In this paper, we present a flexible accelerator designed for networking applications. The accelerator can be utilized efficiently by a variety of Network Processor designs. Most ...
A biometric identification procedure usually contains two stages: registration and authentication. Most biometric systems capture multiple samples of the same biometric trait (e.g...
Yong Li, Jianping Yin, En Zhu, Chunfeng Hu, Hui Ch...
Biometric based authentication can provide strong security guarantee about the identity of users. Security of biometric data is particularly important as compromise of the data wil...
: A new biometric system is proposed which replaces the template match known from presently used biometric systems by a more powerful approach that uses error tolerant coding. This...
This paper presents invariants under gamma correction and similarity transformations. The invariants are local features based on differentials which are implemented using derivati...