Sciweavers

123 search results - page 9 / 25
» New attacks on SARI image authentication system
Sort
View
FGR
2006
IEEE
134views Biometrics» more  FGR 2006»
15 years 5 months ago
Local Binary Patterns as an Image Preprocessing for Face Authentication
One of the major problem in face authentication systems is to deal with variations in illumination. In a realistic scenario, it is very likely that the lighting conditions of the ...
Guillaume Heusch, Yann Rodriguez, Sébastien...
IH
2001
Springer
15 years 3 months ago
Blur/Deblur Attack against Document Protection Systems Based on Digital Watermarking
Abstract. A growing concern emerges regarding the possibility of counterfeiting currencies using digital imaging technologies. In order to help developing resistance against this n...
Sviatoslav Voloshynovskiy, Alexander Herrigel, Thi...
CSREASAM
2006
15 years 14 days ago
A New Robust and Secure Steganographic System for Greyscale Images
: The research work in this paper shows that the currently available stenographic methods might be quite easily detected by using sufficiently careful analysis of the transmitted d...
Hesham Elzouka
CANS
2009
Springer
180views Cryptology» more  CANS 2009»
15 years 5 months ago
RFID Distance Bounding Protocol with Mixed Challenges to Prevent Relay Attacks
RFID systems suffer from different location-based attacks such as distance fraud, mafia fraud and terrorist fraud attacks. Among them mafia fraud attack is the most serious sin...
Chong Hee Kim, Gildas Avoine
PR
2010
220views more  PR 2010»
14 years 9 months ago
Online finger-knuckle-print verification for personal authentication
Biometric based personal authentication is an effective method for automatically recognizing, with a high confidence, a person’s identity. By observing that the texture pattern p...
Lin Zhang, Lei Zhang 0006, David Zhang, Hailong Zh...