Sciweavers

485 search results - page 43 / 97
» Authentication by Biometric Verification
Sort
View
BIOSIG
2010
152views Biometrics» more  BIOSIG 2010»
14 years 7 months ago
Biometric Systems in Future Preventive Scenarios - Legal Issues and Challenges
: The privacy and data protection challenges posed by biometric systems have been discussed in detail in the last years. Both security opportunities and privacy risks however may d...
Gerrit Hornung, Monika Desoi, Matthias Pocs
ICB
2009
Springer
184views Biometrics» more  ICB 2009»
15 years 4 months ago
Challenges and Research Directions for Adaptive Biometric Recognition Systems
Biometric authentication using mobile devices is becoming a convenient and important means to secure access to remote services such as telebanking and electronic transactions. Such...
Norman Poh, Rita Wong, Josef Kittler, Fabio Roli
ICIP
2006
IEEE
15 years 11 months ago
Rate-Distortion Optimized Streaming of Authenticated Video
Stream authentication methods usually impose overhead and dependency among packets. The straightforward application of state-of-the-art rate-distortion (R-D) optimized streaming t...
Zhishou Zhang, Qibin Sun, Wai-Choong Wong, John G....
BIOSIG
2010
143views Biometrics» more  BIOSIG 2010»
14 years 7 months ago
Fingerprint Recognition with Cellular Partitioning and Co-Sinusoidal Triplets
: In this fingerprint verification approach, a fingerprint image is divided into equally sized cells and the pattern is represented by a substitute resulting in a feature vector of...
Jan Hirzel, Daniel Hartung, Christoph Busch
PRL
2007
180views more  PRL 2007»
14 years 9 months ago
Symmetric hash functions for secure fingerprint biometric systems
Securing biometrics databases from being compromised is one of the most important challenges that must be overcome in order to demonstrate the viability of biometrics based authen...
Sergey Tulyakov, Faisal Farooq, Praveer Mansukhani...