The security policy of an information system may include a wide range of different requirements. The literature has primarily focused on access and information flow control require...
Fusing the scores of several biometric systems is a very promising approach to improve the overall system’s accuracy. Despite many works in the literature, it is surprising that ...
Local Gabor features (jets) have been widely used in face recognition systems. Once the sets of jets have been extracted from the two faces to be compared, a proper measure of simi...
A camera-based online signature verification system is proposed in this paper. One web camera is used for data acquisition, and a sequential Monte Carlo method is used for tracki...
Most block-based image authentication techniques that are presented in the literature sacrifice localization accuracy in order to resist vector quantization (VQ) counterfeiting att...