Index for authe

_authentec_
authentec

_authentic_
ADVIO: An authentic Dataset for Visual-Inertial Odometry
authentic Emotion Detection in Real-Time Video
authentic facial expression analysis
authentic mobile-biometric signature verification system
Beyond Synthetic Data: A Blind Deraining Quality Assessment Metric Towards authentic Rain Image
Biometric Based Unique Key Generation for authentic Audio Watermarking
Blind Image Quality Assessment for authentic Distortions by Intermediary Enhancement and Iterative Training
Blind Image Quality Index for authentic Distortions With Local and Global Deep Feature Aggregation
Development and Discussion of an authentic Game to Develop Cleaning Skills
Dual-Stream Complex-Valued Convolutional Network for authentic Dehazed Image Quality Assessment
EEG-Based Multi-Modal Emotion Database with Both Posed and authentic Facial Actions for Emotion Analysis, An
Gaussian Derivative Operator for authentic Edge Detection and Accurate Edge Localization
Impact of Scale on Signed, Unsigned, authentic and Phantom Zero Crossings in a Noisy Environment
Subjective and Objective De-Raining Quality Assessment Towards authentic Rain Image
Towards authentic Face Restoration with Iterative Diffusion Models and Beyond
15 for authentic

_authentically_
authentically Distorted Image Quality Assessment by Learning From Empirical Score Distributions
Automatic quality prediction of authentically distorted pictures
Blind Image Quality Assessment on authentically Distorted Images with Perceptual Features
No Reference Opinion Unaware Quality Assessment of authentically Distorted Images
Scene statistics of authentically distorted images in perceptually relevant color spaces for blind image quality assessment
Semi-Supervised authentically Distorted Image Quality Assessment with Consistency-Preserving Dual-Branch Convolutional Neural Network

_authenticate_
I-Am: Implicitly authenticate Me: Person Authentication on Mobile Devices Through Ear Shape and Arm Gesture
Real time watermarking to authenticate the WSQ bitstream
Using set partitioning in hierarchical trees to authenticate digital images

_authenticated_
AAKE-BIVT: Anonymous authenticated Key Exchange Scheme for Blockchain-Enabled Internet of Vehicles in Smart Transportation
authenticated Key Agreement Scheme With User Anonymity and Untraceability for 5G-Enabled Softwarized Industrial Cyber-Physical Systems
Diffie-Hellman process and its use in secure and authenticated VC networks
Rate-Distortion Optimized Streaming of authenticated Video
Rate-Distortion-Authentication Optimized Streaming of authenticated Video
Secure and Efficient authenticated Key Management Scheme for UAV-Assisted Infrastructure-Less IoVs
Sustainable and Round-Optimized Group authenticated Key Exchange in Vehicle Communication
Watermarking two dimensional data object identifier for authenticated distribution of digital multimedia contents
8 for authenticat

_authenticating_
authenticating Binary Text Documents Using a Localising OMAC Watermark Robust to Printing and Scanning
authenticating corrupted face image based on noise model
authenticating Corrupted Facial Images on Stand-Alone DSP System
authenticating corrupted photo images based on noise parameter estimation
authenticating Edges Produced by Zero-Crossing Algorithms
authenticating Pollock paintings using fractal geometry
authenticating Visual Cryptography Shares Using 2D Barcodes
General Region Nesting-Based Semi-Fragile Reversible Watermarking for authenticating 3D Mesh Models, A
Hybrid Approach for authenticating MPEG-2 Streaming Data, A
reversible watermarking for authenticating 2D vector graphics based on bionic spider web, A
Semi-Fragile Reversible Watermarking for authenticating 2D Engineering Graphics Based on Improved Region Nesting, A
Semi-Fragile Reversible Watermarking for authenticating 3D Models Based on Virtual Polygon Projection and Double Modulation Strategy, A
Semi-Fragile Reversible Watermarking for authenticating 3D Models in Dual Domains Based on Variable Direction Double Modulation, A
Toward Reliable Models For authenticating Multimedia Content: Detecting Resampling Artifacts With Bayesian Neural Networks
14 for authenticating

_authentication_
3D Convolutional Neural Networks Based Speaker Identification and authentication
3D face and hand biometric system for robust user-friendly authentication, A
3D face authentication and recognition based on bilateral symmetry analysis
Accuracy of a high-level, loss-tolerant video fingerprint for surveillance authentication
Accurate Iris Boundary Detection in Iris-Based Biometric authentication Process
Active vision-based face authentication
Activity related authentication using prehension biometrics
Activity related biometric authentication using Spherical Harmonics
Adapted user-dependent multimodal biometric authentication exploiting general information
Adaptive biometric authentication using nonlinear mappings on quality measures and verification scores
Adaptive Group-Based Zero Knowledge Proof-authentication Protocol in Vehicular Ad Hoc Networks
adaptive image authentication scheme for vector quantization compressed image, An
Additive Adversarial Learning for Unbiased authentication
Aggregated Zero-Knowledge Proof and Blockchain-Empowered authentication for Autonomous Truck Platooning
Aggregator operations considering authentication for electrical charging of EVs
Algorithm for Biometric authentication Based on the Model of Non-Stationary Random Processes, An
Alteration-Locating authentication Watermarking for Binary Images
Analysis of Brute-Force Break-Ins of a Palmprint authentication System
Anonymous Batch authentication and Key Exchange Protocols for 6G Enabled VANETs, An
Application and Evaluation of a 2D+3D Face authentication System
Application authentication System with Efficiently Updatable Signature
Application of fusion techniques to speaker authentication over ip networks
approach for on-line signature authentication using Zernike moments, An
Architecture for Synchronous Multiparty authentication Using Biometrics
Art of Deception: Novel Graphical User authentication Scheme Using Illusion Images, The
Artificial neural network approach to authentication of coins by vision-based minimization
Artificial Rhythms and Cues for Keystroke Dynamics Based authentication
Audio Visual Person authentication by Multiple Nearest Neighbor Classifiers
Audio- and Video-Based Biometric Person authentication
Audio-Visual Person authentication with Multiple Visualized-Speech Features and Multiple Face Profiles
authentication by Biometric Verification
authentication Mechanism Using Chinese Remainder Theorem for Efficient Surveillance Video Transmission, An
authentication of 3-D Polygonal Meshes
authentication of area fingerprint scanners
authentication of biomedical images based on zero location watermarking
authentication Of Copy Detection Patterns Under Machine Learning Attacks: A Supervised Approach
authentication of currency notes through printing technique verification
authentication of digital images and video: Generic models and a new contribution
authentication of Free Hand Drawings by Pattern Recognition Methods
authentication of lossy compressed video data by semi-fragile watermarking
authentication of medical images using passive approach
authentication of MPEG-4-based surveillance video
authentication of Random Patterns by Finding a Match in an Image Database
authentication of Scalable Video Streams With Low Communication Overhead
authentication of Vincent van Gogh's Work
authentication using Finger Knuckle Prints
authentication-Based on Biomechanics of Finger Movements Captured Using Optical Motion-Capture
Authors reply Sharing secrets in stego images with authentication
Automated 3D Face authentication and recognition
Automated Cartridge Identification for Firearm authentication
Automatic 3D face authentication
Automatic Face authentication from 3d surface
Automatic face authentication with self compensation
Automatic image authentication and recovery using fractal code embedding and image inpainting
Automatic Pose Correction for Local Feature-Based Face authentication
Bayesian adaptation for user-dependent multimodal biometric authentication
Bayesian Structural Content Abstraction for Region-Level Image authentication
BCPPA: A Blockchain-Based Conditional Privacy-Preserving authentication Protocol for Vehicular Ad Hoc Networks
Bi-level image watermarking for image authentication surviving JPEG lossy compression
Bi-modal authentication in mobile environments using session variability modelling
Bi-modal biometric authentication on mobile phones in challenging conditions
Binary Image authentication using Zernike Moments
Binary Image authentication With Tampering Localization by Embedding Cryptographic Signature and Block Identifier
