Sciweavers

368 search results - page 29 / 74
» Computation of Cryptographic Keys from Face Biometrics
Sort
View
CVPR
2001
IEEE
14 years 9 months ago
Learning Representative Local Features for Face Detection
This paper describes a face detection approach via learning local features. The key idea is that local features, being manifested by a collection of pixels in a local region, are ...
Xiangrong Chen, Lie Gu, Stan Z. Li, HongJiang Zhan...
WACV
2007
IEEE
14 years 1 months ago
Facial Strain Pattern as a Soft Forensic Evidence
The success of forensic identification largely depends on the availability of strong evidence or traces that substantiate the prosecution hypothesis that a certain person is guil...
Vasant Manohar, Dmitry B. Goldgof, Sudeep Sarkar, ...
ICB
2007
Springer
156views Biometrics» more  ICB 2007»
14 years 1 months ago
Robust Extraction of Secret Bits from Minutiae
Abstract. Our goal is to extract consistent bits from the same fingerprint in a noisy environment. Such bits can then be used as a secret key in several cryptographic applications...
Ee-Chien Chang, Sujoy Roy
ACSAC
2009
IEEE
14 years 22 days ago
A Guided Tour Puzzle for Denial of Service Prevention
Abstract—Various cryptographic puzzle schemes are proposed as a defense mechanism against denial of service attack. But, all these puzzle schemes face a dilemma when there is a l...
Mehmud Abliz, Taieb Znati
ICS
2010
Tsinghua U.
14 years 5 months ago
Robustness of the Learning with Errors Assumption
: Starting with the work of Ishai-Sahai-Wagner and Micali-Reyzin, a new goal has been set within the theory of cryptography community, to design cryptographic primitives that are s...
Shafi Goldwasser, Yael Kalai, Chris Peikert, Vinod...