Remotely Sensed Ecological Protection Redline and security Pattern Construction: A Comparative Analysis of Pingtan (China) and Durban (South Africa)
Renewable Minutiae Templates with Tunable Size and security
Research about security mechanism in wireless sensor network
Research Hotspots Analysis of E-commerce security in China
Research on security Defense of Coupled Transportation and Cyber-Physical Power System Based on the Static Bayesian Game
RETRACTED: Analysis of security operation and maintenance system using privacy utility in media environment
Reversible adversarial steganography for security enhancement
Reversible watermarking technique to enhance security of a biometric authentication system
Review of Remote Sensing Challenges for Food security with Respect to Salinity and Drought Threats, A
Revocable Fingerprint Biotokens: Accuracy and security Analysis
Ring oscillator as confusion- diffusion agent: A complete TRNG drove image security
Risk evaluation system of navigation security based on coupled wind and wave model: a case of study of Qiongzhou strait
Robust fingerprint verification for enhancing security in healthcare system
robust watermarking approach against high-density salt and pepper noise (RWSPN) to enhance medical image security, A
robust watermarking approach for security issue of binary documents using fully convolutional networks, A
RWSC-Fusion: Region-Wise Style-Controlled Fusion Network for the Prohibited X-ray security Image Synthesis
Safety, security, and Reliability of Autonomous Vehicle Software
Scalable Aural-Visual Environment for security Event Monitoring, Analysis, and Response, A
Scalable security and Conditional Access Control for Multiple Regions of Interest in Scalable Video Coding
Scheme for Enhancing security Using Multiple Fingerprints and the Fuzzy Vault, A
Sclera Vessel Analysis for Biometric System on Real Time security Application
Secure Relay and Jammer Selection for Physical Layer security
security analysis and improvement of some biometric protected templates based on Bloom filters
security analysis for key generation systems using face images
security analysis for privacy preserving search of multimedia
security Analysis for Spread-Spectrum Watermarking Incorporating Statistics of Natural Images
security analysis of a cancelable iris recognition system based on block remapping
security analysis of a three-dimensional rotation-based image encryption
security Analysis of Biometric Template Protection Schemes, A
security Analysis of Impostor Attempts with Respect to Gender in Gait Biometrics
security Analysis of Key Binding Biometric Cryptosystems
security Analysis of Multimedia Encryption Schemes Based on Multiple Huffman Table
security Analysis on Spatial +/- 1 Steganography for JPEG Decompressed Images
security and Accuracy Trade-off in Anonymous Fingerprint Recognition
security and Privacy Concerns in Information Usability
security and privacy enhanced smartphone-based gait authentication with random representation learning and digital lockers
security and Privacy for Augmented Reality Systems
security and Privacy for Distributed Multimedia Sensor Networks
security and Privacy in a Blockchain-Powered Access Control System for Low Emission Zones
security and Privacy in Distributed Smart Cameras
security and Privacy Review of VANETs, A
security and Robustness Enhancement for Image Data Hiding
security and Watermarking of Multimedia Contents
security aspects in education oriented multimedia networks
security Assessment of Selectively Encrypted Visual Data: Iris Recognition on Protected Samples
security augmentation grounded on Fresnel and Arnold transforms using hybrid chaotic structured phase mask
security authentication with a three-dimensional optical phase code using random forest classifier
security Automation Through a Multi-processing Real-Time System for the Re-Identification of Persons
security Challenges in Vehicular Cloud Computing
security Consideration for Deep Learning-Based Image Forensics
security Credential Management System for V2X Communications, A
security design for Instant Messaging system based on RSA and triple DES
security Enhanced Authentication Protocol for Space-Ground Integrated Railway Networks
security enhancement by adopting the chaotic system for wavelet tree based digital image watermarking
security Enhancement for Real-Time Parallel In-Vehicle Applications by CAN FD Message Authentication
security Enhancement of Visual Hashes Through Key Dependent Wavelet Transformations
security Enhancement via Device-to-Device Communication in Cellular Networks
security evaluation for communication-friendly encryption of multimedia
security evaluation of biometric authentication systems under real spoofing attacks
security evaluation of informed watermarking schemes
security Fence Inspection at Airports Using Object Detection
security identification system
security identification system 2
security in Brain-Computer Interfaces: State-of-the-Art, Opportunities, and Future Challenges
security in IoT-Enabled Digital Twins of Maritime Transportation Systems
security in smart cities: A brief review of digital forensic schemes for biometric data
security in Vehicle Networks, VANET
security measurement of a medical communication scheme based on chaos and DNA coding
security Models of Digital Watermarking
security of an Ill-Posed Operator for Image Authentication
security of Autonomous Driving: Threats, Defenses, and Future Directions, The
security of digital entertainment content from creation to consumption
security of Digital Images Based on 3D Arnold Cat Map and Elliptic Curve
security of Facial Forensics Models Against Adversarial Attacks
security of MVD-based 3D video in 3D-HEVC using data hiding and encryption
security of the Medical Media Using a Hybrid and Multiple Watermark Technique
security Study of Routing Attacks in Vehicular Ad-Hoc Networks (Autonomous Car)
security Study of Routing Attacks in Vehicular Ad-Hoc Networks (Vanets)
security Threats In Smart Healthcare
security Vulnerabilities and Protection Algorithms for Backpressure-Based Traffic Signal Control at an Isolated Intersection
security-Aware Information Dissemination With Fine-Grained Access Control in Cooperative Multi-RSU of VANETs
security-Enhanced Certificateless Conditional Privacy-Preserving Authentication Scheme for Vehicular Ad Hoc Networks, A