Biohashing: Two factor authentication featuring fingerprint data and tokenised random number
BIOMET: A Multimodal Person authentication Database Including Face, Voice, Fingerprint, Hand and Signature Modalities
Biometric authentication
Biometric authentication based on 2D/3D sensing of forensic handwriting traces
Biometric authentication Based on Infrared Thermal Hand Vein Patterns
Biometric authentication based on PCG and ECG signals: present status and future directions
Biometric authentication Based on Pupillary Light Reflex Using Neural Networks
Biometric authentication System Using Reduced Joint Feature Vector of Iris and Face
Biometric authentication system using retinal vessel pattern and geometric hashing
Biometric authentication using augmented face and random projection
Biometric authentication using Finger-Back Surface
Biometric authentication Using Finger-Vein Patterns with Deep-Learning and Discriminant Correlation Analysis
Biometric authentication: System Security and User Privacy
Biometric data hiding: A 3 factor authentication approach to verify identity with a single image using steganography, encryption and matching
Biometric Face authentication Using Pixel-Based Weak Classifiers
Biometric Person authentication Method Using Camera-Based Online Signature Acquisition
Biometric Personal authentication Based on Handwritten Signals
Biometric Security Application for Person authentication Using Retinal Vessel Feature
Biometric User authentication for Heightened Information Security
Biometric User authentication on Smart Cards by Means of Handwritten Signatures
Biometric-Enabled authentication Machines: A Survey of Open-Set Real-World Applications
Biometrics Person authentication Using Projection-Based Face Recognition System in Verification Scenario
BioTAM: a technology acceptance model for biometric authentication systems
Blind Dual Watermarking for Color Images: authentication and Copyright Protection
Blind Reversible authentication Based on PEE and CS Reconstruction
Block Pyramid Based Adaptive Quantization Watermarking for Multimodal Biometric authentication
Block-wise authentication and Recovery Scheme for Medical Images Focusing on Content Complexity
Blockchain-Based authentication Scheme and Secure Architecture for IoT-Enabled Maritime Transportation Systems, A
Blockchain-based Iris authentication in Order to Secure Iot Access and Digital Money Spending
Blockchain-Based Privacy-Preserving authentication Model Intelligent Transportation Systems
BMIAE: blockchain-based multi-instance Iris authentication using additive ElGamal homomorphic encryption
CALIPER: Continuous authentication Layered with Integrated PKI Encoding Recognition
Cancelable face verification using optical encryption and authentication
Capabilities of Biometrics for authentication in Wireless Devices
Capacity and Examples of Template-Protecting Biometric authentication Systems
Cascading Trilinear Tensors for Face authentication
CDVSec: Privacy-preserving biometrical user authentication in the cloud with CDVS descriptors
Cell Phones Personal authentication Systems Using Multimodal Biometrics
Challenges and Opportunities of Biometric User authentication in the Age of IoT: A Survey
Chaotic Map-Based authentication Scheme Using Physical Unclonable Function for Internet of Autonomous Vehicle
Chaotic Watermarking for Video authentication in Surveillance Applications
Cheating in (halftone-secret) visual cryptography: Analysis of blind authentication schemes
class of authentication digital watermarks for secure multimedia communication, A
CNN-based anti-spoofing two-tier multi-factor authentication system
Collusive Attacks to Partition authentication Visual Cryptography Scheme
Color Image authentication Method Using Partitioned Palette and Morphological Operations, A
Combined Handwriting and Speech Modalities for User authentication
Combining Fingerprint, Palmprint and Hand-Shape for User authentication
Combining Hardwaremetry and Biometry for Human authentication via Smartphones
Combining Left and Right Irises for Personal authentication
comment on Sharing secrets in stego images with authentication, A
Comments on Dual authentication and Key Management Techniques for Secure Data Transmission in Vehicular Ad Hoc Networks
Common Method of Share authentication in Image Secret Sharing, A
Comparative analysis of feature extraction and fusion for blind authentication of digital images using chroma channels
comparative approach between cepstral features for human authentication using heart sounds, A
Comparison and combination of iris matchers for reliable personal authentication
Comparison of a Touch-Gesture- and a Keystroke-Based Password Method: Toward Shoulder-Surfing Resistant Mobile User authentication, A
Comparison of different entropies as features for person authentication based on EEG signals
Compensated Signature Embedding Based Multimedia Content authentication System
Comprehensive Survey on authentication and Attack Detection Schemes That Threaten It in Vehicular Ad-Hoc Networks, A
Compression tolerant image authentication
Compressive Sensing-Based Image Encryption and authentication in Edge-Clouds
Concealing Fingerprint-Biometric Data into Audio Signals for Identify authentication
Confidence Based Gating of Multiple Face authentication Experts
Constructing SVM Multiple Tree for Face Membership authentication
Content authentication and Tamper Detection in Digital Video
Content authentication for Neural Imaging Pipelines: End-To-End Optimization of Photo Provenance in Complex Distribution Channels
Content authentication of halftone video via flickering as sparse signal
Content based image authentication using HOG feature descriptor
Content-based authentication algorithm for binary images
Content-based watermarking scheme for image authentication
Context-Aware Active authentication Using Smartphone Accelerometer Measurements
Continuous 3D Face authentication Using RGB-D Cameras
Continuous authentication in a real world settings
Continuous authentication With Touch Behavioral Biometrics and Voice on Wearable Glasses
Continuous Real-Time Vehicle Driver authentication Using Convolutional Neural Network Based Face Recognition
Continuous User authentication on Mobile Devices: Recent progress and remaining challenges
Corrupted Face Image authentication Based on Noise Model
Crc-Ntmac for Image Tamper Proofing and authentication, The
Cross-layer optimized authentication and error control for wireless 3D medical video streaming over LTE
Crypto Signature Scheme For Image authentication Over Wireless Channel, A
Current Developments and Future Trends in Audio authentication
Customizing biometric authentication systems via discriminative score calibration
CVAR: Distributed and Extensible Cross-Region Vehicle authentication With Reputation for VANETs
Database, protocols and tools for evaluating score-level fusion algorithms in biometric authentication
Decision Fusion for Face authentication
Deep features fusion for user authentication based on human activity
Delegating authentication to Edge: A Decentralized Authentication Architecture for Vehicular Networks
Delegating authentication to Edge: A Decentralized Authentication Architecture for Vehicular Networks
Demosaicking recognition with applications in digital photo authentication based on a quadratic pixel correlation model
DePass: A secure hash-based authentication scheme
Design a new visual cryptography for human-verifiable authentication in accessing a database
Design of Blockchain and ECC-Based Robust and Efficient Batch authentication Protocol for Vehicular Ad-Hoc Networks
Design of Provably Secure authentication Protocol for Edge-Centric Maritime Transportation System
Developing a contactless palmprint authentication system by introducing a novel ROI extraction method
Differential Feature Analysis for Palmprint authentication
Digital fragile watermarking scheme for authentication of JPEG images
Digital images authentication scheme based on bimodal biometric watermarking in an independent domain
Digital Watermarking for Image authentication with Localization
Digital watermarking for telltale tamper proofing and authentication
Discriminative and generative vocabulary tree: With application to vein image authentication and recognition
Discriminative multimodal biometric authentication based on quality measures
discriminative parametric approach to video-based score-level fusion for biometric authentication, A
Discriminative training of spiking neural networks organised in columns for stream-based biometric authentication
Distance Measures for Gabor Jets-Based Face authentication: A Comparative Evaluation
Distortion metrics for predicting authentication functionality of printed security deterrents
Distributed Aggregate Privacy-Preserving authentication in VANETs
Do We Need Depth in State-Of-The-Art Face authentication?
