• Publications
  • Influence
Linear Discriminant Analysis Based on L1-Norm Maximization
  • Fujin Zhong, J. Zhang
  • Mathematics, Computer Science
  • IEEE Transactions on Image Processing
  • 20 March 2013
TLDR
This paper proposes a simple but effective robust LDA version based on L1-norm maximization, which learns a set of local optimal projection vectors by maximizing the ratio of the L 1-norm-based between-class dispersion and the L1 norm-based within- class dispersion. Expand
  • 130
  • 26
Intelligent Transportation Systems
TLDR
This issues Works in Progress department features 10 interesting ongoing intelligent transportation systems projects. Expand
  • 313
  • 21
  • PDF
Chaotic hash-based fingerprint biometric remote user authentication scheme on mobile devices
This paper presents an efficient and practical chaotic hash-based fingerprint biometric remote user authentication scheme on mobile devices e.g. cell phone and PDA. Our scheme is completely based onExpand
  • 152
  • 11
Face recognition with enhanced local directional patterns
TLDR
This paper presents a novel approach based on enhanced local directional patterns (ELDP) to face recognition, which adopts local edge gradient information to represent face images. Expand
  • 78
  • 10
Cryptanalysis and improvement on two efficient remote user authentication scheme using smart cards
TLDR
In 2002, Chien et al. proposed an efficient remote authentication scheme using smart cards, in which only few hashing operations are required. Expand
  • 145
  • 10
  • PDF
Discriminant Locality Preserving Projections Based on L1-Norm Maximization
TLDR
Conventional discriminant locality preserving projection (DLPP) is a dimensionality reduction technique based on manifold learning, which has demonstrated good performance in pattern recognition. Expand
  • 63
  • 10
Improving the security of 'a flexible biometrics remote user authentication scheme'
TLDR
We demonstrate that Lin-Lai's scheme performs only unilateral authentication (only client authentication) and there is no mutual authentication between user and remote system, thus their scheme is susceptible to the server spoofing attack. Expand
  • 179
  • 8
Chaotic keyed hash function based on feedforward–feedback nonlinear digital filter
Abstract In this Letter, we firstly construct an n-dimensional chaotic dynamic system named feedforward–feedback nonlinear filter (FFNF), and then propose a novel chaotic keyed hash algorithm usingExpand
  • 99
  • 7
Secure group key agreement protocol based on chaotic Hash
TLDR
We present a secure key agreement protocol based on chaotic Hash that can satisfy the contributory nature of key agreement. Expand
  • 71
  • 6
Performance Analysis of a Block-Neighborhood-Based Self-Recovery Fragile Watermarking Scheme
TLDR
In this paper, we present the performance analysis of a self-recovery fragile watermarking scheme using block-neighbor- hood tamper characterization. Expand
  • 66
  • 6
  • PDF