2017
DOI: 10.1504/ijcnds.2017.082103
|View full text |Cite
|
Sign up to set email alerts
|

A bio-inspired authentication approach to colour image transmitted on open non-secure public network

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2019
2019
2021
2021

Publication Types

Select...
2

Relationship

1
1

Authors

Journals

citations
Cited by 2 publications
(3 citation statements)
references
References 13 publications
0
3
0
Order By: Relevance
“…; Y (n) are outputted when TPCNN is iterated n times. The image invariant feature usually can be calculated by two methods: time signature [7] and entropy signature [10]. As the entropy is more suitable for measuring the information contained in the output pulse image, the entropy signature is used in the following sections.…”
Section: B Topological Properties Motivated Pcnnmentioning
confidence: 99%
See 2 more Smart Citations
“…; Y (n) are outputted when TPCNN is iterated n times. The image invariant feature usually can be calculated by two methods: time signature [7] and entropy signature [10]. As the entropy is more suitable for measuring the information contained in the output pulse image, the entropy signature is used in the following sections.…”
Section: B Topological Properties Motivated Pcnnmentioning
confidence: 99%
“…Thus, more and more attention has been paid to the image authentication technology in recent years. In brief, image authentication is one kind of technology to protect the image integrity from illegally modified [7], [22]. There are two categories of image authentication schemes: signature-based schemes and watermark-based schemes.…”
Section: Image Authentication and Tampering Area Detectionmentioning
confidence: 99%
See 1 more Smart Citation