Skip to main content
Figure 7: Second scenario. Biometric signals authentication for 112 stego-objects, under four different JPEG compression ratios and various BERs. SC2: second scenario. PR: proposed scheme (red). ZG: Scheme by Zhang et al. (black). CR: compression ratio. | EURASIP Journal on Information Security

Figure 7: Second scenario. Biometric signals authentication for 112 stego-objects, under four different JPEG compression ratios and various BERs. SC2: second scenario. PR: proposed scheme (red). ZG: Scheme by Zhang et al. (black). CR: compression ratio.

From: Video-Object Oriented Biometrics Hiding for User Authentication under Error-Prone Transmissions

Figure 7: Second scenario. Biometric signals authentication for 112 stego-objects, under four different JPEG compression ratios and various BERs. SC2: second scenario. PR: proposed scheme (red). ZG: Scheme by Zhang et al. (black). CR: compression ratio.

Second scenario. Biometric signals authentication for 112 stego-objects, under four different JPEG compression ratios and various BERs. SC2: second scenario. PR: proposed scheme (red). ZG: Scheme by Zhang et al. (black). CR: compression ratio.

Back to article page