Big data analytics

S Singh, N Singh - 2012 International Conference on …, 2012 - ieeexplore.ieee.org
In this paper, we explain the concept, characteristics & need of Big Data & different offerings
available in the market to explore unstructured large data. This paper covers Big Data …

Multimodal biometric authentication with secured templates—A review

SK Choudhary, AK Naik - 2019 3rd international conference on …, 2019 - ieeexplore.ieee.org
The advent of internet is highly triggering people towards the digital era. The inexpensive
data availability to common people also aids for the abundant data communication. In the …

Secure data hiding techniques: a survey

L Singh, AK Singh, PK Singh - Multimedia Tools and Applications, 2020 - Springer
This article presents a detailed discussion of different prospects of digital image
watermarking. This discussion of watermarking included: brief comparison of similar …

Data hiding: current trends, innovation and potential challenges

AK Singh - ACM Transactions on Multimedia Computing …, 2020 - dl.acm.org
With the widespread growth of digital information and improved internet technologies, the
demand for improved information security techniques has significantly increased due to …

Toward construction-based data hiding: from secrets to fingerprint images

S Li, X Zhang - IEEE Transactions on Image Processing, 2018 - ieeexplore.ieee.org
Data hiding usually involves the alteration of a cover signal for embedding a secret
message. In this paper, we propose a construction-based data hiding technique which …

Hybrid semi-blind image watermarking in redundant wavelet domain

S Singh, VS Rathore, R Singh, MK Singh - Multimedia Tools and …, 2017 - Springer
Image watermarking in wavelet domain has been found useful for copyright protection and
rightful ownership. Classical wavelet transforms, like discrete wavelet transform (DWT), are …

[图书][B] Digital watermarking

Due to wide range of digital watermarking applications in digital world, available digital
watermarking books just concentrate on specific application of digital watermarking such as …

A review of voice-base person identification: state-of-the-art

CO Folorunso, OS Asaolu… - Covenant …, 2019 - journals.covenantuniversity.edu.ng
Automated person identification and authentication systems are useful for national security,
integrity of electoral processes, prevention of cybercrimes and many access control …

Noise is inside me! generating adversarial perturbations with noise derived from natural filters

A Agarwal, M Vatsa, R Singh… - Proceedings of the …, 2020 - openaccess.thecvf.com
Deep learning solutions are vulnerable to adversarial perturbations and can lead a" frog"
image to be misclassified as a" deer" or random pattern into" guitar". Adversarial attack …

A hybrid encryption/hiding method for secure transmission of biometric data in multimodal authentication system

EB Tarif, S Wibowo, S Wasimi, A Tareef - Multimedia Tools and …, 2018 - Springer
Biometric security is a fast growing area that gains an increasing interest in the last decades.
Digital encryption and hiding techniques provide an efficient solution to protect biometric …