_ | secure | _ |
Achieving a Decentralized and | secure | Cab Sharing System Using Blockchain Technology |
Adaptive | secure | Watermarking Scheme Using Double Random-Phase Encoding Technique, An |
Advanced framework for highly | secure | and cloud-based storage of colour images |
AI-Enabled Cryptographic Key Management Model for | secure | Communications in the Internet of Vehicles |
Application of Full-Duplex Wireless Technique into | secure | MIMO Communication: Achievable Secrecy Rate based Optimization |
Architectural Principles for | secure | Streaming and Secure Adaptation in the Developing Scalable Video Coding (SVC) Standard |
Architectural Principles for | secure | Streaming and Secure Adaptation in the Developing Scalable Video Coding (SVC) Standard |
Artificial Noise Aided Hybrid Precoding Design for | secure | mmWave MISO Systems With Partial Channel Knowledge |
Attribute-Based | secure | Data Aggregation for Isolated IoT-Enabled Maritime Transportation Systems |
Bayesian Approach to Spread Spectrum Watermark Detection and | secure | Copyright Protection for Digital Image Libraries, A |
Beamforming for | secure | Wireless Information and Power Transfer in Terrestrial Networks Coexisting With Satellite Networks |
Binary feature fusion for discriminative and | secure | multi-biometric cryptosystems |
Blockchain and Learning-Based | secure | and Intelligent Task Offloading for Vehicular Fog Computing |
Blockchain Empowered | secure | Video Sharing With Access Control for Vehicular Edge Computing |
Blockchain-Based Authentication Scheme and | secure | Architecture for IoT-Enabled Maritime Transportation Systems, A |
Blockchain-based Iris Authentication in Order to | secure | Iot Access and Digital Money Spending |
Blockchain-Based | secure | Communication of Intelligent Transportation Digital Twins System |
Blockchain-Based | secure | Computation Offloading in Vehicular Networks |
Blockchain-Based | secure | Mist Computing Network Architecture for Intelligent Transportation Systems |
BlockEV: Efficient and | secure | Charging Station Selection for Electric Vehicles |
BPR: Blockchain-Enabled Efficient and | secure | Parking Reservation Framework With Block Size Dynamic Adjustment Method |
Cancelable Biometrics Vault: A | secure | Key-Binding Biometric Cryptosystem based on Chaffing and Winnowing |
Cancelable indexing based on low-rank approximation of correlation-invariant random filtering for fast and | secure | biometric identification |
Chaotic Synchronization and | secure | Communication Using Contraction Theory |
class of authentication digital watermarks for | secure | multimedia communication, A |
Coding Aspects of | secure | GNSS Receivers |
Collusion-Traceable | secure | Multimedia Distribution Based on Controllable Modulation |
Combination of Symmetric Hash Functions for | secure | Fingerprint Matching |
Combined | secure | approach based on whale optimization to improve the data classification for data analytics |
Comments on A | secure | and Lightweight Drones-Access Protocol for Smart City Surveillance |
Comments on Dual Authentication and Key Management Techniques for | secure | Data Transmission in Vehicular Ad Hoc Networks |
Compression-Then-Encryption-Based | secure | Watermarking Technique for Smart Healthcare System |
Compressive Sensing Based | secure | Watermark Detection and Privacy Preserving Storage Framework, A |
Constructing Immune Cover for | secure | Steganography Based on an Artificial Immune System Approach |
Constructing Immunized Stego-Image for | secure | Steganography via Artificial Immune System |
Construction of a Bayesian decision theory-based | secure | multimodal fusion framework for soft biometric traits |
Cooperative Precoding for Wireless Energy Transfer and | secure | Cognitive Radio Coexistence Systems |
Cooperative | secure | Beamforming for AF Relay Networks With Multiple Eavesdroppers |
Data Ownership and | secure | Medical Data Transmission using Optimal Multiple Key-Based Homomorphic Encryption with Hyperledger Blockchain |
DECENT: Decentralized and Efficient Key Management to | secure | Communication in Dense and Dynamic Environments |
Deep Learning-Based Blockchain Mechanism for | secure | Internet of Drones Environment, A |
Deep | secure | Encoding for Face Template Protection |
Deep-NC: A | secure | image transmission using deep learning and network coding |
DeepDIST: A Black-Box Anti-Collusion Framework for | secure | Distribution of Deep Models |
DePass: A | secure | hash-based authentication scheme |
Design and Analysis of | secure | Distributed Estimator for Vehicular Platooning in Adversarial Environment |
Design and ARM-Embedded Implementation of a Chaotic Map-Based Real-Time | secure | Video Communication System |
Design and FPGA implementation of a wireless hyperchaotic communication system for | secure | real-time image transmission |
Design and FPGA-Based Realization of a Chaotic | secure | Video Communication System |
Design of Provably | secure | Authentication Protocol for Edge-Centric Maritime Transportation System |
Designing a | secure | and Scalable Service Model Using Blockchain and MQTT for IoT Devices |
Determining Achievable Rates for | secure | , Zero Divergence, Steganography |
Diffie-Hellman process and its use in | secure | and authenticated VC networks |
DisBezant: | secure | and Robust Federated Learning Against Byzantine Attack in IoT-Enabled MTS |
Distortion Design for | secure | Adaptive 3-D Mesh Steganography |
Distributed Adaptive Platoon | secure | Control on Unmanned Vehicles System for Lane Change Under Compound Attacks |
Distributed | secure | Platoon Control of Connected Vehicles Subject to DoS Attack: Theory and Application |
Dither-based | secure | image hashing using distributed coding |
Dual Authentication and Key Management Techniques for | secure | Data Transmission in Vehicular Ad Hoc Networks |
Dynamic Keypad: Digit Shuffling for | secure | PIN Entry in a Virtual World |
Dynamic signature verification for | secure | retrieval of classified information |
Edge-Centric | secure | Service Provisioning in IoT-Enabled Maritime Transportation Systems |
Efficient and Physically | secure | Privacy-Preserving Key-Agreement Protocol for Vehicular Ad-Hoc Network, An |
efficient and | secure | cipher scheme for images confidentiality preservation, An |
Efficient and | secure | cipher scheme with dynamic key-dependent mode of operation |
Efficient and | secure | Identity-Based Signature System for Underwater Green Transport System, An |
Efficient and | secure | Image Communication System Based on Compressed Sensing for IoT Monitoring Applications |
Efficient and | secure | Routing Protocol Based on Artificial Intelligence Algorithms With UAV-Assisted for Vehicular Ad Hoc Networks in Intelligent Transportation Systems |
Efficient Group Handover Authentication for | secure | 5G-Based Communications in Platoons |
Efficient Privacy-Preserving Dual Authentication and Key Agreement Scheme for | secure | V2V Communications in an IoV Paradigm |
Efficiently | secure | image transmission against tampering in wireless visual sensor networks |
Enabling Better Medical Image Classification Through | secure | Collaboration |
Enabling Manageable and | secure | Hybrid P2P-CDN Video-on-Demand Streaming Services Through Coordinating Blockchain and Zero Knowledge |
Enabling | secure | and Fast Indexing for Privacy-Assured Healthcare Monitoring via Compressive Sensing |
Energy-Efficient and | secure | Beamforming for Self-Sustainable Relay-Aided Multicast Networks |
ENSEI: Efficient | secure | Inference via Frequency-Domain Homomorphic Convolution for Privacy-Preserving Visual Recognition |
Event-Based Distributed | secure | Control of Unmanned Surface Vehicles With DoS Attacks |
Event-Based | secure | Leader-Following Consensus Control for Multiagent Systems With Multiple Cyber Attacks |
FALCON: A Fourier Transform Based Approach for Fast and | secure | Convolutional Neural Network Predictions |
Fast and | secure | Multihop Broadcast Solutions for Intervehicular Communication |
Fast and | secure | Real-Time Video Encryption |
Fast and | secure | Steganography Based on J-UNIWARD |
Feature transformation of biometric templates for | secure | biometric systems based on error correcting codes |
Feeling Is Believing: A | secure | Template Exchange Protocol |
Finding a | secure | Place: A Map-Based Crowdsourcing System for People With Autism |
Fingerprint Multicast in | secure | Video Streaming |
Fingerprint shell: | secure | representation of fingerprint template |
Flexible and | secure | Cross-Domain Signcrypted Data Authorization in Multi-Platoon Vehicular Networks |
Future Intelligent and | secure | Vehicular Network Toward 6G: Machine-Learning Approaches |
Generating provably | secure | cancelable fingerprint templates based on correlation-invariant random filtering |
Guest Editorial Introduction to the Special Issue on Deep Learning Models for Safe and | secure | Intelligent Transportation Systems |
Hand-based multimodal identification system with | secure | biometric template storage |
HAP and UAVs Collaboration Framework for Uplink | secure | Rate Maximization in NOMA-Enabled IoT Networks, An |
Hardware Implementation of Fingerprint Verification for | secure | Biometric Authentication Systems, A |
Hierarchical watermarking for | secure | image authentication with localization |
