Sciweavers

368 search results - page 28 / 74
» Computation of Cryptographic Keys from Face Biometrics
Sort
View
COMPUTER
2007
123views more  COMPUTER 2007»
13 years 7 months ago
Cryptography on a Speck of Dust
Ubiquitous computing has become a reality in recent years. Tiny wireless sensors and RFID tags are being deployed today and will soon form an important aspect of our infrastructur...
Jens-Peter Kaps, Gunnar Gaubatz, Berk Sunar
CVPR
2009
IEEE
15 years 2 months ago
Physiological Face Recognition Is Coming of Age
The previous work of the authors has shown that physiological information on the face can be extracted from thermal infrared imagery and can be used as a biometric. Although, th...
Pradeep Buddharaju (University of Houston), Ioanni...
CCS
2010
ACM
13 years 7 months ago
User-friendly matching protocol for online social networks
In this paper, we outline a privacy-preserving matching protocol for OSN (online social network) users to find their potential friends. With the proposed protocol, a logged-in use...
Qiang Tang
FGR
1998
IEEE
74views Biometrics» more  FGR 1998»
13 years 12 months ago
Synthesis of Facial Images with Lip Motion from Several Real Views
The synthesis of facial images by computer graphics is very important for many applications such as human interface and visual entertainment. The lip motion is an essential factor...
Lei Gao, Yasuhiro Mukaigawa, Yuichi Ohta
HICSS
2007
IEEE
172views Biometrics» more  HICSS 2007»
14 years 1 months ago
Support for Computer Forensics Examination Planning with Domain Modeling: A Report of One Experiment Trial
In any forensic investigation, planning and analysis activities are required in order to determine what digital media will be seized, what types of information will be sought in t...
Alfred C. Bogen, David A. Dampier, Jeffrey C. Carv...