Document authentication Using Printing Technique Features and Unsupervised Anomaly Detection
Document Identity, authentication and Ownership: The Future of Biometric Verification
Double-random-phase encryption with photon counting for image authentication using only the amplitude of the encrypted image
DPCC and QR factorization-based color medical image authentication algorithm
Dual authentication and Key Management Techniques for Secure Data Transmission in Vehicular Ad Hoc Networks
Dual Domain Watermarking for authentication and Compression of Cultural Heritage Images
Dual-Factor authentication System Featuring Speaker Verification and Token Technology, A
Dynamic Pore Filtering for Keypoint Detection Applied to Newborn authentication
Dynamic User authentication Based on Mouse Movements Curves
E-Key: An EEG-Based Biometric authentication and Driving Fatigue Detection System
EAAP: Efficient Anonymous authentication With Conditional Privacy-Preserving Scheme for Vehicular Ad Hoc Networks
ECG authentication System Design Based on Signal Analysis in Mobile and Wearable Devices
ECG based biometric authentication-a novel data modelling approach
Editorial for the special issue on implicit biometric authentication and monitoring through Internet of Biometric Things (I-BIO)
EEG-based biometric authentication modelling using incremental fuzzy-rough nearest neighbour technique
effective voiceprint based identity authentication system for Mandarin smartphone users, An
Efficient and Anonymous authentication With Succinct Multi-Subscription Credential in SAGVN
Efficient Anonymous Batch authentication Scheme Based on HMAC for VANETs, An
Efficient Anonymous Batch authentication Scheme With Conditional Privacy in the Internet of Vehicles (IoV) Applications
Efficient Conditional Privacy-Preserving authentication Scheme for Vehicular Sensor Networks Without Pairings, An
Efficient Group Handover authentication for Secure 5G-Based Communications in Platoons
efficient image authentication method based on Hamming code, An
Efficient Message-authentication Scheme Based on Edge Computing for Vehicular Ad Hoc Networks, An
Efficient multimodal ocular biometric system for person authentication based on iris texture and corneal shape
Efficient person authentication based on multi-level fusion of ear scores
Efficient Privacy-Preserving Dual authentication and Key Agreement Scheme for Secure V2V Communications in an IoV Paradigm
efficient reversible authentication scheme for demosaiced images with improved detectability, An
efficient reversible image authentication method using improved PVO and LSB substitution techniques, An
Efficient Vehicle-Assisted Aggregate authentication Scheme for Infrastructure-Less Vehicular Networks, An
Electrocardiogram authentication method robust to dynamic morphological conditions
Electromyograph and keystroke dynamics for spoof-resistant biometric authentication
Embedded Fingerprint authentication System Integrated with a Hardware-Based Truly Random Number Generator, An
Encryption, Visual Cryptography, authentication
Enhancing biometric security with wavelet quantization watermarking based two-stage multimodal authentication
Environment authentication Through 3D Structural Analysis
Error Resilient Image authentication Using Feature Statistical and Spatial Properties
Estimating Sample Size Requirements for Reliable Personal authentication Using User-Specific Samples
Evaluation of combined visible/NIR camera for iris authentication on smartphones
Evaluation Techniques for Biometrics-based authentication Systems (FRR)
Even big data is not enough: need for a novel reference modelling for forensic document authentication
Event-based unobtrusive authentication using multi-view image sequences
Evolution of Document authentication, The
expert vision system for analysis of Hebrew characters and authentication of manuscripts, An
Exploitation of 3D images for face authentication under pose and illumination variations
Exploiting JPEG2000 and Jpip for Image Based authentication
Exploration of an adaptive NoC architecture on FPGA dedicated to multi and hysperspectral algorithm for art authentication
Exploring orientation and accelerometer sensor data for personal authentication in smartphones using touchscreen gestures
Exploring touch-based behavioral authentication on smartphone email applications in IoT-enabled smart cities
Extreme Value Analysis for Mobile Active User authentication
Eye Blink Based Detection of Liveness in Biometric authentication Systems Using Conditional Random Fields
Eye movement analysis for human authentication: a critical survey
EyePAD++: A Distillation-based approach for joint Eye authentication and Presentation Attack Detection using Periocular Images
Face and Eye Detection for Person authentication in Mobile Phones
Face authentication Based on Morphological Grid Matching
Face authentication Based on Multiple Profiles Extracted from Range Data
Face authentication by Retinotopic Sampling of the Gabor Decomposition and Support Vector Machines
Face authentication Competition on the BANCA Database
Face authentication for Banking
Face authentication for multiple subjects using eigenflow
Face authentication from Cell Phone Camera Images with Illumination and Temporal Variations
Face authentication From Grayscale Coded Light Field
Face authentication test on the BANCA database
Face authentication Using Adapted Local Binary Pattern Histograms
Face authentication using graph-based low-rank representation of facial local structures for mobile vision applications
Face authentication Using One-Class Support Vector Machines
Face authentication using speed fractal technique
Face authentication using the trace transform
Face authentication with Gabor Information on Deformable Graphs
Face authentication With Makeup Changes
Face authentication with Salient Local Features and Static Bayesian Network
Face authentication with undercontrolled pose and illumination
Face Localization and authentication Using Color and Depth Images
Face recognition for authentication on mobile devices
Face Verification Systems, Face authentication
Face Verification, authentication, Evaluations, Verification Benchmarks
Face-Voice authentication Based on 3D Face Models
Facial attributes for active authentication on mobile devices
False Rejection Oriented Threat Model for the Design of Biometric authentication Systems, A
fast and memory efficient approach for fingerprint authentication system, A
Fast features for face authentication under illumination direction changes
Feature Extraction For Visual Speaker authentication Against Computer-Generated Video Attacks
Feature-Based Digital Image Watermarking for Copyright Protection and Content authentication, A
Feature-Level Fusion for Effective Palmprint authentication
Feature-Level Fusion of Finger Veins and Finger Dorsal Texture for Personal authentication Based on Orientation Selection
Feature-Watermarking Scheme for JPEG Image authentication, A
FewFaceNet: A Lightweight Few-Shot Learning-based Incremental Face authentication for Edge Cameras
Finger Vein Recognition Model for Biometric authentication Using Intelligent Deep Learning
Finger-drawn pin authentication on touch devices
Finger-vein authentication based on deformation-tolerant feature-point matching
