Cargando…
A Smart Image Encryption Technology via Applying Personal Information and Speaker-Verification System
In this paper, a framework for authorization and personal image protection that applies user accounts, passwords, and personal I-vectors as the keys for ciphering the image content was developed and connected. There were two main systems in this framework. The first involved a speaker verification s...
Autores principales: | Li, Shih-Yu, Lee, Chun-Hung, Tam, Lap-Mou |
---|---|
Formato: | Online Artículo Texto |
Lenguaje: | English |
Publicado: |
MDPI
2023
|
Materias: | |
Acceso en línea: | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC10347242/ https://www.ncbi.nlm.nih.gov/pubmed/37447756 http://dx.doi.org/10.3390/s23135906 |
Ejemplares similares
-
A Smart System for an Assessment of the Remaining Useful Life of Ball Bearings by Applying Chaos-Based Health Indicators and a Self-Selective Regression Model
por: Li, Shih-Yu, et al.
Publicado: (2023) -
Compression/encryption technology applied to Dicom/digitised mammography
por: Grant, RW, et al.
Publicado: (2004) -
Modern cryptography: applied mathematics for encryption and information security
por: Easttom, Chuck
Publicado: (2016) -
Fall Recognition Based on an IMU Wearable Device and Fall Verification through a Smart Speaker and the IoT
por: Lin, Hsin-Chang, et al.
Publicado: (2023) -
Web-browser encryption of personal health information
por: Morse, Richard E, et al.
Publicado: (2011)