Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Iris recognition
biblio
Graphical Semantic Authentication
Submitted by grigby1 on Thu, 09/30/2021 - 11:09am
OWL
multifactor authentication
Metrics
Iris recognition
Information systems
Human Semantic Authentication
Human Factors
Human behavior
Graphical semantic authentication
Graphical Authentication
authentication
Semantics
Robustness
Resiliency
resilience
pubcrawl
biblio
Successes and Failures in Exploring Biometric Algorithms in NIST Open Source Software and Data
Submitted by grigby1 on Tue, 03/09/2021 - 3:04pm
resilience
multifactor
multimodal
NIST
NIST open source software
open-source software
password-driven methods
pubcrawl
public domain software
recognition
Metrics
Resiliency
Scalability
secure approaches
security
Software
test data
Unibiometric analysis
user authentication methods
cryptosystem
authorisation
Bio-metric
biometric algorithms
biometric authentication method
biometric data
biometrics (access control)
BIOS
Cryptography
authentication
fingerprint
Fingerprint recognition
fuzzy vault
Human behavior
Identification
internal open source utilities
Iris
Iris recognition
biblio
An Investigation of High-Throughput Biometric Systems: Results of the 2018 Department of Homeland Security Biometric Technology Rally
Submitted by grigby1 on Wed, 11/04/2020 - 1:34pm
Metrics
user satisfaction metrics
US government
unmanned face
unmanned biometric systems
U.S. Department
traveler identification
Throughput
testing
Terrorism
security of data
Science and Technology Directorate
pubcrawl
National security
metrics testing
2018 Biometric Technology Rally
Measurement
measured throughput
measured performance
MdTF
matching capability
Maryland Test Facility
Iris recognition
homeland security biometric technology rally
high-throughput security environment
high-throughput biometric systems
face-iris systems
Face
DHS S-T affiliated bio-metrics
capture capability
biblio
Biometric Security and Performance Metrics: FAR, FER, CER, FRR
Submitted by aekwall on Mon, 09/14/2020 - 12:33pm
personal privacy
Iris recognition
FRR
forgotten passwords
Fingers
FER
FAR
CER
biometrics authentication
biometric security system
biometric framework
biometric confirmation framework
access control process
authorisation
biometric
Face
Compositionality
computer science
Fingerprint recognition
biometrics (access control)
computational intelligence
composability
pubcrawl
security
data privacy
Cryptography
biblio
Multimodal Biometrics Feature Level Fusion for Iris and Hand Geometry Using Chaos-based Encryption Technique
Submitted by grigby1 on Fri, 08/28/2020 - 3:44pm
computational geometry
physiological attributes
pattern recognition system
Multimodal system
multimodal biometrics feature level fusion
morphological operations
Moments
matching process
iris features
Iris
image fusion
hand geometry features
Hand geometry
genuine acceptance rate
false rejection rate
false acceptance rate
Cryptography
chaos-based encryption technique
Chaos encryption
behavioral attributes
multimodal biometric system
biometric encryption
Iris recognition
image matching
feature extraction
resilience
chaos
Scalability
Resiliency
Metrics
pubcrawl
biblio
Selective Jpeg2000 Encryption of Iris Data: Protecting Sample Data vs. Normalised Texture
Submitted by grigby1 on Fri, 08/28/2020 - 3:44pm
Iris recognition
selective jpeg2000 encryption
Selective Encryption
normalised texture data
low complexity selective encryption schemes
JPEG2000 compressed iris data
JPEG2000
Iris sample protection
cryptographic protection
biometric system security
biometric encryption
Cryptography
data compression
Image coding
image texture
image segmentation
resilience
biometrics (access control)
Scalability
Resiliency
Metrics
pubcrawl
biblio
Template Protection based on Homomorphic Encryption: Computationally Efficient Application to Iris-Biometric Verification and Identification
Submitted by grigby1 on Fri, 08/28/2020 - 3:42pm
IITD database
Template Protection
secure systems
Scalability
Resiliency
resilience
Recognition accuracy
pubcrawl
Probes
privacy issues
permanent protection
Metrics
iris-coding
iris-biometric verification
Iris recognition
Image coding
biometric encryption
identification mode
Homomorphic encryption
Hamming distance
feature extraction
encryption domain scheme
encryption
early decision making strategy
Decision Making
Cryptography
computationally efficient application
computational overload
block-wise comparison
biometrics (access control)
biometric recognition systems
biblio
Research on Iris Edge Detection Technology based on Daugman Algorithm
Submitted by grigby1 on Fri, 06/26/2020 - 1:03pm
Hough algorithm
security
Scalability
Resiliency
pubcrawl
personal privacy
Metrics
Iris recognition
iris edge detection technology
Image edge detection
identity technology
Identity Security
biometrics (access control)
highly confidential privacy
frequency-domain analysis
Fingerprint recognition
face recognition
edge detection
daugman algorithm
data privacy
current society
convolution
composability
Calculus
biblio
Binarized Multi-Factor Cognitive Detection of Bio-Modality Spoofing in Fog Based Medical Cyber-Physical System
Submitted by aekwall on Mon, 02/10/2020 - 12:04pm
heavy-weight detection mechanisms
bio-modality detection sensors
bio-modality detection systems
bio-modality spoofing
Biomedical imaging
Feature Selection
fingerprint identification
fog based architectures
fog node
fog-based security application
binarized multifactor cognitive detection
image synthesis
Iris recognition
MCPS
resource-constrained sensors
secure user authentication
Sensor management
spoofing bio-identifiable property
spoofing detection
cyber-physical systems
telecommunication security
computer architecture
feature extraction
learning (artificial intelligence)
Resiliency
pubcrawl
wireless sensor networks
Metrics
authentication
security of data
sensors
biometrics (access control)
Human Factors
face recognition
Fog computing
Ensemble Learning
medical cyber-physical systems
multifactor authentication
biblio
Cancelable Biometrics Technique for Iris Recognition
Submitted by grigby1 on Fri, 03/22/2019 - 12:35pm
encryption noninvertible transformation
support vector machine
Scalability
Resiliency
resilience
Reliability
recognition rate
pubcrawl
Non-linear Quadratic kerne
Metrics
Iris recognition
feature extraction
Bath-A dataset
encryption
decryption noninvertible transformation
Databases
Cryptography
cancelable biometrics method
cancelable biometrics features
cancelable biometrics
biometric encryption
biometric data
bioinformatics
1
2
next ›
last »