security-Enhanced Fuzzy Fingerprint Vault Based on Minutiae's Local Ridge Information
security-oriented picture-in-picture visual modifications
Seeing Through the Data: A Statistical Evaluation of Prohibited Item Detection Benchmark Datasets for X-ray security Screening
Selection of Temporal Features for Event Detection in Smart security
Selective and adaptive signal hiding technique for security of JPEG2000
Sensing the Risk: New Approaches and Technologies for Protection and security of Cultural Heritage. The PRO_CULT Project
SFVCC: Chaotic map-based security framework for vehicular cloud computing
Side-Channel security Analysis of Connected Vehicle Communications Using Hidden Markov Models
simple and efficient approach for medical image security using chaos on EZW, A
SIXray: A Large-Scale security Inspection X-Ray Benchmark for Prohibited Item Discovery in Overlapping Images
Smart City security Issues: the Main Attacks and Countermeasures
Smart Home Personal Assistants: A security and Privacy Review
Smoothing security Prices
socio-technical approach for event detection in security critical infrastructure, A
Solving the security Problem of Intelligent Transportation System With Deep Learning
Spatiotemporal Dynamics of Ecological security Pattern of Urban Agglomerations in Yangtze River Delta Based on LUCC Simulation
Speaker identification security improvement by means of speech watermarking
Special Issue on Image security: secure imaging--is it necessary?
Special issue on Medical Image Communication, Computing and security
Special section on image and video processing for security
Spherical Harmonics-LSB-quantification Adaptive Watermarking Approach for 3D Multiresolution Meshes security, A
Standoff video analysis for the detection of security anomalies in vehicles
Statistical Analysis of IrisCode and Its security Implications, A
Steganographic security Analysis From Side Channel Steganalysis and Its Complementary Attacks
SteganoPIN: Two-Faced Human-Machine Interface for Practical Enforcement of PIN Entry security
Study of Smart Campus Environment and Its security Attacks, A
study on security evaluation methodology for image-based biometrics authentication systems, A
study on security performance of YASS, A
Study on the security Levels of Spread-Spectrum Embedding Schemes in the WOA Framework, A
Support for effective use of multiple video streams in security
Survey of Air, Sea, and Road Vehicles Research for Motion Control security
Survey of security and Privacy Issues in V2X Communication Systems, A
survey on behavior analysis in video surveillance for homeland security applications, A
Survey on Cyber security Threats in IoT-Enabled Maritime Industry, A
Survey on Cyber-security of Connected and Autonomous Vehicles (CAVs), A
Survey on Recent Advances in Vehicular Network security, Trust, and Privacy, A
Suspicious Multi-Object Detection and Recognition Method for Millimeter Wave SAR security Inspection Images Based on Multi-Path Extraction Network, A
system-level security approach for heterogeneous MPSoCs, A
Systematic Survey: security Threats to UAV-Aided IoT Applications, Taxonomy, Current Challenges and Requirements With Future Research Directions, A
Targeted attack and security enhancement on texture synthesis based steganography
Teaching Computer Vision and Its Societal Effects: A Look at Privacy and security Issues from the Students' Perspective
Technology, applications and innovations in physical security: A home office perspective
Terahertz Spectroscopy and Imaging for Defense and security Applications
Thesholding and Character Recognition in security Documents with Watermarked Background
Three-dimensional imaging of hold baggage for airport security
Topological Analysis of Criminal Activity Networks: Enhancing Transportation security
Toward Physical Layer security and Efficiency for SAGIN: A WFRFT-Based Parallel Complex-Valued Spectrum Spreading Approach
Towards automatic threat detection: A survey of advances of deep learning within X-ray security imaging
Towards Real-world X-ray security Inspection: A High-Quality Benchmark And Lateral Inhibition Module For Prohibited Items Detection
Tracking Passengers and Baggage Items Using Multiple Overhead Cameras at security Checkpoints
Transfer learning using convolutional neural networks for object classification within X-ray baggage security imagery
Triple-Bit Quantization with Asymmetric Distance for Image Content security
TrustCAM: security and Privacy-Protection for an Embedded Smart Camera Based on Trusted Computing
Trusted Data Communication And security Issues in GNSS Network Of Turkey
Two level security for medical images using watermarking/encryption algorithms
UAV-Assisted Physical Layer security in Multi-Beam Satellite-Enabled Vehicle Communications
Upgrading security and protection in ear biometrics
Using behavior analysis algorithms to anticipate security threats before they impact mission critical operations
Using Continuous Face Verification to Improve Desktop security
Utilizing Geospatial Data for Assessing Energy security: Mapping Small Solar Home Systems Using Unmanned Aerial Vehicles and Deep Learning
Vehicular Edge Computing: Architecture, Resource Management, security, and Challenges
Vehicular security access system
video analysis framework for soft biometry security surveillance, A
Video Processing for security, Surveillance and Monitoring
Video security for Ambient Intelligence
Virtual special issue on advances in digital security: Biometrics and forensics
Vision and Displays for Military and security Applications: The Advanced Deployable Day/Night Simulation Project
Visual security Evaluation of Perceptually Encrypted Images Based on Image Importance
Vulnerability of pixel-value differencing steganography to histogram analysis and modification for enhanced security
Watermark security Via Wavelet Filter Parametrization
Watermarking Attack: security of WSS Techniques
When security games hit traffic: A deployed optimal traffic enforcement system
Window of visibility inspired security lighting system
Wireless Sensor Network: Towards An Improvement of security Policy
Witsenhausen's Counterexample and Its Links with Multimedia security Problems
Wolf Attack Probability: A New security Measure in Biometric Authentication Systems
483 for security

_securityp_
Cryptanalysis of a data securityp protection scheme for VoIP

Index for "s"


Last update: 2-May-24 21:06:23
Use price@usc.edu for comments.