High capacity and | secure | digital steganography to palette-based images |
Highly Transparent and | secure | Scheme for Concealing Text Within Audio |
Histogram-Based Intrusion Detection and Filtering Framework for | secure | and Safe In-Vehicle Networks |
Hybrid N-Inception-LSTM-Based Aircraft Coordinate Prediction Method for | secure | Air Traffic |
Hyperchaotic Synchronization | secure | Communication Based on State Observer |
Identity-Based Authentication Mechanism for | secure | Information Sharing in the Maritime Transport System |
ill-posed operator for | secure | image authentication, An |
Image fingerprinting system based on collusion | secure | code and watermarking method |
Image Recapture Prevention Using | secure | Display Schemes on Polarized 3D System |
Image Representation Using Voronoi Tessellation: Adaptive and | secure | |
Improved Selective Encryption Techniques for | secure | Transmission of MPEG Video Bit-Streams |
improved spread transform dither modulation for robust and | secure | watermarking, An |
Improved Spread Transform Dither Modulation: A New Modulation Technique for | secure | Watermarking |
Intelligent and | secure | Clustering in Wireless Sensor Network (WSN)-Based Intelligent Transportation Systems |
Intelligent Reflecting Surfaces Assisted | secure | Transmission Without Eavesdropper's CSI |
Introducing | secure | modes of operation for optical encryption |
Investigating the Prospect of Leveraging Blockchain and Machine Learning to | secure | Vehicular Networks: A Survey |
JC-BioAPI Compliant Smart Card with Biometrics for | secure | Access Control, A |
Joint Cooperative Beamforming and Jamming to | secure | AF Relay Systems With Individual Power Constraint and No Eavesdropper's CSI |
Joint | secure | Design of Downlink and D2D Cooperation Strategies for Multi-User Systems |
Joint | secure | Offloading and Resource Allocation for Vehicular Edge Computing Network: A Multi-Agent Deep Reinforcement Learning Approach |
Joint security and performance enhancement for | secure | arithmetic coding |
Joint Transmit and Reflective Beamformer Design for | secure | Estimation in IRS-Aided WSNs |
KeyEncoder: A | secure | and usable EEG-based cryptographic key generation mechanism |
Leveraging the Mixed-Text Segmentation Problem to Design | secure | Handwritten CAPTCHAs |
Marriage of Cryptography and Watermarking: Beneficial and Challenging for | secure | Watermarking and Detection, The |
MIMO Beamforming for | secure | and Energy-Efficient Wireless Communication |
Multi party | secure | data access management in cloud using user centric block chain data encryption |
Multimodal Fusion-Based Image Hiding Algorithm for | secure | Healthcare System |
Near-Optimal Time Function for | secure | Dynamic Visual Cryptography |
new class of image registration for guaranteeing | secure | data management, A |
New | secure | Image Transmission Technique via Secret-Fragment-Visible Mosaic Images by Nearly Reversible Color Transformations, A |
NOMA-Assisted | secure | Offloading for Vehicular Edge Computing Networks With Asynchronous Deep Reinforcement Learning |
Novel and | secure | plaintext-related image encryption algorithm based on compressive sensing and tent-sine system |
Novel Graph-Based Machine Learning Technique to | secure | Smart Vehicles in Intelligent Transportation Systems |
Novel | secure | H.264 Transcoder using Selective Encryption, A |
Observer based discrete-time chaotic systems synchronization for | secure | image transmission |
Obtaining cryptographic keys using feature level fusion of iris and face biometrics for | secure | user authentication |
On | secure | VANET-Based Ad Dissemination With Pragmatic Cost and Effect Control |
On the Elliptic Curve Cryptography for Privacy-Aware | secure | ACO-AODV Routing in Intent-Based Internet of Vehicles for Smart Cities |
On the Optimal Linear Network Coding Design for Information Theoretically | secure | Unicast Streaming |
On the Performance of | secure | Full-Duplex Relaying under Composite Fading Channels |
On the provably | secure | CEW based on orthogonal decomposition |
On the | secure | Energy Efficiency of TAS/MRC With Relaying and Jamming Strategies |
Optimal Parameter Design for Estimation Theoretic | secure | Broadcast |
Optimal Power Allocation for | secure | Estimation of Multiple Parameters |
Optimal Transmission Topology Construction and | secure | Linear Network Coding Design for Virtual-Source Multicast With Integral Link Rates |
Optimal Transport for | secure | Spread-Spectrum Watermarking of Still Images |
Outage-Aware | secure | Beamforming in MISO Wireless Interference Networks |
PASS: Privacy aware | secure | signature scheme for surveillance systems |
Passive Beamforming and Trajectory Optimization for Reconfigurable Intelligent Surface-Assisted UAV | secure | Communication |
Performance Evaluation for | secure | Communications in Mobile Internet of Vehicles With Joint Reactive Jamming and Eavesdropping Attacks |
Privacy preserving biometric-based remote authentication with | secure | processing unit on untrusted server |
Privacy Protected Surveillance Using | secure | Visual Object Coding |
Privacy protecting visual processing for | secure | video surveillance |
Privacy-Preserving Biometric Identification Using | secure | Multiparty Computation: An Overview and Recent Trends |
Privacy-Preserving-Based | secure | Framework Using Blockchain-Enabled Deep-Learning in Cooperative Intelligent Transport System, A |
Producing | secure | multimodal biometric descriptors using artificial neural networks |
Provably | secure | and Anonymous V2I and V2V Authentication Protocol for VANETs |
Provably | secure | Generative Steganography Based on Autoregressive Model |
Provably | secure | Mobile User Authentication Scheme for Big Data Collection in IoT-Enabled Maritime Intelligent Transportation System, A |
Provably | secure | Robust Image Steganography |
Provably | secure | Steganography: Achieving Zero K-L Divergence using Statistical Restoration |
Quality-Optimized and | secure | End-to-End Authentication for Media Delivery |
QueryCom: | secure | Message Communication and Data Searching Protocols for Smart Transportation |
Random and Adversarial Bit Error Robustness: Energy-Efficient and | secure | DNN Accelerators |
Rank-Two Beamformed | secure | Multicasting for Wireless Information and Power Transfer |
Reliable and | secure | Distributed Smart Road Pricing System for Smart Cities |
Remote Sensing Images | secure | Distribution Scheme Based on Deep Information Hiding |
Reply to Comments on Dual Authentication and Key Management Techniques for | secure | Data Transmission in Vehicular Ad Hoc Networks |
Research on | secure | Transmission Performance of Electric Vehicles Under Nakagami-m Channel |
Robust AN-Aided | secure | Transmission Scheme in MISO Channels with Simultaneous Wireless Information and Power Transfer |
Robust and | secure | Data Hiding for PDF Text Document |
Robust and | secure | fractional wavelet image watermarking |
Robust and | secure | Image Fingerprinting Learned by Neural Network |
robust and | secure | perceptual hashing system based on a quantization step analysis, A |
Robust and | secure | Transmission over Insecure Channel through Higher Level Bit Replacement |
Robust biometric authentication system with a | secure | user template |
Robust image identification with | secure | features for JPEG images |
Robust Reversible Watermarking in Encrypted Image With | secure | Multi-Party Based on Lightweight Cryptography |
Robust | secure | Transmit Design in MIMO Channels with Simultaneous Wireless Information and Power Transfer |
Rotation-Invariant | secure | Image Watermarking Algorithm Incorporating Steerable Pyramid Transform, A |
SAGENT: a novel technique for document modeling for | secure | access and distribution |
Scrambling-based tool for | secure | protection of JPEG images |
SDSS: | secure | Data Sharing Scheme for Edge Enabled IoV Networks |
| secure | Adaptive Control for Cooperative Driving of Autonomous Connected Vehicles in the Presence of Heterogeneous Communication Delays and Cyberattacks, A |
| secure | algorithm for biometric-based digital image watermarking in DCT domain, A |
| secure | and Disambiguating Approach for Generative Linguistic Steganography, A |
| secure | and Efficient Authenticated Key Management Scheme for UAV-Assisted Infrastructure-Less IoVs |
| secure | and Efficient Authentication Scheme for Access Control in Mobile Pay-TV Systems, A |
| secure | and Efficient Blockchain-Based Knowledge Sharing for Intelligent Connected Vehicles |
| secure | and Efficient Data Sharing Among Vehicles Based on Consortium Blockchain |
| secure | and Efficient Transmissions of Fingerprint Images for Embedded Processors |
| secure | and Intelligent Framework for Vehicle Health Monitoring Exploiting Big-Data Analytics, A |
| secure | and Lightweight Drones-Access Protocol for Smart City Surveillance, A |
| secure | and Localizing Watermarking Technique for Image Authentication, A |
| secure | and Non-Blind Watermarking Scheme for Color Images |
| secure | and Practical Sample-then-lock Scheme for Iris Recognition, A |
| secure | and Privacy-Preserving Smartphone-Based Traffic Information Systems |
| secure | and Privacy-Preserving Technique Based on Contrast-Enhancement Reversible Data Hiding and Plaintext Encryption for Medical Images, A |
