Sciweavers

485 search results - page 52 / 97
» Authentication by Biometric Verification
Sort
View
ICIP
2000
IEEE
15 years 11 months ago
Compression Tolerant Watermarking for Image Verification
Digital Watermarking is seen as a viable solution to authentication of multimedia data and hence its security, especially in a networked environment. In this paper we present a ne...
Harpal S. Bassali, Jatin Chhugani, Saurabh Agarwal...
BIOID
2008
150views Biometrics» more  BIOID 2008»
14 years 11 months ago
A Palmprint Verification System Based on Phase Congruency Features
The paper presents a fully automatic palmprint verification system which uses 2D phase congruency to extract line features from a palmprint image and subsequently performs linear d...
Vitomir Struc, Nikola Pavesic
FGR
2006
IEEE
100views Biometrics» more  FGR 2006»
15 years 1 months ago
Photometric Normalisation for Component-based Face Verification
As an extension to prior work by the authors in the area of photometric normalisation for face verification, we apply these algorithms in a component-based framework. In particula...
James Short, Josef Kittler, Kieron Messer
CCS
2008
ACM
14 years 11 months ago
Cognitive security for personal devices
Humans should be able to think of computers as extensions of their body, as craftsmen do with their tools. Current security models, however, are too unlike those used in human min...
Rachel Greenstadt, Jacob Beal
CANS
2006
Springer
114views Cryptology» more  CANS 2006»
15 years 1 months ago
Achieving Multicast Stream Authentication Using MDS Codes
We address the multicast stream authentication problem when the communication channel is under the control of an opponent who can drop, reorder or inject data. In such a network m...
Christophe Tartary, Huaxiong Wang