scispace - formally typeset
Open AccessJournal ArticleDOI

[Paper] Fuzzy Commitment Scheme-Based Secure Identification for JPEG XR Images under Various Compression Ratios

Kenta Iida, +1 more
- 01 Jan 2017 - 
- Vol. 5, Iss: 2, pp 67-76
Reads0
Chats0
About
This article is published in Multimedia Tools and Applications.The article was published on 2017-01-01 and is currently open access. It has received 2 citations till now. The article focuses on the topics: Lossless JPEG & JPEG.

read more

Citations
More filters
Proceedings ArticleDOI

Performance Analysis of JPEG XR with Deep Learning-Based Image Super-Resolution

TL;DR: In this article , a deep learning-based FSRCNN super-resolution (SR) with JPEG XR was proposed to reduce the high-resolution image size by downsampling the input image before encoding with JPEGXR.
Proceedings ArticleDOI

Performance Analysis of JPEG XR with Deep Learning-Based Image Super-Resolution

TL;DR: In this article , a deep learning-based FSRCNN super-resolution (SR) with JPEG XR was proposed to reduce the high-resolution image size by downsampling the input image before encoding with JPEGXR.
References
More filters
Proceedings ArticleDOI

A fuzzy commitment scheme

TL;DR: Because the fuzzy commitment scheme is tolerant of error, it is capable of protecting biometric data just as conventional cryptographic techniques, like hash functions, are used to protect alphanumeric passwords.
Journal ArticleDOI

Biometric template security

TL;DR: This work presents a high-level categorization of the various vulnerabilities of a biometric system and discusses countermeasures that have been proposed to address these vulnerabilities.
Journal ArticleDOI

A survey on biometric cryptosystems and cancelable biometrics

TL;DR: A comprehensive survey of biometric cryptosystems and cancelable biometrics is presented and state-of-the-art approaches are reviewed based on which an in-depth discussion and an outlook to future prospects are given.
Journal ArticleDOI

A robust image authentication method distinguishing JPEG compression from malicious manipulation

TL;DR: An effective technique for image authentication which can prevent malicious manipulations but allow JPEG lossy compression, and describes adaptive methods with probabilistic guarantee to handle distortions introduced by various acceptable manipulations such as integer rounding, image filtering, image enhancement, or scaling-recaling.
Journal ArticleDOI

Robust and secure image hashing

TL;DR: A novel algorithm for generating an image hash based on Fourier transform features and controlled randomization is developed and it is shown that the proposed hash function is resilient to content-preserving modifications, such as moderate geometric and filtering distortions.
Related Papers (5)