Remote authentication via biometrics: A robust video-object steganographic mechanism over wireless networks
K Ntalianis, N Tsapatsoulis - IEEE Transactions on Emerging …, 2015 - ieeexplore.ieee.org
In wireless communications, sensitive information is frequently exchanged, requiring remote
authentication. Remote authentication involves the submission of encrypted information …
authentication. Remote authentication involves the submission of encrypted information …
Quantitative evaluation of the effects of aging on biometric templates
A Lanitis, N Tsapatsoulis - IET computer vision, 2011 - IET
The long-term performance of biometric authentication systems is highly depended on the
permanence of biometric features stored in biometric templates. Aging variation causes …
permanence of biometric features stored in biometric templates. Aging variation causes …
Optimized negative selection algorithm for image classification in multimodal biometric system
MO Balogun, LA Odeniyi, EO Omidiora… - Acta Informatica …, 2023 - ceeol.com
Classification is a crucial stage in identification systems, most specifically in biometric
identification systems. A weak and inaccurate classification system may produce false …
identification systems. A weak and inaccurate classification system may produce false …
[PDF][PDF] Multi-modal biometric authentications: concept issues and applications strategies
M Soltane, M Bakhti - International Journal of Advanced Science and …, 2012 - Citeseer
As the information age matures, biometric identification technology will be at the heart of
computer interaction with humans and the biosphere in which they reside. Automated …
computer interaction with humans and the biosphere in which they reside. Automated …
Virtual restoration of faces appearing in byzantine icons
Virtual restoration of cultural heritage (CH) artefacts is an important task that aims to digitally
recreate the original appearance of damaged items. In this paper, a method that can be …
recreate the original appearance of damaged items. In this paper, a method that can be …
[PDF][PDF] Multi-modal biometrics: applications, strategies and operations
The need for adequate attention to security of lives and properties cannot be over-
emphasised. Existing approaches to security management by various agencies and sectors …
emphasised. Existing approaches to security management by various agencies and sectors …
[PDF][PDF] Soft decision level fusion approach to a combined behavioral speech-signature biometrics verification
M Soltane, B Mimen - … of Signal Processing, Image Processing and …, 2013 - researchgate.net
This paper describes a combined behavioral techniques based on speech and signature
biometrics modalities. Fusion of multiple biometric modalities for human verification …
biometrics modalities. Fusion of multiple biometric modalities for human verification …
[PDF][PDF] Video-object oriented biometrics hiding for user authentication under error-prone transmissions
An automatic video-object oriented steganographic system is proposed for biometrics
authentication over error-prone networks. Initially, the host video object is automatically …
authentication over error-prone networks. Initially, the host video object is automatically …
[PDF][PDF] Reconhecimento biométrico baseado na geometria da mão
HJS Matos - 2010 - repositorio-aberto.up.pt
Os sistemas de reconhecimento baseados na geometria da mão estão entre as mais
antigas ferramentas biométricas utilizadas para a autenticação automática de uma pessoa …
antigas ferramentas biométricas utilizadas para a autenticação automática de uma pessoa …
Palm geometry biometrics: A score-based fusion approach
N Tsapatsoulis, CS Pattichis - 2009 - ktisis.cut.ac.cy
In this paper we present an identification and authentication system based on hand
geometry. First, we examine the performance of three different methods that are based on …
geometry. First, we examine the performance of three different methods that are based on …