[PDF][PDF] A survey on machine learning: concept, algorithms and applications

K Das, RN Behera - International Journal of Innovative Research in …, 2017 - smec.ac.in
Over the past few decades, Machine Learning (ML) has evolved from the endeavour of few
computer enthusiasts exploiting the possibility of computers learning to play games, and a …

[PDF][PDF] Encryption of Color Image Based on DNA Strand and Exponential Factor.

IA Aljazaery, HTH Salim ALRikabi… - … Journal of Online & …, 2022 - pdfs.semanticscholar.org
In this study, a new method has been eliciting for encoding 2D and 3D color images. The
DNA strand construction was used as the basis for structuring the method. This method …

[HTML][HTML] A novel content-selected image encryption algorithm based on the LS chaotic model

J Wang, L Liu, M Xu, X Li - Journal of King Saud University-Computer and …, 2022 - Elsevier
Many holistic image encryption schemes have been proposed in recent decades that
achieve a certain security level. However, considering the actual application environment …

The algorithm of watershed color image segmentation based on morphological gradient

Y Wu, Q Li - Sensors, 2022 - mdpi.com
The traditional watershed algorithm has the disadvantage of over-segmentation and
interference with an image by reflected light. We propose an improved watershed color …

A novel grayscale image encryption approach based on chaotic maps and image blocks

A Girdhar, H Kapur, V Kumar - Applied Physics B, 2021 - Springer
Image encryption converts a meaningful image into some random arrangement of pixel
intensities. That means, the intelligible property of an image is destroyed. Taking into …

[PDF][PDF] A new model for measuring customer utility trust in online auctions

ESM El-Kenawy, M Eid, AH Ismail - International Journal of …, 2020 - researchgate.net
Reports from the US Federal Bureau of investigation have indicated a lot of unethical
activities taking place on the internet environments. Despite some technical challenges …

A secure image encryption scheme based on three different chaotic maps

S De, J Bhaumik, D Giri - Multimedia Tools and Applications, 2022 - Springer
In the current decade, chaos based image encryption has distinctly captured a remarkable
position in multimedia data security. In this paper, a hybrid chaos based image encryption …

Hardware implementation of cancellable biometric systems

S Ibrahim, MG Egila, H Shawkey… - … Conference on I …, 2020 - ieeexplore.ieee.org
The use of biometrics in security applications may be vulnerable to several challenges of
hacking. Thus, the emergence of cancellable biometrics becomes a suitable solution to this …

Simultaneous encryption of multiple images using pseudo-random sequences generated by modified Newton-Raphson technique

A Paul, S Kandar - Multimedia Tools and Applications, 2022 - Springer
A multiple image encryption using pseudo random (PR) sequence is proposed in this article.
A non-chaotic technique pillared on modified Newton-Raphson method is applied to …

[HTML][HTML] Biometric information security based on double chaotic rotating diffusion

Z Man - Chaos, Solitons & Fractals, 2023 - Elsevier
Biometric technology is increasingly being used in various areas, including government law
enforcement, exit and entry management, visitor access control, user identification, and daily …