Remote authentication via biometrics: A robust video-object steganographic mechanism over wireless networks

K Ntalianis, N Tsapatsoulis - IEEE Transactions on Emerging …, 2015 - ieeexplore.ieee.org
In wireless communications, sensitive information is frequently exchanged, requiring remote
authentication. Remote authentication involves the submission of encrypted information …

Quantitative evaluation of the effects of aging on biometric templates

A Lanitis, N Tsapatsoulis - IET computer vision, 2011 - IET
The long-term performance of biometric authentication systems is highly depended on the
permanence of biometric features stored in biometric templates. Aging variation causes …

Optimized negative selection algorithm for image classification in multimodal biometric system

MO Balogun, LA Odeniyi, EO Omidiora… - Acta Informatica …, 2023 - ceeol.com
Classification is a crucial stage in identification systems, most specifically in biometric
identification systems. A weak and inaccurate classification system may produce false …

[PDF][PDF] Multi-modal biometric authentications: concept issues and applications strategies

M Soltane, M Bakhti - International Journal of Advanced Science and …, 2012 - Citeseer
As the information age matures, biometric identification technology will be at the heart of
computer interaction with humans and the biosphere in which they reside. Automated …

Virtual restoration of faces appearing in byzantine icons

A Lanitis, G Stylianou, C Voutounos - Journal of Cultural Heritage, 2012 - Elsevier
Virtual restoration of cultural heritage (CH) artefacts is an important task that aims to digitally
recreate the original appearance of damaged items. In this paper, a method that can be …

[PDF][PDF] Multi-modal biometrics: applications, strategies and operations

GB Iwasokun, SS Udoh, OK Akinyokun - Global Journal of Computer …, 2015 - academia.edu
The need for adequate attention to security of lives and properties cannot be over-
emphasised. Existing approaches to security management by various agencies and sectors …

[PDF][PDF] Soft decision level fusion approach to a combined behavioral speech-signature biometrics verification

M Soltane, B Mimen - … of Signal Processing, Image Processing and …, 2013 - researchgate.net
This paper describes a combined behavioral techniques based on speech and signature
biometrics modalities. Fusion of multiple biometric modalities for human verification …

[PDF][PDF] Video-object oriented biometrics hiding for user authentication under error-prone transmissions

K Ntalianis, N Tsapatsoulis, A Drigas - EURASIP Journal on Information …, 2011 - Springer
An automatic video-object oriented steganographic system is proposed for biometrics
authentication over error-prone networks. Initially, the host video object is automatically …

[PDF][PDF] Reconhecimento biométrico baseado na geometria da mão

HJS Matos - 2010 - repositorio-aberto.up.pt
Os sistemas de reconhecimento baseados na geometria da mão estão entre as mais
antigas ferramentas biométricas utilizadas para a autenticação automática de uma pessoa …

Palm geometry biometrics: A score-based fusion approach

N Tsapatsoulis, CS Pattichis - 2009 - ktisis.cut.ac.cy
In this paper we present an identification and authentication system based on hand
geometry. First, we examine the performance of three different methods that are based on …