Sciweavers

221 search results - page 3 / 45
» Advantages of User Authentication Using Unclear Images
Sort
View
ICMCS
2005
IEEE
126views Multimedia» more  ICMCS 2005»
14 years 29 days ago
IP Multicast Video Broadcasting System with User Authentication
This report describes a pay broadcasting system for the Internet. This system would enable tens of thousands of people to access an identical video stream simultaneously. In this ...
Hiroki Onishi, Takashi Satoh, Tetsutaro Uehara, Ka...
ICIP
2002
IEEE
14 years 9 months ago
Lossless authentication of MPEG-2 video
In authentication using watermarking, the original media needs to be slightly modified in order to embed a short media digest in the media itself. Lossless authentication watermar...
Jiri Fridrich, Rui Du
HUC
2007
Springer
14 years 1 months ago
Security by Spatial Reference: Using Relative Positioning to Authenticate Devices for Spontaneous Interaction
Spontaneous interaction is a desirable characteristic associated with mobile and ubiquitous computing. The aim is to enable users to connect their personal devices with devices en...
Rene Mayrhofer, Hans Gellersen, Mike Hazas
BIOSIG
2009
127views Biometrics» more  BIOSIG 2009»
13 years 5 months ago
Supplemental Biometric User Authentication for Digital-Signature Smart Cards
: This paper specifies how biometric verification methods can be applied in addition to PIN verification on digital-signature smart cards in compliance with established smart-card ...
Olaf Henniger, Ulrich Waldmann
ACISP
2008
Springer
14 years 1 months ago
Secure Biometric Authentication with Improved Accuracy
Abstract. We propose a new hybrid protocol for cryptographically secure biometric authentication. The main advantages of the proposed protocol over previous solutions can be summar...
Manuel Barbosa, Thierry Brouard, Stéphane C...