[HTML][HTML] Color image encryption using a Zigzag Transformation and sine-cosine maps

F ElAzzaby, KH Sabour, N ELakkad, W El-Shafai… - Scientific African, 2023 - Elsevier
This research endeavor is dedicated to enhancing data confidentiality in internet
transmissions by strategically employing Hash functions and harnessing the advantageous …

Encryption algorithm based on fractional order chaotic system combined with adaptive predefined time synchronization

L Lin, Y Zhuang, Z Xu, D Yang, D Wu - Frontiers in Physics, 2023 - frontiersin.org
An image encryption and decryption method of fractional order chaotic systems (FOCS) with
predefined time synchronization is proposed in this article. Compared with the existing …

Improved Shi–Tomasi sub-pixel corner detection based on super-wide field of view infrared images

D Shi, F Huang, J Yang, L Jia, Y Niu, L Liu - Applied Optics, 2024 - opg.optica.org
In this work, we propose a new, to the best of our knowledge, corner point detection method
for a super-wide field of view infrared imaging system. First, the edge of the checkerboard …

Confusion and Diffusion Techniques for Image Encryption Process Based on Chaos System

M Magfirawaty, A Allamanda, M Ayunasari… - … Teknik Elektro dan …, 2024 - journal.ugm.ac.id
Face recognition uses biometric technologies to identify humans based on their facial
characteristics. This method is commonly used to restrict information access control. The …

An Effective Combination of Pattern Recognition and Encryption Scheme for Biometric Authentication Systems

VGV Mahesh - Innovative Machine Learning Applications for …, 2024 - igi-global.com
Authentication based on biometric technology is largely preferred in providing access
control to the systems. This technology has gained wider attention due to the rise in data …

Enhancing Automated Face Recognition with Makeup Detection: A CNN-Based Approach

MO Balogun… - COVENANT …, 2024 - journals.covenantuniversity.edu.ng
This study delves into the complex issue posed by facial makeup, which has the potential to
significantly alter the appearance of individuals, posing a challenge to automated face …

Facial Recognition Model Using Custom Designed Deep Learning Architecture

T Kesarwani, R Mittal, D Panwar, GL Saini… - … on Communication and …, 2023 - Springer
Facial Recognition is widely used in some applications such as attendance tracking, phone
unlocking, and security systems. An extensive study of methodologies and techniques used …

IDS-PSO-BAE: The Ensemble Method for Intrusion Detection System Using Bagging–Autoencoder and PSO

K Lavanya, YS Reddy, DC Varsha, NV Sai… - International Conference …, 2023 - Springer
In recent days, for security services, an intrusion detection system (IDS) is a highly effective
solution (Louk MHL, Tama BA.“PSO-Driven Feature Selection and Hybrid Ensemble for …

A Discriminant Face Recognition Algorithm Based on Improved Softmax Loss Algorithm

J Zhu, C Wang, X Shen, Y Zhang… - … Conference on the …, 2023 - ieeexplore.ieee.org
Traditional Softmax loss algorithm has only separability for features algorithm. This study
proposed an improved Softmax loss algorithm to recognize facial features. The algorithm …

Facial Recognition Model Using Custom Designed Deep Learning Architecture Check for updates

T Kesarwani, R Mittal, D Panwar, GL Saini… - … and Intelligent Systems … - books.google.com
Facial Recognition is widely used in some applications such as attendance tracking, phone
unlocking, and security systems. An extensive study of methodologies and techniques used …