Sciweavers

485 search results - page 53 / 97
» Authentication by Biometric Verification
Sort
View
TIT
2008
84views more  TIT 2008»
14 years 11 months ago
Information Theoretic Bounds on Authentication Systems in Query Model
Authentication codes provide message integrity guarantees in an information theoretic sense within a symmetric key setting. Information theoretic bounds on the success probability...
Reihaneh Safavi-Naini, Peter R. Wild
ICB
2009
Springer
144views Biometrics» more  ICB 2009»
15 years 6 months ago
Parts-Based Face Verification Using Local Frequency Bands
ic Presentations - Abstracts list Monday, August 31st Session 1 – Chairman: Jean-Marc Odobez Title Quality Measures and Stacking Classifiers in Multimodal Biometric Recognition S...
Chris McCool, Sébastien Marcel
ICIP
2006
IEEE
16 years 1 months ago
Tamper-Localization Watermarking with Systematic Error Correcting Code
Abstract-- This paper presents an authentication watermarking method which can localize the tampering regions in fine granularity. Unlike the previous block-wise Tampering-Localiza...
Yongdong Wu
ASIAN
2007
Springer
118views Algorithms» more  ASIAN 2007»
15 years 6 months ago
Digital Rights Management Using a Master Control Device
This paper focuses on the problem of preventing the illegal copying of digital content whilst allowing content mobility within a single user domain. This paper proposes a novel sol...
Imad M. Abbadi
IJNSEC
2008
113views more  IJNSEC 2008»
14 years 11 months ago
A Fragile Associative Watermarking on 2D Barcode for Data Authentication
Two-dimensional (2D) barcode has improved the information encoded capacity, and it also has enriched the applications of barcode technique. Recently, there are researches dealing ...
Jau-Ji Shen, Po-Wei Hsu