— Login access control refers to securing the entry point to a computing system. The login system is responsible for this service and must provide a number of tasks, the main tas...
Biometric technologies are each time more demanded for security applications. In this sense, systems for identifying people are gaining popularity, especially in governmental sect...
Abstract. This paper presents a bimodal biometric verification system based on the fusion of palmprint and face features at the matching-score level. The system combines a new appr...
In this paper we report an approach for cryptographic key generation based on keystroke dynamics and the k-medoids algorithm. The stages that comprise the approach are training-enr...
We demonstrate a novel approach to modelling arbitrary temporally-deforming objects using spatio-temporal Fourier descriptors. This is a continuous boundary descriptor, which can ...