Finger-Vein authentication Based on Wide Line Detector and Pattern Normalization
Fingerprint authentication Based on Matching Scores with Other Data
Fingerprint authentication Device Based on Optical Characteristics Inside a Finger
Fingerprint authentication System Based on Mobile Phone, A
Fingerprint Quality Indices for Predicting authentication Performance
Fingerprint-based User-friendly Interface and Pocket-PID for Mobile authentication
Fingerprint-PKI authentication using Zernike moments
First Approach to Contact-Based Biometrics for User authentication, A
Fractal Based Image Watermarking for authentication and Verification, A
Fragile and blind watermarking technique based on Weber's law for medical image authentication
Fragile and semi-fragile image authentication based on image self-similarity
Fragile watermark based on the Gaussian mixture model in the wavelet domain for image authentication
Fragile Watermarking Scheme Based CRC Checksum and Public Key Cryptosystem for RGB Color Image authentication, A
Fragile Watermarking Scheme for Image authentication Using Wavelet Transform, A
Free-text keystroke dynamics authentication for Arabic language
Freely typed keystroke dynamics-based user authentication for mobile devices based on heterogeneous features
Frontal Face authentication Through Creaseness-Driven Gabor Jets
Frontal Face authentication Using Morphological Elastic Graph Matching
Frontal face authentication using variants of dynamic link matching based on mathematical morphology
Fundamentals Of Biometric authentication Technologies
Furthering fingerprint-based authentication: Introducing the true-neighbor template
Fusion of Audio and Video Information for Multi Modal Person authentication
Fusion of Auxiliary Information for Multi-modal Biometrics authentication
Fusion of color spaces for ear authentication
Fusion of electrocardiogram with unobtrusive biometrics: An efficient individual authentication system
Fusion of iris and palmprint for multimodal biometric authentication
Fusion of Person authentication Probabilities by Bayesian Statistics
Fusion of Phase And Orientation Information for Palmprint authentication
Fusion of submanifold and local texture features for palmprint authentication
Fusion of visible and synthesised near infrared information for face authentication
Fuzzy Extractors for Minutiae-Based Fingerprint authentication
Fuzzy rule based approach for face and facial feature extraction in biometric authentication
GA SVM Wrapper Ensemble for Keystroke Dynamics authentication
Gait authentication using distributed source coding
Gait based authentication using gait information image features
Generalized Butterfly Graph and Its Application to Video Stream authentication
Generating Fixed-Length Representation From Minutiae Using Kernel Methods for Fingerprint authentication
Genetic algorithm attack on minutiae-based fingerprint authentication and protected template fingerprint systems
GPS Signal authentication From Cooperative Peers
Graph application on face for personal authentication and recognition
Graphical Password-Based User authentication With Free-Form Doodles
Group-Based Multicast Service authentication and Data Transmission Scheme for 5G-V2X, A
Guest Editorial: BIOSIG 2020 special issue on trustworthiness of person authentication
Hand Gesture authentication by Discovering Fine-Grained Spatiotemporal Identity Characteristics
Hand vein authentication using biometric graph matching
hand-based personal authentication using a coarse-to-fine strategy, A
Handwriting authentication by envelopes of sound signatures
Hardware Architecture for Video authentication Using Sensor Pattern Noise
Hardware Implementation of a Digital Watermarking System for Video authentication
Hardware Implementation of Fingerprint Verification for Secure Biometric authentication Systems, A
Hash function for 3D mesh model authentication
HDMA: Hybrid D2D Message authentication Scheme for 5G-Enabled VANETs
Heartbeat biometrics for human authentication
HEVC video authentication using data embedding technique
Hierarchical Image authentication Watermark with Improved Localization and Security, A
Hierarchical multiple image watermarking for image authentication and ownership verification
Hierarchical watermarking for secure image authentication with localization
High Capacity Data Hiding for Binary Image authentication
High-Capacity Invisible Background Encoding for Digital authentication of Hardcopy Documents
High-Resolution Remote Sensing Image Integrity authentication Method Considering Both Global and Local Features
HSS-based robust and lightweight multiple group authentication for ITS towards 5G, An
Hybrid Biometric Person authentication Using Face and Voice Features
hybrid novelty score and its use in keystroke dynamics-based user authentication, A
Hybrid Watermarking Scheme for Video authentication, A
I-Am: Implicitly Authenticate Me: Person authentication on Mobile Devices Through Ear Shape and Arm Gesture
Identity authentication Based on Dynamic Touch Behavior on Smartphone
Identity authentication based on keystroke dynamics for mobile device users
Identity authentication Scheme for the Distributed Centers System
Identity authentication using improved online signature verification method
Identity-authentication System Using Fingerprints, An
Identity-Based authentication Mechanism for Secure Information Sharing in the Maritime Transport System
ill-posed operator for secure image authentication, An
Illumination Normalization for Sift Based Finger Vein authentication
Illumination Normalization Using Logarithm Transforms for Face authentication
Image alignment based perceptual image hash for content authentication
Image authentication algorithm with recovery capabilities based on neural networks in the DCT domain
Image authentication and Integrity Verification Via Content-based Watermarks and a Public Key Cryptosystem
Image authentication and tamper detection using two complementary watermarks
Image authentication and Tamperproofing for Noisy Channels
Image authentication Based on Distributed Source Coding
Image authentication Based on Faber Schauder DWT
Image authentication by detecting traces of demosaicing
image authentication method by applying Hamming code on rearranged bits, An
Image authentication Scheme Based on Self-embedding Watermarking
Image authentication Scheme for Accurate Localization and Restoration, An
Image authentication techniques for surveillance applications
Image authentication using a vector beam with sparse phase information
Image authentication Using Block Truncation Coding in Lifting Wavelet Domain
Image authentication Using Distributed Source Coding
Image authentication using generalised finite automata
Image based document authentication using DCT
Image Databases: A Case Study in Norwegian Silver authentication
Image Integrity authentication Scheme Based on Fixed Point Theory
Image model and printed document authentication: A theoretical analysis
Image quality-augmented intramodal palmprint authentication
Image-Based Multimodal Face authentication
Implementation of TiOISSS with meaningful shadows and with an additional authentication image
Improved authentication Accuracy by Individually Set Orders of the Fractional Fourier Transform and Effects of Damage of Fingerprint Image on Authentication Accuracy
