• Content Based Authentication of Visual Cryptography

      Wang, G; Yan, W-Q; Kankanhalli, M (Springer, 2016)
      Visual Cryptography (VC) has been developed as a significant research arena in media security. Despite of its obvious strengths, recent investigations have debated this scheme from adverse aspects, its problem is lack of ...
    • Modelling of GTAW Weld Pool under Marangoni Convection

      Nates, RJ; Wang, G; Pasang, T (SCENZ-IChemE, 2013)
      With several different fusion welding processes, the melted weld pool profile which ultimately solidifies to form the fusion zone, diverging greatly by a wide variety of factors, e.g. base material, workpiece size, machine ...
    • The State-of-the-art Technology of Currency Identification: A Comparative Study

      Wang, G; Wu, X; Yan, W-Q (IGI Global, 2017)
      The security issue of currency has attracted awareness from the public. Despite the development of applying various anti-counterfeit methods on currency notes, cheaters are able to produce illegal copies and circulate them ...