Sciweavers

104 search results - page 11 / 21
» Biometric Based Cryptographic Key Generation from Faces
Sort
View
CNSR
2008
IEEE
123views Communications» more  CNSR 2008»
15 years 6 months ago
Secret Key Extraction in Ultra Wideband Channels for Unsynchronized Radios
Secure communications in UWB based on cryptographic keys generated from channel measurements without a trusted third party have been developed. The fine time resolution of UWB al...
Masoud Ghoreishi Madiseh, Michael L. McGuire, Step...
FGR
2008
IEEE
301views Biometrics» more  FGR 2008»
15 years 6 months ago
3D facial geometry recovery via group-wise optical flow
We describe an algorithm for automatically finding correspondences from face video sequences. This method is useful to many applications such as face tracking, face modeling and ...
Hui Fang, Nicholas Costen, David Cristinacce, John...
CSFW
2002
IEEE
15 years 4 months ago
Types and Effects for Asymmetric Cryptographic Protocols
We present the first type and effect system for proving authenticity properties of security protocols based on asymmetric cryptography. The most significant new features of our ...
Andrew D. Gordon, Alan Jeffrey
ACNS
2010
Springer
172views Cryptology» more  ACNS 2010»
15 years 3 months ago
Secure Sketch for Multiple Secrets
Secure sketches are useful in extending cryptographic schemes to biometric data since they allow recovery of fuzzy secrets under inevitable noise. In practice, secrets derived from...
Chengfang Fang, Qiming Li, Ee-Chien Chang
BIOSIG
2007
170views Biometrics» more  BIOSIG 2007»
15 years 1 months ago
Privacy enhancing technology for a 3D-face recognition system
: 2D Face images are traditionally used in civil governmental applications. An extension from 2D to 3D images will lead to several advantages when setting up automated authenticati...
Xuebing Zhou, Tom A. M. Kevenaar, Emile Kelkboom, ...