1 | -- | 9 | Saad M. Saad. Application of fuzzy logic and genetic algorithm in biometric text-independent writer identification |
10 | -- | 18 | Fangjun Huang, Weiqi Luo, Jiwu Huang. Steganalysis of JPEG steganography with complementary embedding strategy |
19 | -- | 25 | Ning Chen, He-D. Xiao, Wanggen Wan. Audio hash function based on non-negative matrix factorisation of mel-frequency cepstral coefficients |
26 | -- | 32 | Yongfeng Huang, Shanyu Tang, Chunlan Bao, Yau Jim Yip. Steganalysis of compressed speech to detect covert voice over Internet protocol channels |
33 | -- | 42 | Tai-Pao Chuang, Che Wun Chiou, Shun-Shii Lin. Self-checking alternating logic bit-parallel gaussian normal basis multiplier with type-t |
43 | -- | 50 | Te-Cheng Hsu, Wen-Shyong Hsieh, John Y. Chiang, Tung-Shih Su. New watermark-removal method based on Eigen-image energy |
51 | -- | 59 | Feng Liu, Chuan-Kun Wu, Xi Jun Lin. Cheating immune visual cryptography scheme |
60 | -- | 68 | Mariano López, John Daugman, Enrique Cantó. Hardware-software co-design of an iris recognition algorithm |
69 | -- | 79 | Yao-Hsin Chou, Chi-Yuan Chen, Han-Chieh Chao, Jong Hyuk Park, Rui-Kai Fan. Quantum entanglement and non-locality based secure computation for future communication |