| secure | and Robust Authentication Scheme for Video Transcoding, A |
| secure | and Robust Digital Watermarking Technique by the Block Cipher Rc6 and Secure Hash Algorithm, A |
| secure | and Robust Digital Watermarking Technique by the Block Cipher Rc6 and Secure Hash Algorithm, A |
| secure | and robust host-adapted color image watermarking using inter-layered wavelet-packets |
| secure | and Robust Iris Recognition Using Random Projections and Sparse Representations |
| secure | and robust SIFT with resistance to chosen-plaintext attack |
| secure | and Robust Two-Phase Image Authentication |
| secure | and Temporary Access Delegation With Equality Test for Cloud-Assisted IoV |
| secure | Arrays for Digital Watermarking |
| secure | Authentication and Key Management Protocol for Deployment of Internet of Vehicles (IoV) Concerning Intelligent Transport Systems |
| secure | authentication watermarking for halftone and binary images, A |
| secure | Beamforming in Downlink MIMO Nonorthogonal Multiple Access Networks |
| secure | Binary Image Steganography Based on Fused Distortion Measurement |
| secure | Binary Image Steganography With Distortion Measurement Based on Prediction |
| secure | biometric template generation for multi-factor authentication |
| secure | Biometric Templates from Fingerprint-Face Features |
| secure | Biometrics: Concepts, Authentication Architectures, and Challenges |
| secure | Blind Image Steganographic Technique Using Discrete Fourier Transformation |
| secure | Blockchain Enabled V2V Communication System Using Smart Contracts, A |
| secure | chaotic dual encryption scheme for H.264/AVC video conferencing protection |
| secure | Client Side Watermarking with Limited Key Size |
| secure | collaboration using Slepian-Wolf codes |
| secure | Communications With Asymptotically Gaussian Compressed Encryption |
| secure | computing with the MPEG RVC framework |
| secure | Content Delivery for Connected and Autonomous Trucks: A Coalition Formation Game Approach |
| secure | Data Sharing With Flexible Cross-Domain Authorization in Autonomous Vehicle Systems |
| secure | Decentralized Image Classification With Multiparty Homomorphic Encryption |
| secure | delivery of images over open networks |
| secure | digital camera based fingerprint verification system, A |
| secure | Digital Watermarking Scheme for MPEG-2 Video Copyright Protection, A |
| secure | distortion computation among untrusting parties using homomorphic encryption |
| secure | Distributed Adaptive Platooning Control of Automated Vehicles Over Vehicular Ad-Hoc Networks Under Denial-of-Service Attacks |
| secure | Distribution Scheme for Compressed Data Streams |
| secure | Dynamic Mix Zone Pseudonym Changing Scheme Based on Traffic Context Prediction, A |
| secure | ear biometrics using circular kernel principal component analysis, Chebyshev transform hashing and Bose-Chaudhuri-Hocquenghem error-correcting codes |
| secure | Fingerprint Authentication with Homomorphic Encryption |
| secure | fingerprint embedding based on modified GDFT based parametric transform |
| secure | Fingerprint Matching with External Registration |
| secure | Fingerprint Matching with Generic Local Structures |
| secure | fingerprint template generation mechanism using visual secret sharing with inverse halftoning, A |
| secure | Fragile Digital Watermarking Technique for Image Authentication |
| secure | FSM-based arithmetic codes |
| secure | Halftone Image Steganography Based on Feature Space and Layer Embedding |
| secure | high capacity full-gray-scale-level multi-image information hiding and secret image authentication scheme via Tchebichef moments, A |
| secure | high capacity tetris-based scheme for data hiding |
| secure | Identification Documents Via Pattern Recognition and Public-key Cryptography |
| secure | identity and access management system for decentralising user data using blockchain, A |
| secure | image authentication algorithm with pixel-level tamper localization, A |
| secure | Image Filtering |
| secure | image hashing via minimum distortion estimation |
| secure | image sharing scheme based on SVD and Fractional Fourier Transform, A |
| secure | Image Watermarking Based on LWT and SVD |
| secure | Intelligent System for Internet of Vehicles: Case Study on Traffic Forecasting, A |
| secure | Internet-Based Personal Identity Verification System Using Lossless Watermarking and Fingerprint Recognition, A |
| secure | Iris Recognition Based on Local Intensity Variations |
| secure | JPEG steganography by LSB+ matching and multi-band embedding |
| secure | latent fingerprint storage and self-recovered reconstruction using POB number system |
| secure | Lightweight Texture Encryption Scheme, A |
| secure | media streaming and secure adaptation for non-scalable video |
| secure | media streaming and secure adaptation for non-scalable video |
| secure | media streaming mechanism combining encryption, authentication, and transcoding, A |
| secure | Medical Image Encryption for Remote Virtual Doctor System Based On H-IoT Applications Over 5G Network: a Comparison Study |
| secure | medical images based on data hiding using a hybrid scheme with the Hamming code, LSB, and OPAP |
| secure | Minutiae-Based Fingerprint Templates Using Random Triangle Hashing |
| secure | model on Advanced Fake Image-Feature Network (AFIFN) based on deep learning for image forgery detection, A |
| secure | MQ coder: An efficient way to protect JPEG 2000 images in wireless multimedia sensor networks |
| secure | Multicast Transmission for Massive MIMO With Statistical Channel State Information |
| secure | multicasting of images via joint privacy-preserving fingerprinting, decryption, and authentication |
| secure | Multilayer Perceptron Based on Homomorphic Encryption |
| secure | multimodal biometric system based on diffused graphs and optimal score fusion |
| secure | Multimodal Biometric Verification Scheme, A |
| secure | OMP Computation Maintaining Sparse Representations and Its Application to EtC Systems |
| secure | Outsourced SIFT: Accurate and Efficient Privacy-Preserving Image SIFT Feature Extraction |
| secure | Privacy-Preserving V2V Communication in 5G-V2X Supporting Network Slicing |
| secure | Protocol for Data Hiding in Compressed Fingerprint Images, A |
| secure | Quantization Index Modulation Watermark Detection |
| secure | Quaternion Feistel Cipher for DICOM Images |
| secure | real-time image protection scheme with near-duplicate detection in cloud computing |
| secure | Relay and Jammer Selection for Physical Layer Security |
| secure | remote matching with privacy: Scrambled support vector vaulted verification (S2V3) |
| secure | Reversible Image Data Hiding Over Encrypted Domain via Key Modulation |
| secure | reversible visible image watermarking with authentication |
| secure | Robust JPEG Steganography Based on AutoEncoder With Adaptive BCH Encoding |
| secure | scalable streaming and secure transcoving with JPEG2000 |
| secure | scalable streaming and secure transcoving with JPEG2000 |
| secure | Scalable Streaming Enabling Transcoding Without Decryption |
| secure | Self-Recovery Image Authentication Using Randomly-Sized Blocks |
| secure | semi-blind watermarking based on iteration mapping and image features |
| secure | Service Offloading for Internet of Vehicles in SDN-Enabled Mobile Edge Computing |
| secure | Similar Image Matching (SESIM): An Improved Privacy Preserving Image Retrieval Protocol over Encrypted Cloud Database |
| secure | Smart Homes: Opportunities and Challenges |
| secure | speech biometric templates for user authentication |
| secure | Spread Image Watermarking Scheme in 3D-DCT Domain |
| secure | spread spectrum watermarking for images, audio and video |
| secure | Spread Spectrum Watermarking for Multimedia |
| secure | spread-spectrum data embedding with PN-sequence masking |
| secure | Steganographic Scheme against Statistical Analyses, A |
| secure | storage and matching of latent fingerprints using phase shifting digital holography |
| secure | Traffic Monitoring With Spatio-Temporal Metadata Protection Using Oblivious RAM |
| secure | transcoders for single layer video data |
| secure | transcoding for compressive multimedia sensing |
| secure | transcoding with JPSEC confidentiality and authentication |
| secure | transfer of medical images using hybrid encryption: Authentication, confidentiality, integrity |
| secure | Transmission in Cellular V2X Communications Using Deep Q-Learning |
| secure | Transmission in Cooperative Networks with Weak Eavesdroppers |
| secure | Transmission Scheme Based on Joint Radar and Communication in Mobile Vehicular Networks |
| secure | Transmissions via Compressive Sensing in Multicarrier Systems |
| secure | transport and adaptation of MC-EZBC video utilizing H.264-based transport protocols |
| secure | V2V and V2I Technologies for the Next-Generation Intelligent Transportation Systems |
| secure | Vehicular Communications With Varying QoS and Environments: A Unified Cross-Layer Policy-Adaptation Approach |
| secure | video distribution scheme based on partial encryption |
| secure | Video Multicast Based on Desynchronized Fingerprint and Partial Encryption |
| secure | Video Watermarking via Embedding Strength Modulation |
| secure | Watermark Embedding Through Partial Encryption |
