| Filename | Size | Update |
|---|
| image processing |
| ................\06274348.pdf |
| ................\1-s2.0-S0167865511003886-main.pdf |
| ................\11Iris Recognition Method Based on the Optimized.pdf |
| ................\2-Real-time face recognition demonstration..pdf |
| ................\222Iris segmentation for non-cooperative recognition.pdf |
| ................\44An Accurate and Easy Method towards Iris Localization.pdf |
| ................\A New Biometric-based User Authentication Scheme without using Password for.pdf |
| ................\A Novel Data Embedding Method Using Adaptive Pixel Pair Matching |
| ................\................................................................\A Novel Data Embedding Method Using Adaptive Pixel Pair Matching.docx |
| ................\A Probabilistic Model of (t | n) Visual Cryptography Scheme |
| ................\.........................................................\A Probabilistic Model of (t | n) Visual Cryptography Scheme.docx |
| ................\Active Visual Segmentation |
| ................\..........................\Active Visual Segmentation.docx |
| ................\Biometric Personal Identification Based on Iris-java.pdf |
| ................\cbir_using_iga-matlab.pdf |
| ................\ieeee-2012-image processing-java.pdf |
| ................\Image Segmentation Based on the Poincar?Map Method |
| ................\..................................................\Image Segmentation Based on the Poincar?Map Method.docx |
| ................\Improving Various Reversible Data Hiding Schemes Via Optimal Codes |
| ................\..................................................................\Improving Various Reversible Data Hiding Schemes Via Optimal Codes for Binary Covers.docx |
| ................\Iris Feature Extraction and Recognition Using.pdf |
| ................\K-N SECRET SHARING VISUAL CRYPTOGRAPHY |
| ................\......................................\K-N SECRET SHARING VISUAL CRYPTOGRAPHY.docx |
| ................\Multiple exposure fusion for high dynamic range image acquisition |
| ................\.................................................................\Multiple exposure fusion for high dynamic range image acquisition.docx |
| ................\Non-Orthogonal View Iris Recognition System.pdf |
| ................\Personal Identification from Iris Images Using Localized Radon Transform.pdf |
| ................\Scalable and Secure Sharing of Personal Health Records |
| ................\......................................................\Scalable and Secure Sharing of Personal Health Records.docx |
| ................\......................................................\scalableandsecuresharingofpersonalhealthrecordsincloudcomputingusingattribute-basedencryption.pdf |
| ................\Semisupervised Biased Maximum Margin Analysis |
| ................\.............................................\Semisupervised Biased Maximum Margin Analysis.docx |
| ................\View-invariant action recognition based on Artificial Neural Networks |
| ................\.....................................................................\View-invariant action recognition based on Artificial Neural Networks.docx |