Sciweavers

368 search results - page 23 / 74
» Computation of Cryptographic Keys from Face Biometrics
Sort
View
ACSAC
2000
IEEE
14 years 1 days ago
A Novel Approach to On-Line Status Authentication of Public-Key Certificates
The widespread use of public networks, such as the Internet, for the exchange of sensitive data, like legally valid documents and business transactions, poses severe security cons...
Eugenio Faldella, Marco Prandini
IJNSEC
2007
161views more  IJNSEC 2007»
13 years 7 months ago
Data Hiding: Current Status and Key Issues
Image steganography is a covert communication method that uses an image as the cover to hide the truth from potential attackers that some secret message hidden in the image is bei...
Nan-I Wu, Min-Shiang Hwang
GECCO
2008
Springer
184views Optimization» more  GECCO 2008»
13 years 8 months ago
Evolutionary facial feature selection
With the growing number of acquired physiological and behavioral biometric samples, biometric data sets are experiencing tremendous growth. As database sizes increase, exhaustive ...
Aaron K. Baughman
CRV
2005
IEEE
166views Robotics» more  CRV 2005»
14 years 1 months ago
Face as Mouse Through Visual Face Tracking
This paper introduces a novel camera mouse driven by 3D model based visual face tracking. While camera becomes standard configuration for personal computer(PC) and computer speed...
Jilin Tu, Thomas S. Huang, Hai Tao
FGR
2008
IEEE
289views Biometrics» more  FGR 2008»
14 years 2 months ago
Gabor volume based local binary pattern for face representation and recognition
This paper presents a novel face representation and recognition approach. The face image is first decomposed by multi-scale and multi-orientation Gabor filters and local binary ...
Zhen Lei, ShengCai Liao, Ran He, Matti Pietikä...