Zobrazeno 1 - 10
of 45
pro vyhledávání: '"Chengsheng Yuan"'
Publikováno v:
IET Biometrics, Vol 2024 (2024)
In recent years, fingerprint authentication has gained widespread adoption in diverse identification systems, including smartphones, wearable devices, and attendance machines, etc. Nonetheless, these systems are vulnerable to spoofing attacks from su
Externí odkaz:
https://doaj.org/article/90a2dbfd7657486e86a31e91b69f45bf
Publikováno v:
Tongxin xuebao, Vol 43, Pp 181-193 (2022)
A copyright protection algorithm based on differential privacy for deep fake fingerprint detection model (DFFDM) was proposed, realizing active copyright protection and passive copyright verification of DFFDM without weakening the performance of the
Externí odkaz:
https://doaj.org/article/e5f8719054084013921815eb45191166
Publikováno v:
EURASIP Journal on Image and Video Processing, Vol 2020, Iss 1, Pp 1-15 (2020)
Abstract To fundamentally resist the steganalysis, coverless information hiding has been proposed, and it has become a research hotspot in the field of covert communication. However, the current methods not only require a huge image database, but als
Externí odkaz:
https://doaj.org/article/39771983d914456b849b2245be3bab96
Publikováno v:
Applied Sciences, Vol 12, Iss 22, p 11775 (2022)
Twitter has become a major social media platform and has attracted considerable interest among researchers in sentiment analysis. Research into Twitter Sentiment Analysis (TSA) is an active subfield of text mining. TSA refers to the use of computers
Externí odkaz:
https://doaj.org/article/a0730d2aecec4275970d41508bf02108
Publikováno v:
IEEE Access, Vol 7, Pp 26953-26966 (2019)
Due to the lack of pre-judgment of fingerprints, fingerprint authentication systems are frequently vulnerable to artificial replicas. Anonymous people can impersonate authorized users to complete various authentication operations, thereby disrupting
Externí odkaz:
https://doaj.org/article/49400ddae9d34213adb0e3d4469f4a26
Publikováno v:
Mathematics, Vol 8, Iss 4, p 517 (2020)
Currently, intelligent devices with fingerprint identification are widely deployed in our daily life. However, they are vulnerable to attack by fake fingerprints made of special materials. To elevate the security of these intelligent devices, many fi
Externí odkaz:
https://doaj.org/article/a06eb549ad07479e8cff321ffaf061a2
Publikováno v:
International Journal of Autonomous and Adaptive Communications Systems. 17:1
Publikováno v:
International Journal of Autonomous and Adaptive Communications Systems. 17:1
Publikováno v:
IEEE Journal of Selected Topics in Signal Processing. 16:817-827
Publikováno v:
ACM Transactions on Multimedia Computing, Communications, and Applications. 18:1-18
The development of cloud computing attracts enterprises and individuals to outsource their data, such as images, to the cloud server. However, direct outsourcing causes the extensive concern of privacy leakage, as images often contain rich sensitive