Sciweavers

368 search results - page 20 / 74
» Computation of Cryptographic Keys from Face Biometrics
Sort
View
ICB
2009
Springer
140views Biometrics» more  ICB 2009»
14 years 2 months ago
A Discriminant Analysis Method for Face Recognition in Heteroscedastic Distributions
Linear discriminant analysis (LDA) is a popular method in pattern recognition and is equivalent to Bayesian method when the sample distributions of different classes are obey to t...
Zhen Lei, ShengCai Liao, Dong Yi, Rui Qin, Stan Z....
MEDIAFORENSICS
2010
13 years 6 months ago
Biometric template transformation: a security analysis
One of the critical steps in designing a secure biometric system is protecting the templates of the users that are stored either in a central database or on smart cards. If a biom...
Abhishek Nagar, Karthik Nandakumar, Anil K. Jain
FGR
2000
IEEE
200views Biometrics» more  FGR 2000»
14 years 1 days ago
The Global Dimensionality of Face Space
Low-dimensional representations of sensory signals are key to solving many of the computational problems encountered in high-level vision. Principal Component Analysis (PCA) has b...
Penio S. Penev, Lawrence Sirovich
NDSS
1999
IEEE
13 years 12 months ago
Secure Password-Based Protocol for Downloading a Private Key
We present protocols that allow a user Alice, knowing only her name and password, and not carrying a smart card, to "log in to the network" from a "generic" wo...
Radia J. Perlman, Charlie Kaufman
HICSS
2002
IEEE
130views Biometrics» more  HICSS 2002»
14 years 18 days ago
Experiences of Using a Public Key Infrastructure to Access Patient Confidential Data over the Internet
A project to enable health care professionals (GPs, practice nurses and diabetes nurse specialists) to access, via the Internet, confidential patient data held on a secondary care...
David W. Chadwick, Carmen Carroll, S. Harvey, John...