| secure | Watermarking for JPEG-2000, A |
| secure | Watermarking for Multimedia Content Protection: A Review of its Benefits and Open Issues |
| secure | watermarking scheme against watermark attacks in the encrypted domain |
| secure | watermarking technique without loss of robustness, A |
| secure | wavelet transform, The |
| secure | Wireless Communication via Movable-Antenna Array |
| secure | , Intelligent Electric Vehicle Ecosystem for Safe Integration With the Smart Grid, A |
self-embedding | secure | fragile watermarking scheme with high quality recovery, A |
SEMBA: | secure | multi-biometric authentication |
Sensar: | secure | (tm) Iris Identification System |
Short N- | secure | Fingerprinting Code for Image |
Simultaneous Encryption and Compression of Digital Images Based on | secure | -JPEG Encoding |
SIRC: A | secure | Incentive Scheme for Reliable Cooperative Downloading in Highway VANETs |
Smart Software | secure | s Surveillance Systems |
SP-CIDS: | secure | and Private Collaborative IDS for VANETs |
Special Issue on Image security: | secure | imaging--is it necessary? |
Special issue on real time biometrics and | secure | media |
SSDA: | secure | Source-Free Domain Adaptation |
Statistical Meta-Analysis of Presentation Attacks for | secure | Multibiometric Systems |
Statistical Restoration for Robust and | secure | Steganography |
Survey on Post-Quantum Public-Key Signature Schemes for | secure | Vehicular Communications, A |
SviaB: | secure | and verifiable multi-instance iris remote authentication using blockchain |
Symmetric hash functions for | secure | fingerprint biometric systems |
System For A New 2-Dimensional Code: | secure | 2D Code, A |
Tamper-Resistant Broadcasting Scheme for | secure | Communication in Internet of Autonomous Vehicles, A |
Theoretical Framework for Constructing Matching Algorithms | secure | against Wolf Attack, A |
Three measures for | secure | palmprint identification |
Topological Approach to | secure | Message Dissemination in Vehicular Networks, A |
Toward a Novel LSB-based Collusion- | secure | Fingerprinting Schema for 3D Video |
Toward a | secure | Public-key Blockwise Fragile Authentication Watermarking |
Toward Encrypted Cloud Media Center With | secure | Deduplication |
Toward | secure | public-key blockwise fragile authentication watermarking |
TRAMS: A | secure | Vehicular Crowdsensing Scheme Based on Multi-Authority Attribute-Based Signature |
Transportation 5.0: The DAO to Safe, | secure | , and Sustainable Intelligent Transportation Systems |
TrustStream: A | secure | and Scalable Architecture for Large-Scale Internet Media Streaming |
Two-Phase Anomaly Detection Model for | secure | Intelligent Transportation Ride-Hailing Trajectories, A |
Unconditionally provably | secure | cancellable biometrics based on a quotient polynomial ring |
User-Centred System for End-to-End | secure | Multimedia Content Delivery: From Content Annotation to Consumer Consumption, A |
VIRSBS project: Visual intelligent recognition for | secure | banking services, The |
Virtual Community Based | secure | Service Discovery and Access for 3D Video Streaming Applications |
W-EHR: A Wireless Distributed Framework for | secure | Dissemination of Electronic Healthcare Records |
Watermarking in | secure | image retrieval |
Wavelet-Based Fragile Watermarking Scheme for | secure | Image Authentication, A |
Wearables-Fashion With a Purpose: A New Generation of Wearable Devices Uses Signal Processing to Make Life Easier, Healthier, and More | secure | [Special Reports] |
Web-Based | secure | System for the Distributed Printing of Documents and Images, A |
Workshop on Research and Innovation for | secure | Societies |
355 for secure
_ | security | _ |
25th ICPR: Real-time Visual Surveillance as-a-Service (VSaaS) for smart | security | solutions |
3D Imaging for Safety and | security | |
3D Modeling of Indoor Environments for a Robotic | security | Guard |
3D Sensors Provide | security | , Better Games |
3D Site Modelling and Verification of Plant Design for Nuclear | security | Applications |
3D Visual | security | (3DVS) score to measure the visual security level of selectively encrypted 3D objects, A |
3D Visual | security | (3DVS) score to measure the visual security level of selectively encrypted 3D objects, A |
5G Vehicle-to-Everything Services: Gearing Up for | security | and Privacy |
AACS-compatible multimedia joint encryption and fingerprinting: | security | issues and some solutions |
Access control system with high level | security | using fingerprints |
Accuracy Assessment of Global Food | security | -Support Analysis Data (GFSAD) Cropland Extent Maps Produced at Three Different Spatial Resolutions |
Activity Analysis for Video | security | Systems |
Adaptation-aware encryption of scalable H.264/AVC video for content | security | |
Adaptive Network | security | System for IoT-Enabled Maritime Transportation, An |
Adaptive | security | for Human Surveillance Using Multimodal Open Set Biometric Recognition |
Advanced 3D Imaging for Safety and | security | |
Adversarial Biometric Recognition: A review on biometric system | security | from the adversarial machine-learning perspective |
Airborne 3D imaging possibilities for defense and | security | |
Airborne Based High Performance Crowd Monitoring for | security | Applications |
Analysis of the | security | of Perceptual Image Hashing Based on Non-Negative Matrix Factorization |
Analysis of Time-multiplexed | security | Videos |
Anomaly Detection in Radiation Sensor Data With Application to Transportation | security | |
Application of human facial features recognition to automobile | security | and convenience |
Applied image processing to multimedia information | security | |
AR-Based Hologram Detection on | security | Documents Using a Mobile Phone |
Assessment of Forest Ecological | security | in China Based on DPSIRM Model: Taking 11 Provincial Administrative Regions along the Yangtze River Basin as Examples |
Attention-based prohibited item detection in X-ray images during | security | checking |
Automatic Segmentation of Unknown Objects, with Application to Baggage | security | |
Automotive | security | : Threat Forewarning and ECU Source Mapping Derived From Physical Features of Network Signals |
Autonomous Vehicle: | security | by Design |
Autonomous Vehicles | security | : Challenges and Solutions Using Blockchain and Artificial Intelligence |
Ballistic Ground Penetrating Radar Equipment for Blast-Exposed | security | Applications |
Behavioral | security | in Covert Communication Systems |
Beyond Smart Homes: An In-Depth Analysis of Smart Aging Care System | security | |
Biometric Authentication: System | security | and User Privacy |
Biometric ontology for semantic biometric-as-a-service (BaaS) applications: a border | security | use case |
Biometric Recognition: | security | and Privacy Concerns |
Biometric | security | Application for Person Authentication Using Retinal Vessel Feature |
Biometric Systems Utilising Health Data from Wearable Devices: Applications and Future Challenges in Computer | security | |
Biometric User Authentication for Heightened Information | security | |
Biometrics | security | and Privacy Protection, From the Guest Editors |
Biometrics, Privacy Issues, | security | Issues |
Biometrics: A New Era in | security | |
Biometrics: In Search of Identity and | security | (Q & A) |
Blind Watermarking Scheme Based on Visual Model for Copyright | security | , A |
Blockchain in Big Data | security | for Intelligent Transportation With 6G |
Blockchain-Based Cyber-Physical | security | for Electrical Vehicle Aided Smart Grid Ecosystem |
Bright and Dark Sides of Computer Vision: Challenges and Opportunities for Privacy and | security | , The |
Buffer Occupancy Feedback | security | Control and Changing Encryption Keys to Protect MOD Services |
Building an intelligent video and image analysis evaluation platform for public | security | |
Camera Array Management Based on UPnP | security | |
Camera Placement Based on Vehicle Traffic for Better City | security | Surveillance |
Cancelable Iris template generation by aggregating patch level ordinal relations with its holistically extended performance and | security | analysis |
CBTC | security | and Reliability Enhancements by a Key-Based Direct Sequence Spread Spectrum Technique |
Chaff point generation mechanism for improving fuzzy vault | security | |
Changes in Croplands as a Result of Large Scale Mining and the Associated Impact on Food | security | Studied Using Time-Series Landsat Images |
Cloud Multimedia Data | security | by Optimization-Assisted Cryptographic Technique |
Cloud | security | based attack detection using transductive learning integrated with Hidden Markov Model |
Cognitive AmBC-NOMA IoV-MTS Networks With IQI: Reliability and | security | Analysis |
Combining Multiple Matchers for a High | security | Fingerprint Verification System |
Comment on SFVCC: Chaotic map-based | security | framework for vehicular cloud computing |
Communication | security | Analysis of Intelligent Transportation System Using 5G Internet of Things From the Perspective of Big Data |
comprehensive | security | analysis of match-in-database fingerprint biometric system, A |
Comprehensive survey on | security | services in vehicular ad-hoc networks |
Computer Vision for Homeland | security | : A Perspective on its Promise and Pitfalls |
