Sciweavers

240 search results - page 26 / 48
» From fingerprint to writeprint
Sort
View
PRL
2007
180views more  PRL 2007»
13 years 9 months ago
Symmetric hash functions for secure fingerprint biometric systems
Securing biometrics databases from being compromised is one of the most important challenges that must be overcome in order to demonstrate the viability of biometrics based authen...
Sergey Tulyakov, Faisal Farooq, Praveer Mansukhani...
PAMI
2011
13 years 4 months ago
Latent Fingerprint Matching
Latent fingerprint identification is of critical importance in forensics. While tremendous progress has been made in the field of automatic fingerprint identification, latent...
Anil K. Jain, Jianjiang Feng
ICASSP
2011
IEEE
13 years 1 months ago
Fast physical object identification based on unclonable features and soft fingerprinting
In this paper we advocate a new technique for the fast identi cation of physical objects based on their physical unclonable features (surface microstructures). The proposed identi...
Taras Holotyak, Sviatoslav Voloshynovskiy, Oleksiy...
ICASSP
2011
IEEE
13 years 1 months ago
Equiangular tight frame fingerprinting codes
We show that equiangular tight frames (ETFs) are particularly well suited as additive fingerprint designs against Gaussian averaging collusion attacks when the number of users is...
Dustin G. Mixon, Christopher J. Quinn, Negar Kiyav...
MM
2004
ACM
136views Multimedia» more  MM 2004»
14 years 3 months ago
Fingerprinting and forensic analysis of multimedia
One of the prime reasons movie and music studios have ignored the Internet for open-networked multimedia content delivery, has been the lack of a technology that can support a sec...
Daniel Schonberg, Darko Kirovski