Improved authentication Accuracy by Individually Set Orders of the Fractional Fourier Transform and Effects of Damage of Fingerprint Image on Authentication Accuracy
improved BioHashing for human authentication, An
Improving Fusion with Margin-Derived Confidence in Biometric authentication Tasks
Improving the Binding of Electronic Signatures to the Signer by Biometric authentication
Improving the Security of LTE-R for High-Speed Railway: From the Access authentication View
Including Biometric authentication in a Smart Card Operating System
Incorporating Cohort Information for Reliable Palmprint authentication
Incorporating color information for reliable palmprint authentication
integrated visual saliency-based watermarking approach for synchronous image authentication and copyright protection, An
Integration of 2D and 3D images for enhanced face authentication
Integration of Device Fingerprint authentication and Physical-Layer Secret Key Generation
Intelligent Terminal Based Privacy-Preserving Multi-Modal Implicit authentication Protocol for Internet of Connected Vehicles, An
Introduction to the special issue on authentication, copyright protection, and information hiding
Inverse biometrics: A case study in hand geometry authentication
Inversion attack resilient zero-watermarking scheme for medical image authentication
Invertible secret image sharing with steganography and authentication for AMBTC compressed images
Invertible Watermarking Algorithm with Detecting Locations of Malicious Manipulation for Biometric Image authentication
Invisible Semi-Fragile Watermarking and Steganography of Digital Videos for Content authentication and Data Hiding
Iris and Signature authentication Using Continuous Dynamic Programming
Iris authentication apparatus
Iris authentication Using Privatized Advanced Correlation Filter
Iris-Based Personal authentication Using a Normalized Directional Energy Feature
ISURE: User authentication in mobile devices using ocular biometrics in visible spectrum
Iterative compensation schemes for multimedia content authentication
Java-based internet biometric authentication system
Joint near-lossless compression and watermarking of still images for authentication and tamper localization
Joint wavelet compression and authentication watermarking
K out of N Secret Sharing Scheme for Multiple Color Images with Steganography and authentication
Kernel Deep Regression Network for Touch-Stroke Dynamics authentication
Key binding biometrics-based remote user authentication scheme using smart cards
Keystroke dynamics for user authentication
Keystroke Mobile authentication: Performance of Long-Term Approaches and Fusion with Behavioral Profiling
Large-Scale Evaluation of Multimodal Biometric authentication Using State-of-the-Art Systems
largest inertial sensor-based gait database and performance evaluation of gait-based personal authentication, The
LBP-based biometric hashing scheme for human authentication
Learning based video authentication using statistical local information
Learning to Hash for Personalized Image authentication
Leveraging shape and depth in user authentication from in-air hand gestures
Lightweight authentication for MP4 Format Container Using Subtitle Track
Lightweight authentication Scheme for 6G-IoT Enabled Maritime Transport System, A
Likelihood normalization for face authentication in variable recording conditions
Local Binary Patterns as an Image Preprocessing for Face authentication
Local Feature Integration Method Using Phase Congruency for Palm Print authentication
Localization and Security Enhancement of Block-based Image authentication
Lossless authentication of mpeg-2 video
Lossless Watermarking for Image authentication: A New Framework and an Implementation
Machine authentication of Security Documents
Machine-assisted authentication of paper currency: An experiment on Indian banknotes
MasterPrint: Exploring the Vulnerability of Partial Fingerprint-based authentication Systems
Mean Quantization Blind Watermarking for Image authentication
Membership authentication in dynamic face groups
Membership authentication in the dynamic group by face classification using SVM ensemble
Method for Estimating authentication Performance over Time, with Applications to Face Biometrics, A
Mini-batch bagging and attribute ranking for accurate user authentication in keystroke dynamics
Minutiae-based template synthesis and matching for fingerprint authentication
Mobile behavioral biometrics for passive authentication
Morphological elastic graph matching applied to frontal face authentication under well-controlled and real conditions
Motion Features from Lip Movement for Person authentication
Multi scale multi descriptor local binary features and exponential discriminant analysis for robust face authentication
Multi-attack Reference Hashing Generation for Image authentication
multi-biometric system for continuous student authentication in e-learning platforms, A
Multi-Factor authentication on Cloud
Multi-feature Based Invertible authentication Watermarking for JPEG Images, A
Multi-layer authentication scheme for HEVC video based on embedded statistics
multi-matcher for ear authentication, A
Multi-Modal Data Fusion for Person authentication Using SVM
Multi-Modal Human authentication Using Silhouettes, Gait and RGB
Multi-patches Iris Based Person authentication System Using Particle Swarm Optimization And Fuzzy C-means Clustering
Multibiometrics for Identity authentication: Issues, Benefits and Challenges
Multimedia content authentication: fundamental limits
Multimedia Data Hiding and authentication via Halftoning and Coordinate Projection
Multimedia Quality-Driven Network Resource Management Architecture for Wireless Sensor Networks With Stream authentication, A
Multimodal authentication on smartphones: Combining iris and sensor recognition for a double check of user identity
Multimodal authentication Using Asynchronous HMMs
Multimodal biometric authentication based on iris pattern and pupil light reflex
Multimodal biometric authentication using quality signals in mobile communications
Multimodal biometric authentication using speech and hand geometry fusion
Multimodal Biometric Person authentication Using Face, Ear and Periocular Region Based on Convolution Neural Networks
Multimodal Biometric-Based authentication with Secured Templates
Multimodal Decision-Level Fusion for Person authentication
Multimodal person authentication using speech, face and visual speech
Multipurpose watermarking for image authentication and protection
Multiresolution fragile watermarking using complex chirp signals for content authentication
NavCom Signal authentication Scheme Based on Twice Two-Way Satellite Time Transfer, A
New Approach for Biometric Template Storage and Remote authentication, A
New Approach to Signature-Based authentication, A
New Audio Watermarking for Copyright Protection and Content authentication, A
new authentication based cheating prevention scheme in Naor-Shamir’s visual cryptography, A
New Card authentication Scheme Based on Image Watermarking and Encryption, A
New Experiments on ICP-Based 3D Face Recognition and authentication
New Features for authentication by On-Line Handwritten Signatures
