2013
DOI: 10.1007/978-81-322-1000-9_33
|View full text |Cite
|
Sign up to set email alerts
|

ECC Based Biometric Encryption of Compressed Image for Security over Network Channels

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
3
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
6

Relationship

0
6

Authors

Journals

citations
Cited by 9 publications
(3 citation statements)
references
References 4 publications
0
3
0
Order By: Relevance
“…11 IDS is the software or the hardware system that examines host or network traffic for detecting the unconventional behaviors and attacks. [11][12][13][14] The IDS detect the computer attacks through the examination of different data records collected in network. 4,[15][16][17] The purpose of IDS is to find and classify the network behavior into abnormal or normal based on certain rules.…”
Section: Introductionmentioning
confidence: 99%
“…11 IDS is the software or the hardware system that examines host or network traffic for detecting the unconventional behaviors and attacks. [11][12][13][14] The IDS detect the computer attacks through the examination of different data records collected in network. 4,[15][16][17] The purpose of IDS is to find and classify the network behavior into abnormal or normal based on certain rules.…”
Section: Introductionmentioning
confidence: 99%
“…The loan distribution is the major business unit in the majority of banks. Investing the assets safely is the goal of banking sector (Prasanalakshmi and Kannammal, 2013;Prasanalakshmi and Kumar Pugalendhi, 2020). Till today, several banks and financial sectors have no assurance even after proper verification to approve loans (Arun et al, 2016).…”
Section: Introductionmentioning
confidence: 99%
“…The authors of 25 study the stabilization problem of stochastic nonlinear delay systems with exogenous disturbances and the event-triggered feedback control. The issue of stabilization is intricately connected to matters of consensus and stability, [26][27][28][29][30][31][32] and in many practical applications, stabilization is frequently necessary to achieve satisfactory system performance. 33 For instance, in, 34 The present study focused on the examination of non-fragile sampled-data stabilization for a certain category of linear systems with probabilistic timevarying delays.…”
mentioning
confidence: 99%