Sciweavers

485 search results - page 53 / 97
» Authentication by Biometric Verification
Sort
View
TIT
2008
84views more  TIT 2008»
14 years 9 months ago
Information Theoretic Bounds on Authentication Systems in Query Model
Authentication codes provide message integrity guarantees in an information theoretic sense within a symmetric key setting. Information theoretic bounds on the success probability...
Reihaneh Safavi-Naini, Peter R. Wild
ICB
2009
Springer
144views Biometrics» more  ICB 2009»
15 years 4 months ago
Parts-Based Face Verification Using Local Frequency Bands
ic Presentations - Abstracts list Monday, August 31st Session 1 – Chairman: Jean-Marc Odobez Title Quality Measures and Stacking Classifiers in Multimodal Biometric Recognition S...
Chris McCool, Sébastien Marcel
ICIP
2006
IEEE
15 years 11 months ago
Tamper-Localization Watermarking with Systematic Error Correcting Code
Abstract-- This paper presents an authentication watermarking method which can localize the tampering regions in fine granularity. Unlike the previous block-wise Tampering-Localiza...
Yongdong Wu
ASIAN
2007
Springer
118views Algorithms» more  ASIAN 2007»
15 years 3 months ago
Digital Rights Management Using a Master Control Device
This paper focuses on the problem of preventing the illegal copying of digital content whilst allowing content mobility within a single user domain. This paper proposes a novel sol...
Imad M. Abbadi
IJNSEC
2008
113views more  IJNSEC 2008»
14 years 9 months ago
A Fragile Associative Watermarking on 2D Barcode for Data Authentication
Two-dimensional (2D) barcode has improved the information encoded capacity, and it also has enriched the applications of barcode technique. Recently, there are researches dealing ...
Jau-Ji Shen, Po-Wei Hsu