Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- research-articleFebruary 2024
DSteganoM: Deep steganography for motion capture data
Expert Systems with Applications: An International Journal (EXWA), Volume 238, Issue PCMar 2024https://doi.org/10.1016/j.eswa.2023.121955AbstractMotion capture (mocap) data stores the skeleton movement of recorded objects or humans and is essential for various 3D applications, such as games, animations, virtual reality, surveillance and medical. The exploration of steganography using ...
Highlights- A new deep neural network model for hiding mocap data inside another mocap data.
- This model can hide mocap data of different topologies with different dimensions.
- The secret mocap data can be reconstructed under noise corruption ...
- ArticleNovember 2022
Blockchain-Based Multi-keyword Search on Encrypted COVID-19 Contact Tracing Data
Information Security Practice and ExperienceNov 2022, Pages 75–92https://doi.org/10.1007/978-3-031-21280-2_5AbstractContact tracing data contain highly sensitive information in which any form of leakage will significantly threaten the security and privacy of the individual. Encryption schemes can be used to ensure confidentiality; however, the usability of the ...
- research-articleMarch 2022
An Analysis on Face Recognition using Principal Component Analysis Approach
- Wenyu Zhang,
- Burra Venkata Durga Kumar,
- Kelvin J.A Ooi,
- Jia Yew Teh,
- Iftekhar Salam,
- Mohammad Arif Sobhan Bhuiyan
ICIGP '22: Proceedings of the 2022 5th International Conference on Image and Graphics ProcessingJanuary 2022, Pages 150–158https://doi.org/10.1145/3512388.3512411Face recognition is a type of biometric recognition based on human facial feature information. Human face images or videos can be automatically collected using a high definition camera. Advanced technologies then can be used for face recognition by ...
- ArticleDecember 2020
- research-articleJanuary 2018
Fault attacks on Tiaoxin-346
ACSW '18: Proceedings of the Australasian Computer Science Week MulticonferenceJanuary 2018, Article No.: 5, Pages 1–9https://doi.org/10.1145/3167918.3167940This paper describes two different fault injection attacks on the authenticated encryption stream cipher Tiaoxin-346, a third round candidate in the CAESAR cryptographic competition. The first type of fault injection uses a bit-flipping fault model to ...