New Fragile authentication Watermark for Images
new multi-level approach to EEG based human authentication using eye blinking, A
New Multi-Unit Iris authentication Based on Quality Assessment and Score Level Fusion for Mobile Phones, A
New Public-Key authentication Watermarking for Binary Document Images Resistant to Parity Attacks, A
new scheme of sharing secrets in stego images with authentication, A
New Self-Recovery Technique for Image authentication, A
New Semi-Fragile Watermarking Scheme for authentication and Tamper Localization in Remote Sensing Images, A
New Study On Wood Fibers Textures: Documents authentication Through LBP Fingerprint, A
New Watermarking Method for Video authentication with Tamper Localization, A
Non-conventional keystroke dynamics for user authentication
Non-redundant frame identification and keyframe selection in DWT-PCA domain for authentication of video
novel approach for secured multimodal biometric authentication based on data fusion technique, A
novel approach for securing data against adversary attacks in UAV embedded HetNet using identity based authentication scheme, A
novel approach to adaptive image authentication, A
novel approach to design of user re-authentication systems, A
Novel Fast Self-restoration Semi-fragile Watermarking Algorithm for Image Content authentication Resistant to JPEG Compression, A
Novel framework for multimodal biometric image authentication using visual share neural network
Novel Hybrid Crypto-Biometric authentication Scheme for ATM Based Banking Applications, A
Novel Hybrid Image authentication Scheme for AMBTC-Compressed Images, A
Novel Line Pattern Algorithm for Embedded Fingerprint authentication System, A
Novel MAC-Based authentication Scheme (NoMAS) for Internet of Vehicles (IoV), A
novel public key self-embedding fragile watermarking technique for image authentication, A
Novel Watermarking Algorithm for Image authentication: Robustness Against Common Attacks and JPEG2000 Compression, A
novel watermarking scheme for H.264/AVC video authentication, A
Obtaining cryptographic keys using feature level fusion of iris and face biometrics for secure user authentication
On combining classifiers for speaker authentication
On Combining Textural and Geometrical Scores for Discriminative Face authentication
On Continuous User authentication via Typing Behavior
On modeling variations for face authentication
On Person authentication by Fusing Visual and Thermal Face Biometrics
On the design of biometric-based user authentication protocol in smart city environment
On the discriminability of keystroke feature vectors used in fixed text keystroke authentication
On the security of the digest function in the SARI image authentication system
On the security of the SARI image authentication system
On the transferability of adversarial perturbation attacks against fingerprint based authentication systems
On the Use of Log-Likelihood Ratio Based Model-Specific Score Normalisation in Biometric authentication
On the Use of SIFT Features for Face authentication
On using error bounds to optimize cost-sensitive multimodal biometric authentication
On-line signature authentication using Zernike moments
One-Class Classification Method for Human Gait authentication Using Micro-Doppler Signatures, A
One-class Random Maxout Probabilistic Network for Mobile Touchstroke authentication
One-factor Cancellable Biometrics based on Indexing-First-Order Hashing for Fingerprint authentication
One-Pass Incremental Membership authentication by Face Classification
One-shot lip-based biometric authentication: Extending behavioral features with authentication phrase information
One-shot lip-based biometric authentication: Extending behavioral features with authentication phrase information
One-shot Representational Learning for Joint Biometric and Device authentication
Online biometric authentication using facial thermograms
Online finger-knuckle-print verification for personal authentication
Optimized Content-Aware authentication Scheme for Streaming JPEG-2000 Images Over Lossy Networks, An
Orientation Field Estimation for Embedded Fingerprint authentication System
Orientation-Compensative Signal Registration for Owner authentication Using an Accelerometer
PACP: An Efficient Pseudonymous authentication-Based Conditional Privacy Protocol for VANETs
Palm line extraction and matching for personal authentication
palm print authentication system using quantized phase feature representation, A
Palm Vein Extraction and Matching for Personal authentication
Palmprint and Finger Knuckle Based Person authentication with Random Forest via Kernel-2DPCA
Palmprint authentication
Palmprint authentication Based on Orientation Code Matching
Palmprint authentication System for Civil Applications
Palmprint authentication using a symbolic representation of images
Palmprint authentication Using Time Series
Palmprint texture analysis based on low-resolution images for personal authentication
Partial face detection for continuous authentication
Password hardened fuzzy vault for fingerprint authentication system
Password policy characteristics and keystroke biometric authentication
Pattern-Based Data Hiding for Binary Image authentication by Connectivity-Preserving
Perceptual analysis of handwritten signatures for biometric authentication
Perceptual authentication Hashing for Digital Images With Contrastive Unsupervised Learning
Perceptual hashing for image authentication: A survey
Perceptual Image Hashing for Content authentication Based on Convolutional Neural Network With Multiple Constraints
Perceptual Video Hashing for Content Identification and authentication
Perfomance analysis of the Fridrich-Goljan self-embedding authentication method
Performance evaluation of continuous authentication systems
Performance Generalization in Biometric authentication Using Joint User-Specific and Sample Bootstraps
Periocular authentication based on FEM using Laplace-Beltrami eigenvalues
Person authentication from neural activity of face-specific visual self-representation
Person authentication from Video of Faces: A Behavioral and Physiological Approach Using Pseudo Hierarchical Hidden Markov Models
Person authentication System Based on RFID Tags and a Cascade of Face Recognition Algorithms, A
Person authentication using ASM based lip shape and intensity information
Person authentication Using Brainwaves (EEG) and Maximum A Posteriori Model Adaptation
Person authentication Using Head Images
Person Localization and Soft authentication Using an Infrared Ceiling Sensor Network
Personal authentication and risk evaluation by sensible keyboard sound
Personal authentication Based on 3D Configuration of Micro-feature Points on Facial Surface
Personal authentication using feature points on finger and palmar creases
Personal authentication using hand images
Personal authentication Using Hand Vein Triangulation and Knuckle Shape
Personal authentication using multiple palmprint representation
Personal authentication using palm-print features
Personalized Face authentication Based on Few-Shot Meta-Learning
Photo-Image authentication by Pattern Recognition and Cryptography
PLVA: Privacy-Preserving and Lightweight V2I authentication Protocol
PNU Spoofing: a menace for biometrics authentication systems?
