Sciweavers

1150 search results - page 18 / 230
» Beacon Based Authentication
Sort
View
IWDW
2004
Springer
14 years 26 days ago
A Multi-feature Based Invertible Authentication Watermarking for JPEG Images
: Invertible authentication techniques have been used in some special applications (such as medical or military) where original data can be recovered after authenticated. In this p...
Deng-Pan Ye, Yaobin Mao, Yuewei Dai, Zhiquan Wang
INFORMATICALT
2010
126views more  INFORMATICALT 2010»
13 years 4 months ago
An Entire Chaos-Based Biometric Remote User Authentication Scheme on Tokens Without Using Password
This paper presents an entire chaos-based biometric remote user authentication scheme on tokens without using passwords. The proposed scheme is based on the chaotic hash function a...
Eun-Jun Yoon, Kee-Young Yoo
ACNS
2008
Springer
103views Cryptology» more  ACNS 2008»
14 years 1 months ago
PUF-HB: A Tamper-Resilient HB Based Authentication Protocol
We propose a light-weight protocol for authentication of low-power devices. Our construction PUF-HB merges the positive qualities of two families of authentication functions. PUF ...
Ghaith Hammouri, Berk Sunar
GECCO
2007
Springer
170views Optimization» more  GECCO 2007»
14 years 1 months ago
An evolutionary keystroke authentication based on ellipsoidal hypothesis space
Keystroke authentication is a biometric method utilizing the typing characteristics of users. In this paper, we propose an evolutionary method for stable keystroke authentication....
Jae-Wook Lee, Sung-Soon Choi, Byung Ro Moon
ICASSP
2008
IEEE
14 years 1 months ago
Audio authentication based on distributed source coding
Audio authentication is important in content delivery via untrusted intermediaries, for example peer-to-peer (P2P) file sharing. Many differently encoded versions of the original...
David P. Varodayan, Yao-Chung Lin, Bernd Girod