UM

Browse/Search Results:  1-10 of 13 Help

Selected(0)Clear Items/Page:    Sort:
Local discriminant coding based convolutional feature representation for multimodal finger recognition Journal article
Information Sciences, 2021,Volume: 547,Page: 1170-1181
Authors:  Li,Shuyi;  Zhang,Bob;  Zhao,Shuping;  Yang,Jinfeng
Favorite |  | TC[WOS]:3 TC[Scopus]:3 | Submit date:2021/03/11
Convolutional neural network  Local coding  Multimodal finger recognition  
Robust image hashing with visual attention model and invariant moments Journal article
IET Image Processing, 2020,Volume: 14,Issue: 5,Page: 901-908
Authors:  Tang,Zhenjun;  Zhang,Hanyun;  Pun,Chi Man;  Yu,Mengzhu;  Yu,Chunqiang;  Zhang,Xianquan
Favorite |  | TC[WOS]:2 TC[Scopus]:2 | Submit date:2021/03/11
High-Performance Thin-Layer Chromatographic Fingerprints of Triterpenoids for Distinguishing Between Isodon lophanthoides and Isodon lophanthoides var. gerardianus Journal article
JOURNAL OF AOAC INTERNATIONAL, 2019,Volume: 102,Issue: 3,Page: 714-719
Authors:  Chaozhan Lin;  Fangle Liu;  Runjing Zhang;  Meiting Liu;  Chenchen Zhu 1;  Jing Zhao;  Shaoping Li
Favorite |  | TC[WOS]:3 TC[Scopus]:3 | Submit date:2019/11/22
Liquid-chromatography  Quality Assessment  Radix  
Locating splicing forgery by fully convolutional networks and conditional random field Journal article
SIGNAL PROCESSING-IMAGE COMMUNICATION, 2018,Volume: 66,Page: 103-112
Authors:  Liu, Bo;  Pun, Chi-Man
Favorite |  | TC[WOS]:8 TC[Scopus]:13 | Submit date:2018/10/30
Splicing Forgery  Deep Neural Network  Fully Convolutional Network  Conditional Random Field  
A DCT-based information hiding method for network authentication Conference paper
ACM International Conference Proceeding Series
Authors:  Song W.;  Zou S.;  Tian Y.;  Li C.;  Sun S.;  Fong S.
Favorite |  | TC[WOS]:0 TC[Scopus]:0 | Submit date:2019/02/13
Discrete cosine transform  Image processing  Information hiding  Network authentication  
Facial feature based secure information transmission Conference paper
ACM International Conference Proceeding Series
Authors:  Li C.;  Wang Y.;  Fong S.;  Duan C.;  Song W.
Favorite |  | TC[WOS]:0 TC[Scopus]:0 | Submit date:2019/02/13
Biometric cryptosystems  Gabor features  Secret key generation  
Robust image hashing using progressive feature selection for tampering detection Journal article
MULTIMEDIA TOOLS AND APPLICATIONS, 2017,Volume: 77,Issue: 10,Page: 11609-11633
Authors:  Pun, Chi-Man;  Yan, Cai-Ping;  Yuan, Xiao-Chen
Favorite |  | TC[WOS]:7 TC[Scopus]:8 | Submit date:2018/10/30
Robust Image Hashing  Progressive Feature Point Selection  Tampering Detection  Image Authentication  Horizontal Location-context Hashing (Hlch)  Vertical Location-context Hashing (Vlch)  
Online 3D ear recognition by combining global and local features Journal article
PLoS ONE, 2016,Volume: 11,Issue: 12
Authors:  Liu Y.;  Zhang B.;  Lu G.;  Zhang D.
Favorite |  | TC[WOS]:4 TC[Scopus]:4 | Submit date:2019/04/04
Multi-scale image hashing using adaptive local feature extraction for robust tampering detection Journal article
Signal Processing, 2015,Volume: 121,Page: 1-16
Authors:  Yan C.-P.;  Pun C.-M.;  Yuan X.-C.
Favorite |  | TC[WOS]:35 TC[Scopus]:39 | Submit date:2019/02/14
Adaptive Feature Point Detection  Image Authentication  Multi-scale Image Hashing  Tampering Detection  
Framework of Lightweight Secure Media Transfer for Mobile Law Enforcement Apps Conference paper
Communications in Computer and Information Science, Galgotias Coll of Engn & Technol, Delhi, INDIA, SEP 24-27, 2014
Authors:  Deb, Suash;  Fong, Simon;  Thampi, Sabu M
Favorite |  | TC[WOS]:0 TC[Scopus]:0 | Submit date:2018/11/06
Video  Security  Digital Watermarking