[Paper] Fuzzy Commitment Scheme-Based Secure Identification for JPEG XR Images under Various Compression Ratios
Kenta Iida,Hitoshi Kiya +1 more
Reads0
Chats0
About:
This article is published in Multimedia Tools and Applications.The article was published on 2017-01-01 and is currently open access. It has received 2 citations till now. The article focuses on the topics: Lossless JPEG & JPEG.read more
Citations
More filters
Proceedings ArticleDOI
Performance Analysis of JPEG XR with Deep Learning-Based Image Super-Resolution
TL;DR: In this article , a deep learning-based FSRCNN super-resolution (SR) with JPEG XR was proposed to reduce the high-resolution image size by downsampling the input image before encoding with JPEGXR.
Proceedings ArticleDOI
Performance Analysis of JPEG XR with Deep Learning-Based Image Super-Resolution
Taingliv Min,Supavadee Aramvith +1 more
TL;DR: In this article , a deep learning-based FSRCNN super-resolution (SR) with JPEG XR was proposed to reduce the high-resolution image size by downsampling the input image before encoding with JPEGXR.
References
More filters
Proceedings ArticleDOI
A fuzzy commitment scheme
Ari Juels,Martin Wattenberg +1 more
TL;DR: Because the fuzzy commitment scheme is tolerant of error, it is capable of protecting biometric data just as conventional cryptographic techniques, like hash functions, are used to protect alphanumeric passwords.
Journal ArticleDOI
Biometric template security
TL;DR: This work presents a high-level categorization of the various vulnerabilities of a biometric system and discusses countermeasures that have been proposed to address these vulnerabilities.
Journal ArticleDOI
A survey on biometric cryptosystems and cancelable biometrics
Christian Rathgeb,Andreas Uhl +1 more
TL;DR: A comprehensive survey of biometric cryptosystems and cancelable biometrics is presented and state-of-the-art approaches are reviewed based on which an in-depth discussion and an outlook to future prospects are given.
Journal ArticleDOI
A robust image authentication method distinguishing JPEG compression from malicious manipulation
Ching-Yung Lin,Shih-Fu Chang +1 more
TL;DR: An effective technique for image authentication which can prevent malicious manipulations but allow JPEG lossy compression, and describes adaptive methods with probabilistic guarantee to handle distortions introduced by various acceptable manipulations such as integer rounding, image filtering, image enhancement, or scaling-recaling.
Journal ArticleDOI
Robust and secure image hashing
TL;DR: A novel algorithm for generating an image hash based on Fourier transform features and controlled randomization is developed and it is shown that the proposed hash function is resilient to content-preserving modifications, such as moderate geometric and filtering distortions.