Sciweavers

121 search results - page 10 / 25
» Efficient Biometrics Remote User Authentication Scheme
Sort
View
SP
1998
IEEE
174views Security Privacy» more  SP 1998»
13 years 12 months ago
On Enabling Secure Applications Through Off-Line Biometric Identification
In developing secure applications and systems, the designers often must incorporate secure user identification in the design specification. In this paper, we study secure off-line...
George I. Davida, Yair Frankel, Brian J. Matt
ICIP
2004
IEEE
14 years 9 months ago
Progressive protection of jpeg2000 codestreams
This paper presents an authentication scheme and an access control scheme for JPEG2000 image codestreams based on hash chains. Both schemes are fully compatible with the core part...
Yongdong Wu, Di Ma, Robert H. Deng
CRV
2006
IEEE
242views Robotics» more  CRV 2006»
14 years 1 months ago
User Authentication based on Face Recognition with Support Vector Machines
The present paper proposes an authentication scheme which relies on face biometrics and one-class Support Vector Machines. The proposed recognition procedures are based on both a ...
Paolo Abeni, Madalina Baltatu, Rosalia D'Alessandr...
GECCO
2007
Springer
170views Optimization» more  GECCO 2007»
14 years 1 months ago
An evolutionary keystroke authentication based on ellipsoidal hypothesis space
Keystroke authentication is a biometric method utilizing the typing characteristics of users. In this paper, we propose an evolutionary method for stable keystroke authentication....
Jae-Wook Lee, Sung-Soon Choi, Byung Ro Moon
ICMCS
2009
IEEE
151views Multimedia» more  ICMCS 2009»
13 years 5 months ago
Anonymous Biometric Access Control based on homomorphic encryption
In this paper, we consider the problem of incorporating privacy protection in a biometric access control system. An Anonymous Biometric Access Control (ABAC) system is proposed to...
Ying Luo, Sen-Ching S. Cheung, Shuiming Ye