Sciweavers

4018 search results - page 132 / 804
» Biometrics
Sort
View
ACSAC
2005
IEEE
15 years 10 months ago
Code Security Analysis of a Biometric Authentication System Using Automated Theorem Provers
Understanding the security goals provided by cryptographic protocol implementations is known to be difficult, since security requirements such as secrecy, integrity and authentici...
Jan Jürjens
SIBGRAPI
2003
IEEE
15 years 10 months ago
Image Feature Extraction for Application of Biometric Identification of Iris - A Morphological Approach
This paper presents a new approach based on morphological operators for application of biometric identification of individuals by segmentation and analysis of the iris. Algorithms ...
Joaquim de Mira Jr., Joceli Mayer
CIIA
2009
15 years 6 months ago
A Study on the Convergence of FingerHashing and a Secured Biometric System
Because biometrics-based authentication offers several advantages face to other authentication methods, it is important that such systems be designed to withstand attacks. Reliabil...
Rima Belguechi, Christophe Rosenberger
CORR
2010
Springer
124views Education» more  CORR 2010»
15 years 5 months ago
Feature Level Fusion of Face and Fingerprint Biometrics
The aim of this paper is to study the fusion at feature extraction level for face and fingerprint biometrics. The proposed approach is based on the fusion of the two traits by extr...
Ajita Rattani, Dakshina Ranjan Kisku, Manuele Bice...
111
Voted
JCP
2007
94views more  JCP 2007»
15 years 4 months ago
Low-Complexity Analysis of Repetitive Regularities for Biometric Applications
— Presented in this paper is a joint algorithm optimization and architecture design framework for analysis of repetitive regularities. Two closely coupled algorithm optimization ...
Lei Wang, Niral Patel