In developing secure applications and systems, the designers often must incorporate secure user identification in the design specification. In this paper, we study secure off-line...
This paper presents an authentication scheme and an access control scheme for JPEG2000 image codestreams based on hash chains. Both schemes are fully compatible with the core part...
The present paper proposes an authentication scheme which relies on face biometrics and one-class Support Vector Machines. The proposed recognition procedures are based on both a ...
Paolo Abeni, Madalina Baltatu, Rosalia D'Alessandr...
Keystroke authentication is a biometric method utilizing the typing characteristics of users. In this paper, we propose an evolutionary method for stable keystroke authentication....
In this paper, we consider the problem of incorporating privacy protection in a biometric access control system. An Anonymous Biometric Access Control (ABAC) system is proposed to...