2020
DOI: 10.1007/s11042-020-08971-x
|View full text |Cite
|
Sign up to set email alerts
|

A safe and secured iris template using steganography and cryptography

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
23
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
4
2

Relationship

1
5

Authors

Journals

citations
Cited by 45 publications
(23 citation statements)
references
References 18 publications
0
23
0
Order By: Relevance
“…1 MC-CH: Matrix coding and chaos theory 2 HOOK: HOOK mechanism, 3 ME: matrix embedding technique, 4 MCD-STC: cepstrum distortion cost function and Syndrome Trellis Codes, 5 NPP-QIM: quantization-indexmodulation based on the replacement of the nearest-neighbor projection point, 6 PDM: pulse distribution model, 7 OAET: optimized audio embedding technique. 8 B-G: bit-grading.…”
Section: Workmentioning
confidence: 99%
See 4 more Smart Citations
“…1 MC-CH: Matrix coding and chaos theory 2 HOOK: HOOK mechanism, 3 ME: matrix embedding technique, 4 MCD-STC: cepstrum distortion cost function and Syndrome Trellis Codes, 5 NPP-QIM: quantization-indexmodulation based on the replacement of the nearest-neighbor projection point, 6 PDM: pulse distribution model, 7 OAET: optimized audio embedding technique. 8 B-G: bit-grading.…”
Section: Workmentioning
confidence: 99%
“…However, this method is only suitable for the detection of the steganographic domain of SIP tags, so the applicability needs to be further improved. 1 SVM: support vector machine, 2 CT: Chaos Theory, 3 PSR: phase space reconstruction technique, 4 GMM: Gaussian mixture model, 5 MFCC: Mel-frequency cepstral coefficients, 6 M-F C: multi-feature classification.…”
Section: Steganalysis Based On the Application Layermentioning
confidence: 99%
See 3 more Smart Citations