Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
biometric encryption
biblio
A Digital Signature System Based on Real Time Face Recognition
Submitted by grigby1 on Fri, 08/28/2020 - 2:44pm
biometric encryption
digital signature
face recognition
LBPH
Metrics
pubcrawl
resilience
Resiliency
RSA
Scalability
SHA256
biblio
Generating Digital Signature using Facial Landmlark Detection
Submitted by grigby1 on Fri, 08/28/2020 - 2:44pm
digital signature generation
biometric encryption
Facial features
Audio recognition
biometric identification
CDNU Algorithm
compressed textual signature
database storage overhead
Digital Security
data compression
facial landmark detection
facial landmarks
facial recognition
Huffman coding
real-time optimized encryption procedure
secure digital signature
security advisors
user account information database
information security
encryption
feature extraction
pubcrawl
Metrics
Resiliency
optimization
Scalability
Databases
Cryptography
resilience
social networking (online)
face recognition
digital signatures
image texture
confidential information
Image coding
biblio
Multimodal Biometrics Feature Level Fusion for Iris and Hand Geometry Using Chaos-based Encryption Technique
Submitted by grigby1 on Fri, 08/28/2020 - 2:44pm
computational geometry
physiological attributes
pattern recognition system
Multimodal system
multimodal biometrics feature level fusion
morphological operations
Moments
matching process
iris features
Iris
image fusion
hand geometry features
Hand geometry
genuine acceptance rate
false rejection rate
false acceptance rate
Cryptography
chaos-based encryption technique
Chaos encryption
behavioral attributes
multimodal biometric system
biometric encryption
Iris recognition
image matching
feature extraction
resilience
chaos
Scalability
Resiliency
Metrics
pubcrawl
biblio
Selective Jpeg2000 Encryption of Iris Data: Protecting Sample Data vs. Normalised Texture
Submitted by grigby1 on Fri, 08/28/2020 - 2:44pm
Iris recognition
selective jpeg2000 encryption
Selective Encryption
normalised texture data
low complexity selective encryption schemes
JPEG2000 compressed iris data
JPEG2000
Iris sample protection
cryptographic protection
biometric system security
biometric encryption
Cryptography
data compression
Image coding
image texture
image segmentation
resilience
biometrics (access control)
Scalability
Resiliency
Metrics
pubcrawl
biblio
An Improved Method for Generating Biometric-Cryptographic System from Face Feature
Submitted by grigby1 on Fri, 08/28/2020 - 2:44pm
encryption
feature extraction
pubcrawl
Metrics
Resiliency
Scalability
component
resilience
Face
Biomedical imaging
biometric encryption
Facial features
formatting
insert
style
styling
biblio
Biometric Authentication Security System Using Human DNA
Submitted by grigby1 on Fri, 08/28/2020 - 2:43pm
biometric encryption
System authentication
human DNA based security systems
Human DNA
human biometric characteristics
cryptosystem technique
Cryptography System
biometric authentication security system
biometric features
DNA
Cryptography
system security
resilience
biometrics (access control)
Scalability
message authentication
Resiliency
Metrics
pubcrawl
biblio
Data Security Enhancement in Cloud Computing Using Multimodel Biometric System
Submitted by grigby1 on Fri, 08/28/2020 - 2:43pm
DNA encryption
biometric encryption
DNA
AES cipher
data centers
data hiding
data leak
data security enhancement
DNA cipher
confidential information
Encoding and Decoding
information storage
multimodal biometric system
multimodel biometric system
multiple security system
polymers
security authentication
unauthorized access
Cloud Computing
Cryptography
authorisation
pubcrawl
Metrics
Resiliency
Conferences
AES
Scalability
Ciphers
encoding
biometrics (access control)
Data Security
resilience
smart phones
confidential data
information retrieval
Smartphones
biblio
A Novel Technique for Biometric Data Protection in Remote Authentication System
Submitted by grigby1 on Fri, 08/28/2020 - 2:43pm
biometric encryption
transmitted biometric data
Steganography
semantic segmentation
secret image
remote authentication system
Qualified Significant Wavelet Trees
IWT based data hiding increases
Integer Wavelet Transform
extracted fingerprint image
crypto-steganography method
cover image
chaotic encrypted fingerprint image
biometric features
biometric data protection
Cryptography
biometrics
wavelet transforms
image segmentation
fingerprint identification
feature extraction
resilience
Fingerprint recognition
biometrics (access control)
chaotic encryption
Scalability
Resiliency
Metrics
pubcrawl
biblio
Smart Cards with Biometric Influences: An Enhanced ID Authentication
Submitted by grigby1 on Fri, 08/28/2020 - 2:43pm
biometrics integration
smartcards
smart cards
Smart card
Processing time
privacy concerns
possible biometric solution
identity authentication
human interfaces
human beings
highly reliable support system
FRR
FAR
enhanced ID authentication
DNA technology
DNA
Cryptography
biometric technologies
biometric techniques
biometric key considerations
biometric influences
biometric encryption
biometrics
biometric technology
resilience
biometrics (access control)
Scalability
data privacy
Resiliency
Metrics
pubcrawl
biblio
Template Protection based on Homomorphic Encryption: Computationally Efficient Application to Iris-Biometric Verification and Identification
Submitted by grigby1 on Fri, 08/28/2020 - 2:42pm
IITD database
Template Protection
secure systems
Scalability
Resiliency
resilience
Recognition accuracy
pubcrawl
Probes
privacy issues
permanent protection
Metrics
iris-coding
iris-biometric verification
Iris recognition
Image coding
biometric encryption
identification mode
Homomorphic encryption
Hamming distance
feature extraction
encryption domain scheme
encryption
early decision making strategy
Decision Making
Cryptography
computationally efficient application
computational overload
block-wise comparison
biometrics (access control)
biometric recognition systems
« first
‹ previous
1
2
3
4
5
6
7
next ›
last »