A comprehensive study of document security system, open issues and challenges
Published 2020 View Full Article
- Home
- Publications
- Publication Search
- Publication Details
Title
A comprehensive study of document security system, open issues and challenges
Authors
Keywords
-
Journal
MULTIMEDIA TOOLS AND APPLICATIONS
Volume -, Issue -, Pages -
Publisher
Springer Science and Business Media LLC
Online
2020-10-24
DOI
10.1007/s11042-020-10061-x
References
Ask authors/readers for more resources
Related references
Note: Only part of the references are listed.- Decentralized document version control using ethereum blockchain and IPFS
- (2019) N. Nizamuddin et al. COMPUTERS & ELECTRICAL ENGINEERING
- A new two-level information protection scheme based on visual cryptography and QR code with multiple decryptions
- (2019) Zhengxin Fu et al. MEASUREMENT
- Carbon Quantum Dots–Europium(III) Energy Transfer Architecture Embedded in Electrospun Nanofibrous Membranes for Fingerprint Security and Document Counterspy
- (2019) Rong Sheng Li et al. ANALYTICAL CHEMISTRY
- An efficient public key secure scheme for cloud and IoT security
- (2019) Chandrasegar Thirumalai et al. COMPUTER COMMUNICATIONS
- A comprehensive survey on the biometric recognition systems based on physiological and behavioral modalities
- (2019) Shaveta Dargan et al. EXPERT SYSTEMS WITH APPLICATIONS
- Authenticated Medical Documents Releasing with Privacy Protection and Release Control
- (2019) Jianghua Liu et al. IEEE Transactions on Dependable and Secure Computing
- Multimodal biometric scheme for human authentication technique based on voice and face recognition fusion
- (2018) Anter Abozaid et al. MULTIMEDIA TOOLS AND APPLICATIONS
- The challenge of detecting false documents at the border: Exploring the performance of humans, machines and their interaction
- (2018) Monica Gariup et al. International Journal of Critical Infrastructure Protection
- An overview of protection of privacy in multibiometrics
- (2017) Iynkaran Natgunanathan et al. MULTIMEDIA TOOLS AND APPLICATIONS
- Development of modified AES algorithm for data security
- (2016) Puneet Kumar et al. OPTIK
- Dual-source discrimination power analysis for multi-instance contactless palmprint recognition
- (2015) Lu Leng et al. MULTIMEDIA TOOLS AND APPLICATIONS
- Analysis of impersonation attacks on systems using RF fingerprinting and low-end receivers
- (2013) Saeed Ur Rehman et al. JOURNAL OF COMPUTER AND SYSTEM SCIENCES
- A Survey and Proposed Framework on the Soft Biometrics Technique for Human Identification in Intelligent Video Surveillance System
- (2012) Min-Gu Kim et al. JOURNAL OF BIOMEDICINE AND BIOTECHNOLOGY
- PalmHash Code vs. PalmPhasor Code
- (2012) Lu Leng et al. NEUROCOMPUTING
- Dual-key-binding cancelable palmprint cryptosystem for palmprint protection and information security
- (2011) Lu Leng et al. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS
Discover Peeref hubs
Discuss science. Find collaborators. Network.
Join a conversationAsk a Question. Answer a Question.
Quickly pose questions to the entire community. Debate answers and get clarity on the most important issues facing researchers.
Get Started