Sciweavers

104 search results - page 3 / 21
» Biometric Based Cryptographic Key Generation from Faces
Sort
View
COMPSEC
2004
131views more  COMPSEC 2004»
13 years 10 months ago
Biometric random number generators
Abstract Up to now biometric methods have been used in cryptography for authentication purposes. In this paper we propose to use biological data for generating sequences of random ...
Janusz Szczepanski, Elek Wajnryb, José M. A...
FGR
2008
IEEE
188views Biometrics» more  FGR 2008»
14 years 5 months ago
Person-independent face tracking based on dynamic AAM selection
Abstract This paper proposes a real-time high-precision method to track an unknown face in front of an information system by selecting appropriate model to a video image. Active Ap...
Akihiro Kobayashi, Junji Satake, Takatsugu Hirayam...
ACISP
2005
Springer
14 years 4 months ago
Cancelable Key-Based Fingerprint Templates
Biometric based authentication can provide strong security guarantee about the identity of users. Security of biometric data is particularly important as compromise of the data wil...
Russell Ang, Reihaneh Safavi-Naini, Luke McAven
ICMI
2000
Springer
167views Biometrics» more  ICMI 2000»
14 years 2 months ago
Gravity-Center Template Based Human Face Feature Detection
This paper presents a simple and fast technique for geometrical feature detection of several human face organs such as eyes and mouth. Human face gravity-center template is firstly...
Jun Miao, Wen Gao, Yiqiang Chen, Jie Lu
ICICS
2005
Springer
14 years 4 months ago
Remotely Keyed Cryptographics Secure Remote Display Access Using (Mostly) Untrusted Hardware
Software that covertly monitors a user’s actions, also known as spyware, has become a first-level security threat due to its ubiquity and the difficulty of detecting and remov...
Debra L. Cook, Ricardo A. Baratto, Angelos D. Kero...