Sciweavers

1150 search results - page 86 / 230
» Beacon Based Authentication
Sort
View
ICIP
2006
IEEE
14 years 10 months ago
Real Time Lip Motion Analysis for a Person Authentication System using Near Infrared Illumination
In this paper we present an approach for lip motion analysis that can be used in conjunction with a person authentication system based on face recognition, to avoid attacks on the...
Faisal Shafait, Ralph Kricke, Islam Shdaifat, Rolf...
ICCSA
2009
Springer
14 years 3 months ago
On a Construction of Short Digests for Authenticating Ad Hoc Networks
In pervasive ad-hoc networks, there is a need for devices to be able to communicate securely, despite the lack of apriori shared security associations and the absence of an infrast...
Khoongming Khoo, Ford-Long Wong, Chu-Wee Lim
ICPR
2006
IEEE
14 years 2 months ago
Combining Fingerprint, Palmprint and Hand-Shape for User Authentication
This paper investigates a new approach for personal authentication by combining unique biometric features which can be acquired from hand images alone. The proposed method attempt...
Ajay Kumar, David Zhang
AINA
2005
IEEE
14 years 2 months ago
Authenticated Encryption Schemes with Message Linkage for Threshold Signatures
Based on the factorization problem, a modified (t, n) threshold group-oriented scheme with message recovery is proposed. In the proposed scheme, any combination of more than t mem...
Chi-Hsiung Huang, Chia-Yin Lee, Chu-Hsing Lin, Chi...
ICBA
2004
Springer
126views Biometrics» more  ICBA 2004»
14 years 2 months ago
Spectral Subband Centroids as Complementary Features for Speaker Authentication
Most conventional features used in speaker authentication are based on estimation of spectral envelopes in one way or another, e.g., Mel-scale Filterbank Cepstrum Coefficients (MFC...
Norman Poh Hoon Thian, Conrad Sanderson, Samy Beng...