Computer-access | security | systems using keystroke dynamics |
Consortium Blockchain-Based | security | and Efficient Resource Trading in V2V-Assisted Intelligent Transport Systems |
Construction and Analysis of Ecological | security | Patterns in the Southern Anhui Region of China from a Circuit Theory Perspective |
Construction and Optimization of Ecological | security | Pattern in the Loess Plateau of China Based on the Minimum Cumulative Resistance (MCR) Model |
Construction of an Ecological | security | Pattern in an Urban-Lake Symbiosis Area: A Case Study of Hefei Metropolitan Area |
Construction of an Ecological | security | Pattern in Rapidly Urbanizing Areas Based on Ecosystem Sustainability, Stability, and Integrity |
Construction of Ecological | security | Pattern under Rapid Urbanization in the Loess Plateau: A Case Study of Taiyuan City, The |
Construction of Regional Ecological | security | Patterns Based on Multi-Criteria Decision Making and Circuit Theory |
content | security | protection scheme in JPEG compressed domain, A |
Convolutional Neural Network for Visual | security | Evaluation |
Cooperative Location-Sensing Network Based on Vehicular Communication | security | Against Attacks |
Cooperative Precoding and Artificial Noise Design for | security | Over Interference Channels |
Coprime Blur Scheme for Data | security | in Video Surveillance, A |
cost effective method for automobile | security | based on detection and recognition of human face, A |
Cost Reassignment for Improving | security | of Adaptive Steganography Using an Artificial Immune System |
Critical Infrastructure | security | Against Drone Attacks Using Visual Analytics |
Cross-modal Image Synthesis within Dual-Energy X-ray | security | Imagery |
Crowdsensing Multimedia Data: | security | and Privacy Issues |
Crypto-compression scheme based on the DWT for medical image | security | |
Data | security | based on homographic function |
Data | security | Through Zero-Knowledge Proof and Statistical Fingerprinting in Vehicle-to-Healthcare Everything (V2HX) Communications |
Data-Driven Cyber | security | in Perspective: Intelligent Traffic Analysis |
Data-driven multimedia forensics and | security | |
Dataset | security | for Machine Learning: Data Poisoning, Backdoor Attacks, and Defenses |
Decision-Support System for Safety and | security | Assessment and Management in Smart Cities |
Deep Learning Based Semi-Supervised Control for Vertical | security | of Maglev Vehicle With Guaranteed Bounded Airgap |
Deep Learning for | security | in Digital Twins of Cooperative Intelligent Transportation Systems |
Defeating Lattice-Based Data Hiding Code Via Decoding | security | Hole |
Design of Blockchain enabled intrusion detection model for detecting | security | attacks using deep learning |
Detecting hidden objects: | security | imaging using millimetre-waves and terahertz |
Detection of people in military and | security | context images |
Development of Smart Cities in Taiwan From The Perspective of Cloud Computing | security | |
Development of Spatial Model for Food | security | Prediction Using Remote Sensing Data in West Java, Indonesia |
Differential Fault Attack on | security | Vehicle System Applied SIMON Block Cipher, A |
Differential | security | Barriers for Virtual Emotion Detection in Maritime Transportation Stations With Cooperative Mobile Robots and UAVs |
Direct visualization of cryptographic keys for enhanced | security | |
Distortion metrics for predicting authentication functionality of printed | security | deterrents |
DNS Rebinding Threat Modeling and | security | Analysis for Local Area Network of Maritime Transportation Systems |
Document Images Watermarking for | security | Issue using Fully Convolutional Networks |
Dramatic Loss of Agricultural Land Due to Urban Expansion Threatens Food | security | in the Nile Delta, Egypt |
Dual Modulated QR Codes for Proximal Privacy and | security | |
Ecological | security | Assessment of Grain-for-Green Program Typical Areas in Northern China Based on Multi-Source Remote Sensing Data |
Ecological | security | Pattern and Its Constraint on Urban Expansion of a Black Soil Farming Area in Northeast China, The |
Ecological | security | Patterns at Different Spatial Scales on the Loess Plateau |
Editorial Special Issue on Application of Advanced Intelligent Methods in Vehicle to Smart Grid Communications: | security | , Reliability, and Resiliency |
Editorial: Research advances in computer graphics and multimedia | security | |
Effect of saturated pixels on | security | of steganographic schemes for digital images |
efficient privacy protection scheme for data | security | in video surveillance, An |
Efficient | security | Mediated Certificateless Signature Scheme, An |
Efficient | security | System for CABAC Bin-Strings of H.264/SVC, An |
Embedded face and biometric technologies for national and border | security | |
Embedded Intelligence for Safety and | security | Machine Vision Applications |
Emotion-Aware Multimedia Systems | security | |
Empirical evaluation of combining unobtrusiveness and | security | requirements in multimodal biometric systems |
End-to-End Object Separation for Threat Detection in Large-Scale X-Ray | security | Images |
End-To-End | security | for Video Distribution: The Combination of Encryption, Watermarking, and Video Adaptation |
Enhanced decision-making for public safety and | security | : The multi-agency situational awareness system initiative |
Enhanced Federated Learning for Edge Data | security | in Intelligent Transportation Systems |
Enhancing biometric | security | with wavelet quantization watermarking based two-stage multimodal authentication |
Enhancing Login | security | Through the Use of Keystroke Input Dynamics |
Error-Diffused Image | security | Improving Using Overall Minimal-Error Searching |
Estimating Yields of Household Fields in Rural Subsistence Farming Systems to Study Food | security | in Burkina Faso |
Evaluation and Improvement of Digital Watermarking Algorithm Based on Cryptographic | security | Models |
Evaluation Framework for Electric Vehicle | security | Risk Assessment |
evaluation of deep learning based object detection strategies for threat object detection in baggage | security | imagery, An |
Evaluation of Food | security | Based on Remote Sensing Data: Taking Egypt as an Example |
evaluation of region based object detection strategies within X-ray baggage | security | imagery, An |
Explosive Cyber | security | Threats During COVID-19 Pandemic and a Novel Tree-Based Broad Learning System to Overcome |
Explosives detection systems (EDS) for aviation | security | |
Fine-Grained Access Control and | security | Approach for Intelligent Vehicular Transport in 6G Communication System, A |
Flip visual cryptography (FVC) with perfect | security | , conditionally-optimal contrast, and no expansion |
Food Vulnerability And Alluvial Farming for Food | security | in Central Dry Zone Area of Myanmar |
Forgery Quality and Its Implications for Behavioral Biometric | security | |
Formal Approach to Design and | security | Verification of Operating Systems for Intelligent Transportation Systems Based on Object Model, A |
Fragile image watermarking using a gradient image for improved localization and | security | |
Further comments on SFVCC: Chaotic map-based | security | framework for vehicular cloud computing |
Gabriella: An Online System for Real-Time Activity Detection in Untrimmed | security | Videos |
Global Monitoring For Food | security | And Sustainable Land Management - Recent Advances Of Remote Sensing Applications To African And Siberian Show Cases |
GSM Based | security | Analysis for Add-SS Watermarking |
GTSM: Graph-Transient | security | Model for Intelligent Transportation System Information Exchange |
Guest Editorial Introduction to the Special Issue on Large-Scale Video Analytics for Enhanced | security | : Algorithms and Systems |
Guest Editorial | security | , Reliability, and Safety in IoT-Enabled Maritime Transportation Systems |
Halftone-Image | security | Improving Using Overall Minimal-Error Searching |
Handbook of Remote Biometrics for Surveillance and | security | |
Hierarchical Image Authentication Watermark with Improved Localization and | security | , A |
High | security | Iris verification system based on random secret integration |
How Many Facilities are Needed? Evaluating Configurations of Subway | security | Check Systems via a Hybrid Queueing Model |
Human face classification for | security | system |
Human face | security | system using alternative linear discriminant analysis based classifier |
hybrid fusion method of fingerprint identification for high | security | applications, A |
iBotGuard: an Internet-based Intelligent Robot | security | system using Invariant Face Recognition against intruder |
Identifying deficits of visual | security | metrics for images |
Identifying Ecological | security | Patterns Meeting Future Urban Expansion in Changsha-Zhuzhou-Xiangtan Urban Agglomeration, China |
IEEE | security | and Privacy Magazine |
IEEE Trans. Information | security | Forensics |
IEEE Transactions on Information Forensics and | security | |
illuminance-reflectance nonlinear video enhancement model for homeland | security | applications, An |
Image Encryption and Compression for Medical Image | security | |
