Sciweavers

104 search results - page 16 / 21
» Biometric Based Cryptographic Key Generation from Faces
Sort
View
ACIVS
2007
Springer
15 years 5 months ago
Spatiotemporal Fusion Framework for Multi-camera Face Orientation Analysis
In this paper, we propose a collaborative technique for face orientation estimation in smart camera networks. The proposed spatiotemporal feature fusion analysis is based on active...
Chung-Ching Chang, Hamid K. Aghajan
ICCAD
2000
IEEE
110views Hardware» more  ICCAD 2000»
15 years 4 months ago
Computing Phase Noise Eigenfunctions Directly from Steady-State Jacobian Matrices
The main effort in oscillator phase noise calculation lies in computing a vector function called the Perturbation Projection Vector (PPV). Current techniques for PPV calculation u...
Alper Demir, David E. Long, Jaijeet S. Roychowdhur...
JAR
2000
145views more  JAR 2000»
14 years 11 months ago
Logical Cryptanalysis as a SAT Problem
Cryptographic algorithms play a key role in computer security and the formal analysis of their robustness is of utmost importance. Yet, logic and automated reasoning tools are seld...
Fabio Massacci, Laura Marraro
CGF
2008
177views more  CGF 2008»
14 years 11 months ago
Expressive Facial Gestures From Motion Capture Data
Human facial gestures often exhibit such natural stochastic variations as how often the eyes blink, how often the eyebrows and the nose twitch, and how the head moves while speaki...
Eunjung Ju, Jehee Lee
WEA
2005
Springer
109views Algorithms» more  WEA 2005»
15 years 5 months ago
Synchronization Fault Cryptanalysis for Breaking A5/1
Abstract. A5/1 pseudo-random bit generator, known from GSM networks, potentially might be used for different purposes, such as secret hiding during cryptographic hardware testing, ...
Marcin Gomulkiewicz, Miroslaw Kutylowski, Heinrich...