Image encryption algorithm based on 2d hyper-chaotic system and central dogma of molecular biology

Q Wang, X Zhang, X Zhao - Physica Scripta, 2023 - iopscience.iop.org
With the widespread use of images, image security has received much attention. Image
security can be guaranteed by encrypting the plain image and transmitting the …

The landscape of research on skin detectors: Coherent taxonomy, open challenges, motivations, recommendations and statistical analysis, future directions

MA Chyad, HA AlSattar, BB Zaidan, AA Zaidan… - IEEE …, 2019 - ieeexplore.ieee.org
This paper review and analysis the literature on skin detector (SD), in order to establish the
coherent taxonomy and figure out the gap on this pivotal research area. An extensive search …

[PDF][PDF] Face Recognition Using Neuro-Fuzzy and Eigenface

S Hamdan, A Shaout - … of Computer Science and Engineering (IJCSE …, 2016 - academia.edu
Face recognition is actively growing area of research because it is applied in numerous
practical applications such as bank identification, security cameras, criminal investigations …

Skin Detection System Based Fuzzy Neural Networks for Skin Identification

IJ Bush, R Abiyev - Machine Learning and the Internet of Things in …, 2023 - Springer
Abstract Machine learning is an effective technology for big data augmentation and analysis.
This research proposes an integrated machine learning algorithm (Skin Detection System) …

Human ethnics prediction using facial features and optimized convolutional neural network

SS Alotaibi - Neural Computing and Applications, 2022 - Springer
One of the biggest outlooks of face recognition is to create a useful application for human
identification at immigration offices for security purposes. The human face is a complex …

[PDF][PDF] A Novel Feature Extraction for Complementing Authentication in Hand-based Biometric

BS Mahalakshmi, SV Sheela - International Journal of …, 2021 - pdfs.semanticscholar.org
With an increasing usage of hand-based biometrics in authentication system, there is a need
to evolve up with more potential security owing to increasing evolution of threats. The …

Automated surveillance of computer monitors in labs

K Babutain, S Alaklobi, A Alghamdi… - … on Advances in …, 2015 - ieeexplore.ieee.org
Object detection and recognition are still challenging and they find application in
surveillance systems. University computer labs may or may not have surveillance video …

Joint Subcarrier and Power Allocation in MU OFDM DCSK Systems with Noise Reduction

M Mobini, MR Zahabi - arXiv preprint arXiv:2105.03190, 2021 - arxiv.org
This paper investigates the joint number of subcarriers and power optimization in Multi user
Orthogonal Frequency Division Multiplexing based Differential Chaotic Shift Keying systems …

Batch Attendance System Based on Face Recognition

H Shen, X Wang, X Zhang - IOP Conference Series: Earth and …, 2019 - iopscience.iop.org
Biometric identification technology has been adopted to develop batch attendance system of
electric power enterprises in this paper. The face is a typical biological characteristic, which …

[PDF][PDF] Feature Extraction and Classification Framework for Face Recognition System

EJ Leavline, HXP Rajan, DAAG Singh - International Journal of Applied … - researchgate.net
Recognition of human face is an emerging area of research in the image processing and
pattern recognition field. Face recognition has attracted recent researchers as it is a part of …