Kannan Karthik

According to our database1, Kannan Karthik authored at least 22 papers between 2004 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Image life trails based on contrast reduction models for face counter-spoofing.
EURASIP J. Inf. Secur., December, 2023

2021
Graph Synthesis for Pig Breed Classification From Muzzle Images.
IEEE Access, 2021

2020
Face anti-spoofing by identity masking using random walk patterns and outlier detection.
Pattern Anal. Appl., 2020

Correction of complex purple fringing by green-channel compensation and local luminance adaptation.
IET Image Process., 2020

2019
Identity Independent Face Anti-spoofing Based on Random Scan Patterns.
Proceedings of the Pattern Recognition and Machine Intelligence, 2019

2018
Iterative content adaptable purple fringe detection.
Signal Image Video Process., 2018

Face Anti-spoofing Based on Specular Feature Projections.
Proceedings of 3rd International Conference on Computer Vision and Image Processing - CVIP 2018, Jabalpur, India, September 29, 2018

Blind Quality Assessment of PFA-Affected Images Based on Chromatic Eigenvalue Ratio.
Proceedings of 3rd International Conference on Computer Vision and Image Processing - CVIP 2018, Jabalpur, India, September 29, 2018

Investigation on the Muzzle of a Pig as a Biometric for Breed Identification.
Proceedings of 3rd International Conference on Computer Vision and Image Processing - CVIP 2018, Jabalpur, India, September 29, 2018

2017
Face anti-spoofing based on sharpness profiles.
Proceedings of the 2017 IEEE International Conference on Industrial and Information Systems, 2017

Key independent encrypted face clustering.
Proceedings of the 2017 IEEE International Conference on Industrial and Information Systems, 2017

Muzzle Analysis for Biometric Identification of Pigs.
Proceedings of the Ninth International Conference on Advances in Pattern Recognition, 2017

2015
Key search and adaptation based on association rules for backward secrecy.
Proceedings of the 2015 IEEE International Workshop on Information Forensics and Security, 2015

Detection of purple fringing aberration patterns and its application to forensic analysis of spliced images.
Proceedings of the 2015 International Conference on Advances in Computing, 2015

2013
Transparent hashing in the encrypted domain for privacy preserving image retrieval.
Signal Image Video Process., 2013

Virtually Reconfigurable Secure Wireless Networks Using Broadcast Tokens.
Proceedings of the Network and System Security - 7th International Conference, 2013

2012
A robust alignment-free fingerprint hashing algorithm based on minimum distance graphs.
Pattern Recognit., 2012

2010
MIX-SPLIT: Controlled mixing of secrets and traceable pseudonym generation using codebooks.
Proceedings of the 2010 IEEE International Workshop on Information Forensics and Security, 2010

2007
Decryption Key Design for Joint Fingerprinting and Decryption in the Sign Bit Plane for Multicast Content Protection.
Int. J. Netw. Secur., 2007

A Unified Approach To Construct Non-perfect Secret Sharing And Traitor Tracing Schemes.
Proceedings of the 2007 International Conference on Security & Management, 2007

A novel anti-collusion coding scheme tailored to track linear collusions.
Proceedings of the Third International Symposium on Information Assurance and Security, 2007

2004
Video Fingerprinting and Encryption Principles for Digital Rights Management.
Proc. IEEE, 2004


  Loading...