Polynomial features for robust face authentication
Portable authentication device and method using iris patterns
Pose Correction and Subject-Specific Features for Face authentication
Practical Biometric authentication with Template Protection
practical design of digital video watermarking in H.264/AVC for content authentication, A
Practical Systems for Personal Fingerprint authentication
Predicting Biometric authentication System Performance Across Different Application Conditions: A Bootstrap Enhanced Parametric Approach
Privacy and authentication Scheme for IoT Environments Using ECC and Fuzzy Extractor, A
Privacy preserving biometric-based remote authentication with secure processing unit on untrusted server
Privacy Preserving Facial and Fingerprint Multi-biometric authentication
PRIVV: Private remote iris-authentication with Vaulted Verification
Projected texture for hand geometry based authentication
Prolog to an Identity-authentication System Using Fingerprints
Protection motivation theory using multi-factor authentication for providing security over social networking sites
Provably Secure and Anonymous V2I and V2V authentication Protocol for VANETs
Provably Secure Mobile User authentication Scheme for Big Data Collection in IoT-Enabled Maritime Intelligent Transportation System, A
Proxy-Based authentication and Billing Scheme With Incentive-Aware Multihop Forwarding for Vehicular Networks, A
public key watermark for image verification and authentication, A
Public Key Watermarking for Reversible Image authentication
public-key authentication watermarking for binary images, A
Quad Phase Minimum Average Correlation Energy Filters for Reduced Memory Illumination Tolerant Face authentication
Quality-Based Score Normalization for Audiovisual Person authentication
Quality-Optimized and Secure End-to-End authentication for Media Delivery
Quantifying Gait Similarity: User authentication and Real-World Challenge
quantitive semi-fragile jpeg2000 image authentication system, A
Quantization-Based Fragile Watermarking Using Block-Wise authentication and Pixel-Wise Recovery Scheme for Tampered Image
quantization-based semi-fragile watermarking scheme for image content authentication, A
Quickest Intruder Detection For Multiple User Active authentication
Radar-Based Non-Contact Continuous Identity authentication
Radon/ridgelet signature for image authentication
Random hand gesture authentication via efficient Temporal Segment Set Network
Random subspace for an improved BioHashing for face authentication
Rate-Distortion-authentication Optimized Streaming of Authenticated Video
Rate-Distortion-authentication optimized streaming with Generalized Butterfly Graph authentication
Rate-Distortion-authentication optimized streaming with Generalized Butterfly Graph authentication
Re-quantization Based Semi-Fragile authentication for General Uniform Quantizer
Real Time Lip Motion Analysis for a Person authentication System using Near Infrared Illumination
Real-time adult authentication scheme for digital contents using X.509 certificate in ubiquitous Web environment
real-time reversible image authentication method using uniform embedding strategy, A
Region-Level Image authentication Using Bayesian Structural Content Abstraction
Regularized Framework for Feature Selection in Face Detection and authentication, A
Reliable Cooperative authentication for Vehicular Networks
Remote authentication System Using Fingerprints, A
Remote authentication Using Vaulted Fingerprint Verification
Remote multimodal biometric authentication using bit priority-based fragile watermarking
Reply to Comments on Dual authentication and Key Management Techniques for Secure Data Transmission in Vehicular Ad Hoc Networks
Research and Design of CAS Protocol Identity authentication
Retinal vision applied to facial features detection and face authentication
Retraining a Novelty Detector with Impostor Patterns for Keystroke Dynamics-Based authentication
Reversibility-oriented secret image sharing mechanism with steganography and authentication based on code division multiplexing
Reversible watermarking technique to enhance security of a biometric authentication system
Robust authentication scheme for protecting copyrights of images and graphics
Robust authentication Using Dorsal Hand Vein Images
Robust biometric authentication system with a secure user template
robust content based digital signature for image authentication, A
Robust Features for Frontal Face authentication in Difficult Image Conditions
Robust Fingerprint authentication Using Local Structural Similarity
Robust human authentication using appearance and holistic anthropometric features
robust image authentication method distinguishing JPEG compression from malicious manipulation, A
Robust image hash in Radon transform domain for authentication
Robust Lossless Image Data Hiding Designed for Semi-Fragile Image authentication
Robust multimodal 2D and 3D face authentication using local feature fusion
Robust Revocable Anonymous authentication for Vehicle to Grid Communications
Robust Video Facial authentication With Unsupervised Mode Disentanglement
robust watermark authentication technique based on Weber's descriptor, A
Robust watermarking scheme for tamper detection and authentication exploiting CA
Role of Statistical Models in Biometric authentication, The
SAPSC: SignRecrypting authentication protocol using shareable clouds in VANET groups
Satellite Navigation Signal authentication in GNSS: A Survey on Technology Evolution, Status, and Perspective for BDS
SAVE: Efficient Privacy-Preserving Location-Based Service Bundle authentication in Self-Organizing Vehicular Social Networks
Scalable authentication for various representations of JPEG 2000 images
Scalable watermark extraction for real-time authentication of JPEG 2000 images
score calculation method using positional information of feature points for biometric authentication, A
Score Selection Techniques for Fingerprint Multi-modal Biometric authentication
Score-Level Fusion Benchmark Database for Biometric authentication, A
Screen-based active user authentication
Scribble-a-Secret: Similarity-based password authentication using sketches
Secret and public key image watermarking schemes for image authentication and ownership verification
Secret image sharing scheme with adaptive authentication strength
Secret image sharing with separate shadow authentication ability
Secret-Sharing-Based Method for authentication of Grayscale Document Images via the Use of the PNG Image With a Data Repair Capability, A
Securable networked scheme with face authentication
Secure and Efficient authentication Scheme for Access Control in Mobile Pay-TV Systems, A
Secure and Localizing Watermarking Technique for Image authentication, A
Secure and Robust authentication Scheme for Video Transcoding, A
Secure and Robust Two-Phase Image authentication
Secure authentication and Key Management Protocol for Deployment of Internet of Vehicles (IoV) Concerning Intelligent Transport Systems
secure authentication watermarking for halftone and binary images, A
Secure biometric template generation for multi-factor authentication
Secure Biometrics: Concepts, authentication Architectures, and Challenges
Secure Fingerprint authentication with Homomorphic Encryption
Secure Fragile Digital Watermarking Technique for Image authentication
secure high capacity full-gray-scale-level multi-image information hiding and secret image authentication scheme via Tchebichef moments, A
secure image authentication algorithm with pixel-level tamper localization, A
secure media streaming mechanism combining encryption, authentication, and transcoding, A
Secure multicasting of images via joint privacy-preserving fingerprinting, decryption, and authentication
Secure reversible visible image watermarking with authentication
Secure Self-Recovery Image authentication Using Randomly-Sized Blocks
Secure speech biometric templates for user authentication
Secure transcoding with JPSEC confidentiality and authentication
Secure transfer of medical images using hybrid encryption: authentication, confidentiality, integrity
Securing Electronic Medical Records Using Biometric authentication
Security and privacy enhanced smartphone-based gait authentication with random representation learning and digital lockers
Security authentication with a three-dimensional optical phase code using random forest classifier
Security Enhanced authentication Protocol for Space-Ground Integrated Railway Networks
Security Enhancement for Real-Time Parallel In-Vehicle Applications by CAN FD Message authentication
Security evaluation of biometric authentication systems under real spoofing attacks
Security of an Ill-Posed Operator for Image authentication
Security-Enhanced Certificateless Conditional Privacy-Preserving authentication Scheme for Vehicular Ad Hoc Networks, A
Seeing-Is-Believing: Using Camera Phones for Human-Verifiable authentication
Selecting 3d Curves On The Nasal Surface Using Adaboost for Person authentication
Self Recovery authentication Of Images In The Dwt Domain
SEMBA: secure multi-biometric authentication
Semi-fragile image authentication using generic wavelet domain features and ecc
Semi-fragile Image authentication Using Robust Image Hashing with Localization
Semi-fragile watermarking for grayscale image authentication and tamper detection based on an adjusted expanded-bit multiscale quantization-based technique
Semi-fragile Watermarking for Tamper Proofing and authentication of Still Images
