Pattern mining approaches used in sensor-based biometric recognition: a review

J Chaki, N Dey, F Shi, RS Sherratt - IEEE Sensors Journal, 2019 - ieeexplore.ieee.org
Sensing technologies place significant interest in the use of biometrics for the recognition
and assessment of individuals. Pattern mining techniques have established a critical step in …

Protecting digital images using keys enhanced by 2D chaotic logistic maps

M Abu-Faraj, A Al-Hyari, C Obimbo, K Aldebei… - Cryptography, 2023 - mdpi.com
This research paper presents a novel digital color image encryption approach that ensures
high-level security while remaining simple and efficient. The proposed method utilizes a …

A secure authentication technique in internet of medical things through machine learning

AA Mawgoud, AI Karadawy, BS Tawfik - arXiv preprint arXiv:1912.12143, 2019 - arxiv.org
The rapid growth of the Internet of Things technology in healthcare domain led to the
appearance of many security threats and risks. It became very challenging to provide full …

Impact of microwave plasma treatment on tritium retention in submicronic tungsten dust

V Marascu, M Payet, S Garcia-Argote… - International Journal of …, 2023 - Elsevier
In the current paper, we have studied the impact of microwave (2.45 GHz) plasma treatment
of submicronic (250–600 nm) tungsten dust, upon tritium gas retention. Herein, the …

[HTML][HTML] Tungsten Material Behavior under H2, D2, and He Plasma Interaction Conditions in the Framework of Fusion-Relevant Studies

C Stancu, V Marascu, A Bonciu, A Bercea, SD Stoica… - Materials, 2023 - mdpi.com
In the current study, bulk tungsten material surfaces are exposed to hydrogen, deuterium,
and helium plasmas in the radiofrequency domain (13.56 MHz) at an input power of 250 W …

Measuring avalanche properties on RC4 stream cipher variants

EJ Madarro-Capó, CM Legón-Pérez, O Rojas… - Applied Sciences, 2021 - mdpi.com
In the last three decades, the RC4 has been the most cited stream cipher, due to a large
amount of research carried out on its operation. In this sense, dissimilar works have been …

Entropy-based face recognition and spoof detection for security applications

FA Pujol, MJ Pujol, C Rizo-Maestre, M Pujol - Sustainability, 2019 - mdpi.com
Nowadays, cyber attacks are becoming an extremely serious issue, which is particularly
important to prevent in a smart city context. Among cyber attacks, spoofing is an action that is …

Information theory based evaluation of the RC4 stream cipher outputs

EJ Madarro-Capó, CM Legón-Pérez, O Rojas… - Entropy, 2021 - mdpi.com
This paper presents a criterion, based on information theory, to measure the amount of
average information provided by the sequences of outputs of the RC4 on the internal state …

Survey on security of biometric data using cryptography

A Thawre, A Hariyale… - 2021 2nd International …, 2021 - ieeexplore.ieee.org
Biometric Cryptography is the biometric tokenization used for authentication with public-key
infrastructure (PKI). In particular, biometric cryptography provides the convenience of …

Bit independence criterion extended to stream ciphers

EJ Madarro-Capó, CM Legón-Pérez, O Rojas… - Applied Sciences, 2020 - mdpi.com
The bit independence criterion was proposed to evaluate the security of the S-boxes used in
block ciphers. This paper proposes an algorithm that extends this criterion to evaluate the …