AUTHENTICATION AND SECURITY MECHANISMS FOR DIGITAL IMAGES

被引:0
|
作者
WONG, ST
HUANG, HK
GOULD, RG
机构
关键词
D O I
暂无
中图分类号
R8 [特种医学]; R445 [影像诊断学];
学科分类号
1002 ; 100207 ; 1009 ;
摘要
引用
收藏
页码:258 / 258
页数:1
相关论文
共 50 条
  • [41] Research on Security Protection Mechanisms of Digital Content
    Gu, Jinjie
    Cheng, Yuzhu
    PROCEEDINGS 2010 3RD IEEE INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND INFORMATION TECHNOLOGY, (ICCSIT 2010), VOL 1, 2010, : 155 - 158
  • [42] Transparency, Trust, and Security Needs for the Design of Digital News Authentication Tools
    Francis E.
    Monroe A.
    Sidnam-Mauch E.
    Ivancsics B.
    Washington E.
    Mcgregor S.E.
    Bonneau J.
    Caine K.
    Proceedings of the ACM on Human-Computer Interaction, 2023, 7 (1 CSCW)
  • [43] Research on Digital Encryption Security Information System Based on Identity Authentication
    Bu, Xu
    PROCEEDINGS OF THE 2018 2ND INTERNATIONAL CONFERENCE ON ECONOMIC DEVELOPMENT AND EDUCATION MANAGEMENT (ICEDEM 2018), 2018, 290 : 175 - 178
  • [44] Digital Signature Technology Research of Distance Education Network Security Authentication
    Wei Wenshan
    Meng Xianxiao
    Li Haihua
    MANUFACTURING SYSTEMS AND INDUSTRY APPLICATIONS, 2011, 267 : 831 - 836
  • [45] Research on Security User Authentication Based on Digital Signature in Electronic Commerce
    Jiang, KeWei
    Fu, Ke
    Gao, ZhiBiao
    EIGHTH WUHAN INTERNATIONAL CONFERENCE ON E-BUSINESS, VOLS I-III, 2009, : 812 - 817
  • [46] Sweet-Spotting Security and Usability for Intelligent Graphical Authentication Mechanisms
    Belk, Marios
    Pamboris, Andreas
    Fidas, Christos
    Katsini, Christina
    Avouris, Nikolaos
    Samaras, George
    2017 IEEE/WIC/ACM INTERNATIONAL CONFERENCE ON WEB INTELLIGENCE (WI 2017), 2017, : 252 - 259
  • [47] Cyber Physical Security Protection in Online Authentication Mechanisms for Banking Systems
    Jama, Ahmed Yousuf
    Gucluoglu, Tansal
    Siraj, Maheyzah Md
    INTELLIGENT COMPUTING, VOL 2, 2019, 857 : 1021 - 1031
  • [48] Fractal digital images' synthesis and application in security holograms
    Cao, HQ
    Zhu, GX
    Zhu, YT
    Zhang, ZQ
    Cao, YL
    Ge, JW
    Li, X
    HOLOGRAPHY 2000, 2000, 4149 : 221 - 226
  • [49] New applications of modulated digital images in document security
    Lee, RA
    Leech, PW
    McCarthy, LD
    Swiegers, GF
    OPTICAL SECURITY AND COUNTERFEIT DETERRENCE TECHNIQUES VI, 2006, 6075
  • [50] Modulated digital images for biometric and other security applications
    McCarthy, LD
    Lee, R
    Swiegers, GF
    OPTICAL SECURITY AND COUNTERFEIT DETERRENCE TECHNIQUES V, 2004, 5310 : 103 - 116