• Analysis of a secure virtual desktop infrastructure system

      Tong, Yijie (Auckland University of Technology, 2015)
      With an increasing number of personal computers introduced in schools, enterprises and other large organizations, workloads of system administrators have been on the rise, due to the issues related to energy costs, IT ...
    • Comparative evaluations of image encryption algorithms

      Liu, Zhe (Auckland University of Technology, 2018)
      Information security has become a significant issue for protecting the secret information during transmission in practical applications in the era of information. A raft of information security schemes have been used in ...
    • Content based authentication of Visual Cryptography

      Wang, Guangyu (Auckland University of Technology, 2015)
      Visual Cryptography (VC) is perceived and studied as a perfect combination of secret sharing and digital image processing. The basic idea of VC is to split original secret image into several partitions which are also called ...
    • Cross models for twin recognition

      Gu, Datong (Auckland University of Technology, 2016)
      Nowadays, biometrics has become a popular tool in personal identification as it utilizes physiological or behavioral characteristics to identify individuals. Recent advancement in computer science has increased the accuracy ...
    • Currency Recognition Using Deep Learning

      Zhang, Qian (Auckland University of Technology, 2018)
      Currency is an indispensable part of our daily life. However, how to identify true and fake currencies has become the most important issue at present. If we use a computer for currency recognition, it will greatly improve ...
    • Detection and Recognition for Multiple Flames Using Deep Learning

      Xin, Chen (Auckland University of Technology, 2018)
      Object recognition is one of the critical fields of intelligent surveillance which can be applied to tackle multiple security issues. The recognition of a flame is an extended research direction which has significant ...
    • Tour navigation: a cloud based Tourist Navigation System

      Li, Junhao (Auckland University of Technology, 2014)
      Google and Apple have provided precise navigation and locating service in outdoor environment. Tourists in New Zealand are able to identify their current location on a map and use navigation services provided by smartphones ...
    • Visual blockchain using Merkle Tree

      Hu, Rui (Auckland University of Technology, 2019)
      Although our communities are paying extensive attention to the blockchain technology, it is still far away from real applications. Due to the combinations of multi-disciplinary technologies in blockchain, the popularization ...