Sciweavers

75 search results - page 4 / 15
» A Novel Scheme for Fingerprint Identification
Sort
View
ICPR
2006
IEEE
14 years 9 months ago
Biometrics based Asymmetric Cryptosystem Design Using Modified Fuzzy Vault Scheme
We propose a novel biometrics cryptosystem where one can send and receive secure information using just the fingerprints. This cryptosystem is a judicious blend of the asymmetric ...
Abhishek Nagar, Santanu Chaudhury
IJNSEC
2008
209views more  IJNSEC 2008»
13 years 8 months ago
Application-Specific Key Release Scheme from Biometrics
This paper outlines a novel biometric key release scheme to bind application-specific key from biometric data such that the key can be retrieved effectively by using DiscreteHashi...
Thian Song Ong, Andrew Teoh Beng Jin, David Chek L...
ICIP
2006
IEEE
14 years 10 months ago
Selfish Colluder Detection and Identification in Traitors within Traitors
During collusion attacks against multimedia forensics, an important issue that colluders need to address is the fairness of the attack, i.e., whether all colluders take the same r...
H. Vicky Zhao, K. J. Ray Liu
ICB
2009
Springer
137views Biometrics» more  ICB 2009»
14 years 3 months ago
Direct Pore Matching for Fingerprint Recognition
Abstract. Sweat pores on fingerprints have proven to be useful features for personal identification. Several methods have been proposed for pore matching. The state-of-the-art meth...
Qijun Zhao, Lei Zhang, David Zhang, Nan Luo
FGCN
2007
IEEE
119views Communications» more  FGCN 2007»
14 years 3 months ago
A Novel Adaptive Load Shedding Scheme for Data Stream Processing
In this paper, we present a novel feedback control-based load shedding scheme for data stream processing. Firstly we apply system identification to establish a dynamic model to de...
Yunyi Zhang, Chongzheng Huang, Deyun Zhang