Author of the publication

A New Image Encryption Algorithm Based on Multiple Chaos System.

, , , and . ISECS, page 347-350. IEEE Computer Society, (2008)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Toward fast feature adaptation and localization for real-time face recognition systems., and . VCIP, volume 5150 of Proceedings of SPIE, page 1857-1865. SPIE, (2003)Real-time embedded face recognition for smart home., and . IEEE Trans. Consumer Electronics, 51 (1): 183-190 (2005)Multistage feature extraction for accurate face alignment., and . VCIP, volume 5308 of SPIE Proceedings, SPIE, (2004)Real-Time Facial Feature Extraction by Cascaded Parameter Prediction and Image Optimization., and . ICIAR (2), volume 3212 of Lecture Notes in Computer Science, page 651-659. Springer, (2004)Westworld: Fuzzing-Assisted Remote Dynamic Symbolic Execution of Smart Apps on IoT Cloud Platforms., , , , and . ACSAC, page 982-995. ACM, (2021)Seeing Is Believing: Extracting Semantic Information from Video for Verifying IoT Events., , , , , and . WISEC, page 101-112. ACM, (2024)Face biometrics with renewable templates., , , , and . Security, Steganography, and Watermarking of Multimedia Contents, volume 6072 of SPIE Proceedings, page 60720J. SPIE, (2006)Multistage Face Recognition Using Adaptive Feature Selection and Classification., , and . ACIVS, volume 3708 of Lecture Notes in Computer Science, page 17-25. Springer, (2005)Facial feature extraction using a cascade of model-based algorithms., and . AVSS, page 348-353. IEEE Computer Society, (2005)Exploiting the Inherent Limitation of L0 Adversarial Examples., , , and . RAID, page 293-307. USENIX Association, (2019)