Session variability modelling for face authentication
Shape Contexts and Gabor Features for Face Description and authentication
Sharing secrets in stego images with authentication
Shoulder-Surfing Resistant authentication Using Pass Pattern of Pattern Lock
SIC DB: multi-modal database for person authentication
Signal Structure-Based authentication for Civil GNSSs: Recent Solutions and Perspectives
Signature authentication based on human intervention: Performance and complementarity with automatic systems
Silhouettes versus skeletons in gesture-based authentication with Kinect
Similarity Metrics Analysis for Feature Point Based Retinal authentication
Similarity-based matching for face authentication
single watermark based scheme for both protection and authentication of identities, A
Single-Semantic Multi-Instance Fusion of Handwriting Based Biometric authentication Systems
singular-value-based semi-fragile watermarking scheme for image content authentication with tamper localization, A
Sketch-Based User authentication With a Novel String Edit Distance Model
Small scale single pulse ECG-based authentication using GLRT that considers T wave shift and adaptive template update with prior information
SmartCAMPP: Smartphone-based continuous authentication leveraging motion sensors with privacy preservation
Smart_Auth: User Identity authentication Based on Smartphone Motion Sensors
Soft-Biometrics: Unconstrained authentication in a Surveillance Environment
Spatio-temporal representation for face authentication by using multi-task learning with human attributes
Spatiotemporal analysis of human activities for biometric authentication
Special Issue on Audio-Based and Video-Based Person authentication
Spectral Subband Centroids as Complementary Features for Speaker authentication
Speech authentication and Recovery Scheme in Encrypted Domain
Speech authentication system using digital watermarking and pattern recovery
Spoofing detection on adaptive authentication System-A survey
Statistical independence of ECG for biometric authentication
Statistical Model-Based Detector via Texture Weight Map: Application in Re-Sampling authentication
Statistical Performance Evaluation of Biometric authentication Systems Using Random Effects Models
Steganographic authentication Method for Electronic IDs
Stream authentication Based on Generalized Butterfly Graph
Study of Identical Twins' Palmprints for Personal authentication, A
Study on Color Spaces for Single Image Enrolment Face authentication
study on security evaluation methodology for image-based biometrics authentication systems, A
Subject-Sensitive Perceptual Hash Based on MUM-Net for the Integrity authentication of High Resolution Remote Sensing Images, A
Superpixel-Based Watermarking Scheme for Image authentication and Recovery
Support Vector Machines for Face authentication
Surveillance Video authentication Using Universal Image Quality Index of Temporal Average
Survey of Watermarking Algorithms for Image authentication, A
SVD-Based Fragile Watermarking Scheme for Image authentication, A
SVD-based image compression, encryption, and identity authentication algorithm on cloud
SVD-based self-embedding image authentication scheme using quick response code features
SviaB: Secure and verifiable multi-instance iris remote authentication using blockchain
SVM-Based Biometric authentication Using Intra-Body Propagation Signals
SVM-Based Selection of Colour Space Experts for Face authentication
System for Reading Braille Embossed on Beverage Can Lids for authentication
Tablet owner authentication based on behavioral characteristics of multi-touch actions
Tampering with a watermarking-based image authentication scheme
Task-Driven Biometric authentication of Users in Virtual Reality (VR) Environments
TASTNet: An end-to-end deep fingerprinting net with two-dimensional attention mechanism and spatio-temporal weighted fusion for video content authentication
taxonomy for image authentication techniques and its application to the current state of the art, A
Template protection for HMM-based on-line signature authentication
Theoretical Framework for Constructing Matching Algorithms in Biometric authentication Systems
Three Byte-Based Mutual authentication Scheme for Autonomous Internet of Vehicles
Token-Based Fingerprint authentication
Touch Gesture-Based Active User authentication Using Dictionaries
Touch-Stroke Dynamics authentication Using Temporal Regression Forest
Touchstroke: Smartphone User authentication Based on Touch-Typing Biometrics
Toward a Secure Public-key Blockwise Fragile authentication Watermarking
Toward Person authentication with Point Light Display Using Neural Network Ensembles
Toward secure public-key blockwise fragile authentication watermarking
Toward Ubiquitous Acceptance of Biometric authentication: Template Protection Techniques
Towards contactless palmprint authentication
Towards Effective Content authentication for Digital Videos by Employing Feature Extraction and Quantization
Towards Gesture-Based User authentication
Towards mobile authentication using dynamic signature verification: Useful features and performance evaluation
Towards Multiple User Active authentication in Mobile Devices
Transmission-Efficient Image-Based authentication for Mobile Devices
Trends in User Identity and Continuous authentication
Two Factor Face authentication Scheme with Cancelable Feature
Two-Factor authentication or How to Potentially Counterfeit Experimental Results in Biometric Systems
Two-Factor authentication System Using P300 Response to a Sequence of Human Photographs
Unifying Probabilistic Linear Discriminant Analysis Variants in Biometric authentication
Usability Study of Continuous Biometrics authentication, An
User authentication based on Face Recognition with Support Vector Machines
User authentication based on foot motion
User authentication Based on JPEG2000 Images
User authentication System Based on Speech and Cascade Hybrid Facial Feature
User authentication through Typing Biometrics Features
User authentication Using Fusion Of Face And Palmprint
User Classification for Keystroke Dynamics authentication
Using adapted Levenshtein distance for on-line signature authentication
Using Phase and Directional Line Features for Efficient Palmprint authentication
Using recurrent neural networks for continuous authentication through gait analysis
Using Score Normalization to Solve the Score Variation Problem in Face authentication
Using SIFT features in palmprint authentication
Using Support Vector Machines for Face authentication Based on Elastic Graph Matching
Using Support Vector Machines to Enhance the Performance of Elastic Graph Matching for Frontal Face authentication
Utilizing overt and latent linguistic structure to improve keystroke-based authentication
Validating a Biometric authentication System: Sample Size Requirements
Value of Multiple Viewpoints in Gesture-Based User authentication, The
Variable block-size image authentication with localization and self-recovery
Variants of Dynamic Link Architecture Based on Mathematical Morphology for Frontal Face authentication
Video Encryption, Video Cryptography, authentication
Video-based signature verification and pen-grasping posture analysis for user-dependent identification authentication
Visual speaker authentication by ensemble learning over static and dynamic lip details
Visual speaker authentication with random prompt texts by a dual-task CNN framework
Vulnerabilities, Threats, and authentication in Satellite-Based Navigation Systems
Watermarking 3D triangle meshes for authentication and integrity
Watermarking for authentication of LZ-77 Compressed Documents
Watermarking for image authentication
Watermarking for JPEG Image authentication Surviving Integer Rounding in Decompression
Watermarking for self-authentication of compressed video
Watermarking JBIG2 Text Region for Image authentication
Watermarking Technique for authentication of 3-D Polygonal Meshes
Watermarking-based image authentication with recovery capability using halftoning technique
watermarking-based image ownership and tampering authentication scheme, A
Watermarks for Copyright, Ownership Protection, authentication, Verification
Wavelet decomposition tree selection for palm and face authentication
Wavelet Packet and Adaptive Spatial Transformation of Watermark for Digital Image authentication
Wavelet-Based Fragile Watermarking Scheme for Secure Image authentication, A
Who's Who? Challenges in Biometric authentication
Wolf Attack Probability: A New Security Measure in Biometric authentication Systems
wrapper based feature subset selection using ACO-ELM-ANP and GA-ELM-ANP approaches for keystroke dynamics authentication, A
Writers authentication and fractal compression
µPEWFace: Parallel ensemble of weighted deep convolutional neural networks with novel loss functions for face-based authentication
774 for authentication

_authenticator_
Continual Retraining of Keystroke Dynamics Based authenticator
Integrated Dual Factor authenticator Based on the Face Data and Tokenised Random Number, An

_authenticity_
authenticity and integrity of digital mammography images
Image forensic signature for content authenticity analysis
On Automatic authenticity Verification of Printed Security Documents
Real vs. Fake Emotion Challenge: Learning to Rank authenticity from Facial Activity Descriptors

Index for "a"


Last update:27-Apr-24 12:10:16
Use price@usc.edu for comments.