Sciweavers

1466 search results - page 22 / 294
» Completeness of the Authentication Tests
Sort
View
ICPR
2004
IEEE
14 years 8 months ago
Using Adapted Levenshtein Distance for On-Line Signature Authentication
In this paper a new method for on-line signature authentication will be presented, which is based on a event-string modelling of features derived from pen-position and pressure si...
Sascha Schimke, Claus Vielhauer, Jana Dittmann
ICMLA
2009
14 years 4 months ago
Statistical Decision Making for Authentication and Intrusion Detection
User authentication and intrusion detection differ from standard classification problems in that while we have data generated from legitimate users, impostor or intrusion data is s...
Christos Dimitrakakis, Aikaterini Mitrokotsa
ICIP
2002
IEEE
14 years 9 months ago
Likelihood normalization for face authentication in variable recording conditions
In this paper we evaluate the effectiveness of two likelihood normalization techniques, the Background Model Set (BMS) and the Universal Background Model (UBM), for improving perf...
Kuldip K. Paliwal, Conrad Sanderson
AVBPA
2003
Springer
171views Biometrics» more  AVBPA 2003»
14 years 28 days ago
Illumination Normalization Using Logarithm Transforms for Face Authentication
Abstract. In this paper we propose an algorithm that can easily be implemented on small form factor devices to perform illumination normalization in face images captured under vari...
Marios Savvides, B. V. K. Vijaya Kumar
ESOP
2009
Springer
13 years 11 months ago
Type-Based Automated Verification of Authenticity in Cryptographic Protocols
Gordon and Jeffrey have proposed a type and effect system for checking authenticity in cryptographic protocols. The type system reduces the protocol verification problem to the typ...
Daisuke Kikuchi, Naoki Kobayashi