Sciweavers

485 search results - page 70 / 97
» Authentication by Biometric Verification
Sort
View
CHES
2010
Springer
210views Cryptology» more  CHES 2010»
14 years 10 months ago
Flash Memory 'Bumping' Attacks
This paper introduces a new class of optical fault injection attacks called bumping attacks. These attacks are aimed at data extraction from secure embedded memory, which usually s...
Sergei Skorobogatov
PR
2006
99views more  PR 2006»
14 years 9 months ago
Authenticating corrupted photo images based on noise parameter estimation
Photo image authentication is an interesting and demanding field in the computer vision and image processing community. This research is motivated by its wide range of application...
Sang-Woong Lee, Ho-Choul Jung, Bon-Woo Hwang, Seon...
SSWMC
2004
14 years 11 months ago
Multimedia document authentication using on-line signatures as watermarks
Authentication of digital documents is an important concern as digital documents are replacing the traditional paper-based documents for official and legal purposes. This is espec...
Anoop M. Namboodiri, Anil K. Jain
ICPR
2008
IEEE
15 years 4 months ago
A performance evaluation of filter design and coding schemes for palmprint recognition
Palmprint recognition, as one of the most promising biometrics, has received considerable recent biometric research interest. Among various palmprint recognition techniques, codin...
Feng Yue, Wangmeng Zuo, Kuanquan Wang, David Zhang
ICB
2009
Springer
132views Biometrics» more  ICB 2009»
14 years 7 months ago
Fusion in Multibiometric Identification Systems: What about the Missing Data?
Many large-scale biometric systems operate in the identification mode and include multimodal information. While biometric fusion is a well-studied problem, most of the fusion schem...
Karthik Nandakumar, Anil K. Jain, Arun Ross