The widespread use of public networks, such as the Internet, for the exchange of sensitive data, like legally valid documents and business transactions, poses severe security cons...
Image steganography is a covert communication method that uses an image as the cover to hide the truth from potential attackers that some secret message hidden in the image is bei...
With the growing number of acquired physiological and behavioral biometric samples, biometric data sets are experiencing tremendous growth. As database sizes increase, exhaustive ...
This paper introduces a novel camera mouse driven by 3D model based visual face tracking. While camera becomes standard configuration for personal computer(PC) and computer speed...
This paper presents a novel face representation and recognition approach. The face image is first decomposed by multi-scale and multi-orientation Gabor filters and local binary ...
Zhen Lei, ShengCai Liao, Ran He, Matti Pietikä...