Sciweavers

368 search results - page 38 / 74
» Computation of Cryptographic Keys from Face Biometrics
Sort
View
SP
2009
IEEE
130views Security Privacy» more  SP 2009»
14 years 2 months ago
Wirelessly Pickpocketing a Mifare Classic Card
The Mifare Classic is the most widely used contactless smartcard on the market. The stream cipher CRYPTO1 used by the Classic has recently been reverse engineered and serious atta...
Flavio D. Garcia, Peter van Rossum, Roel Verdult, ...
PR
2007
127views more  PR 2007»
13 years 7 months ago
Face recognition using spectral features
Face recognition is a challenging task in computer vision and pattern recognition. It is well-known that obtaining a low-dimensional feature representation with enhanced discrimin...
Fei Wang, Jingdong Wang, Changshui Zhang, James T....
ICIP
2008
IEEE
14 years 2 months ago
On the security of non-forgeable robust hash functions
In many applications, it is often desirable to extract a consistent key from a multimedia object (e.g., an image), even when the object has gone through a noisy channel. For examp...
Qiming Li, Sujoy Roy
CVPR
2009
IEEE
15 years 2 months ago
Maximizing Intra-individual Correlations for Face Recognition Across Pose Differences
The variations of pose lead to significant performance decline in face recognition systems, which is a bottleneck in face recognition. A key problem is how to measure the simila...
Annan Li (Chinese Academy of Sciences), Shiguang S...
IVC
2010
143views more  IVC 2010»
13 years 6 months ago
Video-based face model fitting using Adaptive Active Appearance Model
Active Appearance Model (AAM) represents the shape and appearance of an object via two low-dimensional subspaces, one for shape and one for appearance. AAM for facial images is cu...
Xiaoming Liu