Sciweavers

231 search results - page 36 / 47
» Biometric Identification
Sort
View
ICIAP
2009
ACM
14 years 7 months ago
On the Quantitative Estimation of Short-Term Aging in Human Faces
Facial aging has been only partially studied in the past and mostly in a qualitative way. This paper presents a novel approach to the estimation of facial aging aimed to the quanti...
Marcos Ortega, Linda Brodo, Manuele Bicego, Massim...
83
Voted
PDCAT
2005
Springer
15 years 2 months ago
Trusted Computing-Based Security Architecture For 4G Mobile Networks
In this paper security requirements and security architecture for 4G systems are presented with the consideration of Trusted Computing (TC) for mobile equipment (ME). The security...
Yu Zheng, Dake He, Weichi Yu, Xiaohu Tang
APCCAS
2006
IEEE
268views Hardware» more  APCCAS 2006»
15 years 3 months ago
A One-Dimensional Technique for Embedding Data in A JPEG Color Image
—A method of embedding data in a JPEG color image for applications such as authentication of an employee carrying a picture identification card is described. Embedding of data, s...
Kaliappan Gopalan
ICPR
2010
IEEE
14 years 7 months ago
Towards a Better Understanding of the Performance of Latent Fingerprint Recognition in Realistic Forensic Conditions
Abstract-- This work studies the performance of a stateof-the-art fingerprint recognition technology, in several practical scenarios of interest in forensic casework. First, the di...
Maria Puertas, Daniel Ramos, Julian Fiérrez...
WIS
2004
14 years 10 months ago
AuthenLink: A User-Centred Authentication System for a Secure Mobile Commerce
We envision an environment where humans communicate directly with computers without additional authentication inputs like passwords, passphrases, PINs (Personal Identification Num...
Christina Braz, Esma Aïmeur