Image | security | system using recursive cellular automata substitution |
Imaging for Forensics and | security | : From Theory to Practice |
Impact of Image Choices on the Usability and | security | of Click Based Graphical Passwords, The |
implementation and performance evaluation of a space variant OT-MACH filter for a | security | detection application using FLIR sensor, An |
Improve | security | of fragile watermarking via parameterized wavelet |
Improving Physical Layer | security | in Vehicles and Pedestrians Networks With Ambient Backscatter Communication |
Improving the | security | of LTE-R for High-Speed Railway: From the Access Authentication View |
In) | security | of an Efficient Fingerprinting Scheme with Symmetric and Commutative Encryption of IWDW 2005 |
Indexing-Min-Max Hashing: Relaxing the | security | -Performance Tradeoff for Cancelable Fingerprint Templates |
Indistinguishability of Compressed Encryption With Circulant Matrices for Wireless | security | |
Information | security | Display Technology with Multi-view Effect |
Information | security | display via uncrowded window |
Information Theoretic Framework for Biometric | security | Systems, An |
Installation for quality control of printed sheets, especially | security | paper |
Institute for the Protection and | security | of the Citizen |
integrated surveillance system for outdoor | security | , An |
Integrated UAV-Based Real-Time Mapping for | security | Applications |
Intelligence and | security | informatics for homeland security: information, communication, and transportation |
Intelligence and | security | informatics for homeland security: information, communication, and transportation |
Intelligent CCTV for Mass Transport | security | : Challenges and Opportunities for Video and Face Processing |
Intelligent Data | security | Threat Discovery Model Based on Grid Data |
Intelligent Video | security | System Using Object Tracking and Shape Recognition, An |
Interactive Montages of Sprites for Indexing and Summarizing | security | Video |
Interative Grahical User Interface for Maritime | security | Services, An |
International Workshop on Recent Advances in Digital | security | : Biometrics and Forensics |
Internet of things assisted public | security | management platform for urban transportation using hybridised cryptographic-integrated steganography |
Interpretable | security | analysis of cancellable biometrics using constrained-optimized similarity-based attack |
Introduction to the special issue on robustness, | security | and regulation aspects in current biometric systems (RSRA-BS) |
Intrusion Detection and Network Information | security | Based on Deep Learning Algorithm in Urban Rail Transit Management System |
Invariant characterization of DOVID | security | features using a photometric descriptor |
IoT-based Smart Environments: State of the Art, | security | Threats and Solutions |
Iris Biometric | security | Challenges and Possible Solutions: For your eyes only? Using the iris as a key |
Iris Biometrics: From Segmentation to Template | security | |
Iris imaging telephone | security | module and method |
Join Cryptography and Digital Watermarking for 3D Multiresolution Meshes | security | |
Joint | security | and performance enhancement for secure arithmetic coding |
Joint | security | and Resources Allocation Scheme Design in Edge Intelligence Enabled CBTCs: A Two-Level Game Theoretic Approach |
Joint | security | and robustness enhancement for quantization based data embedding |
Joint | security | and robustness enhancement for quantization embedding |
Joint Task Offloading, Resource Allocation, and | security | Assurance for Mobile Edge Computing-Enabled UAV-Assisted VANETs |
Joint Watermarking-Encryption-ECC for Patient Record | security | in Wavelet Domain |
Knowledge-Based Framework for Image Enhancement in Aviation | security | , A |
Land-Use Optimization Based on Ecological | security | Pattern: A Case Study of Baicheng, Northeast China |
Landscape Ecological Risk and Ecological | security | Pattern Construction in World Natural Heritage Sites: A Case Study of Bayinbuluke, Xinjiang, China |
Large Encrypting Binary Images with Higher | security | |
Large group activity | security | risk assessment and risk early warning based on random forest algorithm |
Learning an video frame-based face detection system for | security | fields |
Learning-Based Object Identification and Segmentation Using Dual-Energy CT Images for | security | |
Lightweight Privacy-Preserving System for the | security | of Remote Sensing Images on IoT, A |
Lip biometric template | security | framework using spatial steganography |
Localisation algorithm for | security | access control in railway communications |
Localization and | security | Enhancement of Block-based Image Authentication |
Lossless ROI Medical Image Watermarking Technique with Enhanced | security | and High Payload Embedding |
Low-Power | security | Modules Optimized for WSNs |
Machine Authentication of | security | Documents |
Machine Learning Algorithms for Modeling and Mapping of Groundwater Pollution Risk: A Study to Reach Water | security | and Sustainable Development (Sdg) Goals in a Mediterranean Aquifer System |
Many-Objective Optimization Based Intrusion Detection for in-Vehicle Network | security | |
Materials-based 3D segmentation of unknown objects from dual-energy computed tomography imagery in baggage | security | screening |
Method and apparatus for uniquely identifying individuals by particular physical characteristics and | security | system utilizing the same |
Method and apparatus to reduce false alarms in exit/entrance situations for residential | security | monitoring |
Method to Enhance Face Biometric | security | , A |
Methodology for Mapping the Ecological | security | Pattern and Ecological Network in the Arid Region of Xinjiang, China |
Metro railway | security | algorithms with realworld experience adapted to the RATP dataset |
Mind Your Mind: EEG-Based Brain-Computer Interfaces and Their | security | in Cyber Space |
Modeling IrisCode and Its Variants as Convex Polyhedral Cones and Its | security | Implications |
Modified twofish algorithm for increasing | security | and efficiency in the encryption of video signals |
Monitoring Services for Food | security | : Successful Transfer of Technology to the Sudanese Government |
Motion compensation of submillimeter wave 3D imaging radar data for | security | screening |
Multi-biometric template protection: A | security | analysis of binarized statistical features for bloom filters on smartphones |
Multi-Source Hydrological Data Products to Monitor High Asian River Basins and Regional Water | security | |
Multi-Task Semantic Segmentation Network for Threat Detection in X-Ray | security | Images, A |
Multi-type relational clustering for enterprise cyber- | security | networks |
Multi-user Based Watermarking System with Two- | security | -Level Keys, A |
Multi-view Object Detection Using Epipolar Constraints within Cluttered X-ray | security | Imagery |
Multibiometric Template | security | Using Fuzzy Vault |
Multimedia Content Representation, Classification and | security | |
Multimedia content | security | with random key generation approach in cloud computing |
Multimodal Biometrics for Enhanced Mobile Device | security | |
Multitier Biometric Template | security | Using Cryptographic Salts and Personal Image Identification |
Natural Revocability in Handwritten Signatures to Enhance Biometric | security | |
NDFT-based Audio Watermarking Scheme with High | security | |
Network friendly media | security | : rationales, solutions, and open issues |
Network optimization using defender system in cloud computing | security | based intrusion detection system withgame theory deep neural network (IDSGT-DNN) |
Network | security | Using Biometric and Cryptography |
new approach towards increased | security | in cyber-physical systems, A |
new cryptographic primitive for noise tolerant template | security | , A |
New Fractional Random Wavelet Transform for Fingerprint | security | , A |
New GAN-Based Anomaly Detection (GBAD) Approach for Multi-Threat Object Classification on Large-Scale X-Ray | security | Images, A |
New JPEG Steganographic Scheme with High | security | Performance |
New | security | Scheme based on Palmprint Biometrics for Signature, A |
NoSQL-SQL Hybrid Organization and Management Approach for Real-Time Geospatial Data: A Case Study of Public | security | Video Surveillance, A |
Novel SCAN-CA-based image | security | system using SCAN and 2-D von Neumann cellular automata |
Novel | security | Framework for Medical Data in IoT Ecosystems, A |
novel selective encryption scheme for H.264/AVC video with improved visual | security | , A |
Novel Spatial-Temporal Multi-Scale Alignment Graph Neural Network | security | Model for Vehicles Prediction, A |
Novel walk-through imaging system for | security | screening |
Object classification in 3D baggage | security | computed tomography imagery using visual codebooks |
Object detection in | security | applications using dominant edge directions |
On Automatic Authenticity Verification of Printed | security | Documents |
On biometric encryption using fingerprint and it's | security | evaluation |
On intelligent surveillance systems and face recognition for mass transport | security | |
