Sciweavers

3145 search results - page 27 / 629
» Key Improvements to XTR
Sort
View
ICIP
2005
IEEE
15 years 11 months ago
Generalized optimal thresholding for biometric key generation using face images
1 In this paper, we study biometric key generation using face images. Given a face image, a set of biometric features are extracted. Each feature is compared with a threshold to ge...
Wende Zhang, Tsuhan Chen
ICIAP
2005
ACM
15 years 9 months ago
Security Enhancement of Visual Hashes Through Key Dependent Wavelet Transformations
Parameterized wavelet filters and wavelet packet subband structures are discussed to be used as key dependent wavelet transforms in order to enhance the security of wavelet based h...
Albert Meixner, Andreas Uhl
DBSEC
2010
137views Database» more  DBSEC 2010»
14 years 11 months ago
Constructing Key Assignment Schemes from Chain Partitions
Abstract. In considering a problem in access control for scalable multimedia formats, we have developed new methods for constructing a key assignment scheme. Our first contribution...
Jason Crampton, Rosli Daud, Keith M. Martin
IEEECIT
2006
IEEE
15 years 3 months ago
An Efficient LU Decomposition-based Key Pre-distribution Scheme for Ensuring Security in Wireless Sensor Networks
In this paper we propose an improved and efficient key pre-distribution scheme for wireless sensor networks. Our scheme significantly increases the storage efficiency and security...
Al-Sakib Khan Pathan, Tran Thanh Dai, Choong Seon ...
EUROCRYPT
1990
Springer
15 years 1 months ago
A Known Plaintext Attack on Two-Key Triple Encryption
A chosen-plaintext attack on two-key triple encryption noted by Merkle and Hellman is extended to a known-plaintext attack. The known-plaintext attack has lower memory requirements...
Paul C. van Oorschot, Michael J. Wiener