Author of the publication

A High-Security EEG-Based Login System with RSVP Stimuli and Dry Electrodes.

, , , , , , , , and . IEEE Trans. Inf. Forensics Secur., 11 (12): 2635-2647 (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Less detectable JPEG steganography method based on heuristic optimization and BCH syndrome coding., , and . MM&Sec, page 131-140. ACM, (2009)Fast BCH Syndrome Coding for Steganography., , and . Information Hiding, volume 5806 of Lecture Notes in Computer Science, page 48-58. Springer, (2009)Security Evaluation of Generalized Patchwork Algorithm from Cryptanalytic Viewpoint., , and . KES (1), volume 3681 of Lecture Notes in Computer Science, page 1240-1247. Springer, (2005)Weighted sparse representation using a learned distance metric for face recognition., , , and . ICIP, page 4594-4598. IEEE, (2015)Parkinson Disease Classification based on binary coded genetic algorithm and Extreme learning machine., and . ISSNIP, page 1-6. IEEE, (2014)Binary Coded Genetic Algorithm with Ensemble Classifier for feature selection in JPEG steganalysis., and . ISSNIP, page 1-6. IEEE, (2014)Scheduling Second-Order Computational Load in Master-Slave Paradigm., , , , and . IEEE Trans. Aerosp. Electron. Syst., 48 (1): 780-793 (2012)Histogram-Based Image Hashing for Searching Content-Preserving Copies., and . Trans. Data Hiding Multim. Secur., (2011)An Efficient Pattern Substitution Watermarking Method for Binary Images., and . IWDW, volume 6526 of Lecture Notes in Computer Science, page 181-188. Springer, (2010)Ternary Data Hiding Technique for JPEG Steganography., and . IWDW, volume 6526 of Lecture Notes in Computer Science, page 202-210. Springer, (2010)