On Perception and Reality in Wireless Air Traffic Communication | security | |
On privacy and | security | in distributed visual sensor networks |
On | security | and Sparsity of Linear Classifiers for Adversarial Settings |
On | security | Enhancement of Steganography via Generative Adversarial Image |
On | security | Notions of Steganographic Systems |
On the Feasibility of Split Learning, Transfer Learning and Federated Learning for Preserving | security | in ITS Systems |
On the Interrelation of | security | , QoS, and Safety in Cooperative ITS |
On the | security | defects of an image encryption scheme |
On the | security | of a Hybrid SVD-DCT Watermarking Method Based on LPSNR |
On the | security | of a new image encryption scheme based on a chaotic function |
On the | security | of a visual cryptography scheme for color images |
On the | security | of an image encryption method |
On the | security | of an MPEG-Video Encryption Scheme Based on Secret Huffman Tables |
On The | security | of Block Permutation and Co-XOR in Reversible Data Hiding |
On the | security | of Block Scrambling-Based EtC Systems against Extended Jigsaw Puzzle Solver Attacks |
On the | security | of multiple Huffman table based encryption |
On the | security | of Networked Control Systems in Smart Vehicle and Its Adaptive Cruise Control |
On the | security | of non-forgeable robust hash functions |
On the | security | of Secret Sharing Over a Ring and the Fast Implementation |
On the | security | of singular value based watermarking |
On the | security | of the digest function in the SARI image authentication system |
On the | security | of the SARI image authentication system |
Optical coherence tomography used for | security | and fingerprint-sensing applications |
Optical fingerprint | security | verification using separate target and reference planes and a uniqueness comparison scheme |
Optical Techniques for Information | security | |
Optics and Photonics for | security | and Defense |
Optimal Aviation | security | Screening Strategies With Dynamic Passenger Risk Updates |
Optimized | security | Algorithms for Intelligent and Autonomous Vehicular Transportation Systems |
Over-Complete-Dictionary-Based Improved Spread Spectrum Watermarking | security | |
overview of concealed weapons detection for homeland | security | , An |
overview of through the wall surveillance for homeland | security | , An |
Partial-NOMA Based Physical Layer | security | : Forwarding Design and Secrecy Analysis |
Passenger acceptance of counter-terrorism | security | measures in stations |
Performance and | security | -enhanced fuzzy vault scheme based on ridge features for distorted fingerprints |
Performance of Transmit Antenna Selection Physical Layer | security | Schemes |
Performing Attack Halting Process with Digital Pattern and Proactive Model Resolving the | security | Issues in IoT Based Models |
Person search over | security | video surveillance systems using deep learning methods: A review |
Personal digital bodyguards for e- | security | , e-learning and e-health: A prospective survey |
Personal | security | in travel by public transport: The role of traveller information and associated technologies |
PHY Layer | security | Based on Protected Zone and Artificial Noise |
Physically Based Object Contour Edge Display Using Adjustable Linear Polarization Ratio for Passive Millimeter-Wave | security | Imaging |
Portable information | security | display system via Spatial PsychoVisual Modulation |
Potential Fish Ground Breeding Area Based On Localized Criteria For Sustainable Food | security | |
Practical | security | Architecture for In-Vehicle CAN-FD, A |
Practical | security | of Non-Invertible Watermarking Schemes |
Practical Wireless Attack on the Connected Car and | security | Protocol for In-Vehicle CAN, A |
Predicting Detection Performance on | security | X-Ray Images as a Function of Image Quality |
Privacy and | security | Issues Related to Match Scores |
proposal for a person/photograph distinction method with applications to | security | systems, A |
Protection motivation theory using multi-factor authentication for providing | security | over social networking sites |
Public | security | Video and Image Analysis Challenge: A Retrospective |
Quantifying the Impacts of the 2020 Flood on Crop Production and Food | security | in the Middle Reaches of the Yangtze River, China |
Quantitative Model Construction for Sustainable | security | Patterns in Social-Ecological Links Using Remote Sensing and Machine Learning |
Railway Cyber- | security | in the Era of Interconnected Systems: A Survey |
Re-Evaluation of the | security | of a Family of Image Diffusion Mechanisms |
Real time | security | framework for detecting abnormal events at ATM installations |
Real-time airport | security | checkpoint surveillance using a camera network |
Redundant image representations in | security | applications |
Reliable and Fast Fingerprint Identification for | security | Applications |
Remote Sensing for International Peace and | security | : Its Role and Implications |
Remote Sensing from Space: Supporting International Peace and | security | |
Remotely Sensed Ecological Protection Redline and | security | Pattern Construction: A Comparative Analysis of Pingtan (China) and Durban (South Africa) |
Renewable Minutiae Templates with Tunable Size and | security | |
Research about | security | mechanism in wireless sensor network |
Research Hotspots Analysis of E-commerce | security | in China |
Research on | security | Defense of Coupled Transportation and Cyber-Physical Power System Based on the Static Bayesian Game |
RETRACTED: Analysis of | security | operation and maintenance system using privacy utility in media environment |
Reversible adversarial steganography for | security | enhancement |
Reversible watermarking technique to enhance | security | of a biometric authentication system |
Review of Remote Sensing Challenges for Food | security | with Respect to Salinity and Drought Threats, A |
Revocable Fingerprint Biotokens: Accuracy and | security | Analysis |
Ring oscillator as confusion- diffusion agent: A complete TRNG drove image | security | |
Risk evaluation system of navigation | security | based on coupled wind and wave model: a case of study of Qiongzhou strait |
Robust fingerprint verification for enhancing | security | in healthcare system |
robust watermarking approach against high-density salt and pepper noise (RWSPN) to enhance medical image | security | , A |
robust watermarking approach for | security | issue of binary documents using fully convolutional networks, A |
RWSC-Fusion: Region-Wise Style-Controlled Fusion Network for the Prohibited X-ray | security | Image Synthesis |
Safety, | security | , and Reliability of Autonomous Vehicle Software |
Scalable Aural-Visual Environment for | security | Event Monitoring, Analysis, and Response, A |
Scalable | security | and Conditional Access Control for Multiple Regions of Interest in Scalable Video Coding |
Scheme for Enhancing | security | Using Multiple Fingerprints and the Fuzzy Vault, A |
Sclera Vessel Analysis for Biometric System on Real Time | security | Application |
Secure Relay and Jammer Selection for Physical Layer | security | |
| security | analysis and improvement of some biometric protected templates based on Bloom filters |
| security | analysis for key generation systems using face images |
| security | analysis for privacy preserving search of multimedia |
| security | Analysis for Spread-Spectrum Watermarking Incorporating Statistics of Natural Images |
| security | analysis of a cancelable iris recognition system based on block remapping |
| security | analysis of a three-dimensional rotation-based image encryption |
| security | Analysis of Biometric Template Protection Schemes, A |
| security | Analysis of Impostor Attempts with Respect to Gender in Gait Biometrics |
| security | Analysis of Key Binding Biometric Cryptosystems |
| security | Analysis of Multimedia Encryption Schemes Based on Multiple Huffman Table |
| security | Analysis on Spatial +/- 1 Steganography for JPEG Decompressed Images |
| security | and Accuracy Trade-off in Anonymous Fingerprint Recognition |
| security | and Privacy Concerns in Information Usability |
| security | and privacy enhanced smartphone-based gait authentication with random representation learning and digital lockers |
| security | and Privacy for Augmented Reality Systems |
| security | and Privacy for Distributed Multimedia Sensor Networks |
| security | and Privacy in a Blockchain-Powered Access Control System for Low Emission Zones |
| security | and Privacy in Distributed Smart Cameras |
| security | and Privacy Review of VANETs, A |
| security | and Robustness Enhancement for Image Data Hiding |
| security | and Watermarking of Multimedia Contents |
| security | aspects in education oriented multimedia networks |
| security | Assessment of Selectively Encrypted Visual Data: Iris Recognition on Protected Samples |
| security | augmentation grounded on Fresnel and Arnold transforms using hybrid chaotic structured phase mask |
| security | authentication with a three-dimensional optical phase code using random forest classifier |
| security | Automation Through a Multi-processing Real-Time System for the Re-Identification of Persons |
| security | Challenges in Vehicular Cloud Computing |
| security | Consideration for Deep Learning-Based Image Forensics |
| security | Credential Management System for V2X Communications, A |
| security | design for Instant Messaging system based on RSA and triple DES |
| security | Enhanced Authentication Protocol for Space-Ground Integrated Railway Networks |
| security | enhancement by adopting the chaotic system for wavelet tree based digital image watermarking |
| security | Enhancement for Real-Time Parallel In-Vehicle Applications by CAN FD Message Authentication |
| security | Enhancement of Visual Hashes Through Key Dependent Wavelet Transformations |
| security | Enhancement via Device-to-Device Communication in Cellular Networks |
| security | evaluation for communication-friendly encryption of multimedia |
| security | evaluation of biometric authentication systems under real spoofing attacks |
| security | evaluation of informed watermarking schemes |
| security | Fence Inspection at Airports Using Object Detection |
| security | identification system |
| security | identification system 2 |
| security | in Brain-Computer Interfaces: State-of-the-Art, Opportunities, and Future Challenges |
| security | in IoT-Enabled Digital Twins of Maritime Transportation Systems |
| security | in smart cities: A brief review of digital forensic schemes for biometric data |
| security | in Vehicle Networks, VANET |
| security | measurement of a medical communication scheme based on chaos and DNA coding |
| security | Models of Digital Watermarking |
| security | of an Ill-Posed Operator for Image Authentication |
| security | of Autonomous Driving: Threats, Defenses, and Future Directions, The |
| security | of digital entertainment content from creation to consumption |
| security | of Digital Images Based on 3D Arnold Cat Map and Elliptic Curve |
| security | of Facial Forensics Models Against Adversarial Attacks |
| security | of MVD-based 3D video in 3D-HEVC using data hiding and encryption |
| security | of the Medical Media Using a Hybrid and Multiple Watermark Technique |
| security | Study of Routing Attacks in Vehicular Ad-Hoc Networks (Autonomous Car) |
| security | Study of Routing Attacks in Vehicular Ad-Hoc Networks (Vanets) |
| security | Threats In Smart Healthcare |
| security | Vulnerabilities and Protection Algorithms for Backpressure-Based Traffic Signal Control at an Isolated Intersection |
| security | -Aware Information Dissemination With Fine-Grained Access Control in Cooperative Multi-RSU of VANETs |
| security | -Enhanced Certificateless Conditional Privacy-Preserving Authentication Scheme for Vehicular Ad Hoc Networks, A |
| security | -Enhanced Fuzzy Fingerprint Vault Based on Minutiae's Local Ridge Information |
| security | -oriented picture-in-picture visual modifications |
Seeing Through the Data: A Statistical Evaluation of Prohibited Item Detection Benchmark Datasets for X-ray | security | Screening |
Selection of Temporal Features for Event Detection in Smart | security | |
Selective and adaptive signal hiding technique for | security | of JPEG2000 |
Sensing the Risk: New Approaches and Technologies for Protection and | security | of Cultural Heritage. The PRO_CULT Project |
SFVCC: Chaotic map-based | security | framework for vehicular cloud computing |
Side-Channel | security | Analysis of Connected Vehicle Communications Using Hidden Markov Models |
simple and efficient approach for medical image | security | using chaos on EZW, A |
SIXray: A Large-Scale | security | Inspection X-Ray Benchmark for Prohibited Item Discovery in Overlapping Images |
Smart City | security | Issues: the Main Attacks and Countermeasures |
Smart Home Personal Assistants: A | security | and Privacy Review |
Smoothing | security | Prices |
socio-technical approach for event detection in | security | critical infrastructure, A |
Solving the | security | Problem of Intelligent Transportation System With Deep Learning |
Spatiotemporal Dynamics of Ecological | security | Pattern of Urban Agglomerations in Yangtze River Delta Based on LUCC Simulation |
Speaker identification | security | improvement by means of speech watermarking |
Special Issue on Image | security | : secure imaging--is it necessary? |
Special issue on Medical Image Communication, Computing and | security | |
Special section on image and video processing for | security | |
Spherical Harmonics-LSB-quantification Adaptive Watermarking Approach for 3D Multiresolution Meshes | security | , A |
Standoff video analysis for the detection of | security | anomalies in vehicles |
Statistical Analysis of IrisCode and Its | security | Implications, A |
Steganographic | security | Analysis From Side Channel Steganalysis and Its Complementary Attacks |
SteganoPIN: Two-Faced Human-Machine Interface for Practical Enforcement of PIN Entry | security | |
Study of Smart Campus Environment and Its | security | Attacks, A |
study on | security | evaluation methodology for image-based biometrics authentication systems, A |
study on | security | performance of YASS, A |
Study on the | security | Levels of Spread-Spectrum Embedding Schemes in the WOA Framework, A |
Support for effective use of multiple video streams in | security | |
Survey of Air, Sea, and Road Vehicles Research for Motion Control | security | |
Survey of | security | and Privacy Issues in V2X Communication Systems, A |
survey on behavior analysis in video surveillance for homeland | security | applications, A |
Survey on Cyber | security | Threats in IoT-Enabled Maritime Industry, A |
Survey on Cyber- | security | of Connected and Autonomous Vehicles (CAVs), A |
Survey on Recent Advances in Vehicular Network | security | , Trust, and Privacy, A |
Suspicious Multi-Object Detection and Recognition Method for Millimeter Wave SAR | security | Inspection Images Based on Multi-Path Extraction Network, A |
system-level | security | approach for heterogeneous MPSoCs, A |
Systematic Survey: | security | Threats to UAV-Aided IoT Applications, Taxonomy, Current Challenges and Requirements With Future Research Directions, A |
Targeted attack and | security | enhancement on texture synthesis based steganography |
Teaching Computer Vision and Its Societal Effects: A Look at Privacy and | security | Issues from the Students' Perspective |
Technology, applications and innovations in physical | security | : A home office perspective |
Terahertz Spectroscopy and Imaging for Defense and | security | Applications |
Thesholding and Character Recognition in | security | Documents with Watermarked Background |
Three-dimensional imaging of hold baggage for airport | security | |
Topological Analysis of Criminal Activity Networks: Enhancing Transportation | security | |
Toward Physical Layer | security | and Efficiency for SAGIN: A WFRFT-Based Parallel Complex-Valued Spectrum Spreading Approach |
Towards automatic threat detection: A survey of advances of deep learning within X-ray | security | imaging |
Towards Real-world X-ray | security | Inspection: A High-Quality Benchmark And Lateral Inhibition Module For Prohibited Items Detection |
Tracking Passengers and Baggage Items Using Multiple Overhead Cameras at | security | Checkpoints |
Transfer learning using convolutional neural networks for object classification within X-ray baggage | security | imagery |
Triple-Bit Quantization with Asymmetric Distance for Image Content | security | |
TrustCAM: | security | and Privacy-Protection for an Embedded Smart Camera Based on Trusted Computing |
Trusted Data Communication And | security | Issues in GNSS Network Of Turkey |
Two level | security | for medical images using watermarking/encryption algorithms |
UAV-Assisted Physical Layer | security | in Multi-Beam Satellite-Enabled Vehicle Communications |
Upgrading | security | and protection in ear biometrics |
Using behavior analysis algorithms to anticipate | security | threats before they impact mission critical operations |
Using Continuous Face Verification to Improve Desktop | security | |
Utilizing Geospatial Data for Assessing Energy | security | : Mapping Small Solar Home Systems Using Unmanned Aerial Vehicles and Deep Learning |
Vehicular Edge Computing: Architecture, Resource Management, | security | , and Challenges |
Vehicular | security | access system |
video analysis framework for soft biometry | security | surveillance, A |
Video Processing for | security | , Surveillance and Monitoring |
Video | security | for Ambient Intelligence |
Virtual special issue on advances in digital | security | : Biometrics and forensics |
Vision and Displays for Military and | security | Applications: The Advanced Deployable Day/Night Simulation Project |
Visual | security | Evaluation of Perceptually Encrypted Images Based on Image Importance |
Vulnerability of pixel-value differencing steganography to histogram analysis and modification for enhanced | security | |
Watermark | security | Via Wavelet Filter Parametrization |
Watermarking Attack: | security | of WSS Techniques |
When | security | games hit traffic: A deployed optimal traffic enforcement system |
Window of visibility inspired | security | lighting system |
Wireless Sensor Network: Towards An Improvement of | security | Policy |
Witsenhausen's Counterexample and Its Links with Multimedia | security | Problems |
Wolf Attack Probability: A New | security | Measure in Biometric Authentication Systems |
483 for security