_ | authentication | _ |
3D Convolutional Neural Networks Based Speaker Identification and | authentication | |
3D face and hand biometric system for robust user-friendly | authentication | , A |
3D face | authentication | and recognition based on bilateral symmetry analysis |
Accuracy of a high-level, loss-tolerant video fingerprint for surveillance | authentication | |
Accurate Iris Boundary Detection in Iris-Based Biometric | authentication | Process |
Active vision-based face | authentication | |
Activity related | authentication | using prehension biometrics |
Activity related biometric | authentication | using Spherical Harmonics |
Adapted user-dependent multimodal biometric | authentication | exploiting general information |
Adaptive biometric | authentication | using nonlinear mappings on quality measures and verification scores |
Adaptive Group-Based Zero Knowledge Proof- | authentication | Protocol in Vehicular Ad Hoc Networks |
adaptive image | authentication | scheme for vector quantization compressed image, An |
Additive Adversarial Learning for Unbiased | authentication | |
Aggregated Zero-Knowledge Proof and Blockchain-Empowered | authentication | for Autonomous Truck Platooning |
Aggregator operations considering | authentication | for electrical charging of EVs |
Algorithm for Biometric | authentication | Based on the Model of Non-Stationary Random Processes, An |
Alteration-Locating | authentication | Watermarking for Binary Images |
Analysis of Brute-Force Break-Ins of a Palmprint | authentication | System |
Anonymous Batch | authentication | and Key Exchange Protocols for 6G Enabled VANETs, An |
Application and Evaluation of a 2D+3D Face | authentication | System |
Application | authentication | System with Efficiently Updatable Signature |
Application of fusion techniques to speaker | authentication | over ip networks |
approach for on-line signature | authentication | using Zernike moments, An |
Architecture for Synchronous Multiparty | authentication | Using Biometrics |
Art of Deception: Novel Graphical User | authentication | Scheme Using Illusion Images, The |
Artificial neural network approach to | authentication | of coins by vision-based minimization |
Artificial Rhythms and Cues for Keystroke Dynamics Based | authentication | |
Audio Visual Person | authentication | by Multiple Nearest Neighbor Classifiers |
Audio- and Video-Based Biometric Person | authentication | |
Audio-Visual Person | authentication | with Multiple Visualized-Speech Features and Multiple Face Profiles |
| authentication | by Biometric Verification |
| authentication | Mechanism Using Chinese Remainder Theorem for Efficient Surveillance Video Transmission, An |
| authentication | of 3-D Polygonal Meshes |
| authentication | of area fingerprint scanners |
| authentication | of biomedical images based on zero location watermarking |
| authentication | Of Copy Detection Patterns Under Machine Learning Attacks: A Supervised Approach |
| authentication | of currency notes through printing technique verification |
| authentication | of digital images and video: Generic models and a new contribution |
| authentication | of Free Hand Drawings by Pattern Recognition Methods |
| authentication | of lossy compressed video data by semi-fragile watermarking |
| authentication | of medical images using passive approach |
| authentication | of MPEG-4-based surveillance video |
| authentication | of Random Patterns by Finding a Match in an Image Database |
| authentication | of Scalable Video Streams With Low Communication Overhead |
| authentication | of Vincent van Gogh's Work |
| authentication | using Finger Knuckle Prints |
| authentication | -Based on Biomechanics of Finger Movements Captured Using Optical Motion-Capture |
Authors reply Sharing secrets in stego images with | authentication | |
Automated 3D Face | authentication | and recognition |
Automated Cartridge Identification for Firearm | authentication | |
Automatic 3D face | authentication | |
Automatic Face | authentication | from 3d surface |
Automatic face | authentication | with self compensation |
Automatic image | authentication | and recovery using fractal code embedding and image inpainting |
Automatic Pose Correction for Local Feature-Based Face | authentication | |
Bayesian adaptation for user-dependent multimodal biometric | authentication | |
Bayesian Structural Content Abstraction for Region-Level Image | authentication | |
BCPPA: A Blockchain-Based Conditional Privacy-Preserving | authentication | Protocol for Vehicular Ad Hoc Networks |
Bi-level image watermarking for image | authentication | surviving JPEG lossy compression |
Bi-modal | authentication | in mobile environments using session variability modelling |
Bi-modal biometric | authentication | on mobile phones in challenging conditions |
Binary Image | authentication | using Zernike Moments |
Binary Image | authentication | With Tampering Localization by Embedding Cryptographic Signature and Block Identifier |
Biohashing: Two factor | authentication | featuring fingerprint data and tokenised random number |
BIOMET: A Multimodal Person | authentication | Database Including Face, Voice, Fingerprint, Hand and Signature Modalities |
Biometric | authentication | |
Biometric | authentication | based on 2D/3D sensing of forensic handwriting traces |
Biometric | authentication | Based on Infrared Thermal Hand Vein Patterns |
Biometric | authentication | based on PCG and ECG signals: present status and future directions |
Biometric | authentication | Based on Pupillary Light Reflex Using Neural Networks |
Biometric | authentication | System Using Reduced Joint Feature Vector of Iris and Face |
Biometric | authentication | system using retinal vessel pattern and geometric hashing |
Biometric | authentication | using augmented face and random projection |
Biometric | authentication | using Finger-Back Surface |
Biometric | authentication | Using Finger-Vein Patterns with Deep-Learning and Discriminant Correlation Analysis |
Biometric | authentication | : System Security and User Privacy |
Biometric data hiding: A 3 factor | authentication | approach to verify identity with a single image using steganography, encryption and matching |
Biometric Face | authentication | Using Pixel-Based Weak Classifiers |
Biometric Person | authentication | Method Using Camera-Based Online Signature Acquisition |
Biometric Personal | authentication | Based on Handwritten Signals |
Biometric Security Application for Person | authentication | Using Retinal Vessel Feature |
Biometric User | authentication | for Heightened Information Security |
Biometric User | authentication | on Smart Cards by Means of Handwritten Signatures |
Biometric-Enabled | authentication | Machines: A Survey of Open-Set Real-World Applications |
Biometrics Person | authentication | Using Projection-Based Face Recognition System in Verification Scenario |
BioTAM: a technology acceptance model for biometric | authentication | systems |
Blind Dual Watermarking for Color Images: | authentication | and Copyright Protection |
Blind Reversible | authentication | Based on PEE and CS Reconstruction |
Block Pyramid Based Adaptive Quantization Watermarking for Multimodal Biometric | authentication | |
Block-wise | authentication | and Recovery Scheme for Medical Images Focusing on Content Complexity |
Blockchain-Based | authentication | Scheme and Secure Architecture for IoT-Enabled Maritime Transportation Systems, A |
Blockchain-based Iris | authentication | in Order to Secure Iot Access and Digital Money Spending |
Blockchain-Based Privacy-Preserving | authentication | Model Intelligent Transportation Systems |
BMIAE: blockchain-based multi-instance Iris | authentication | using additive ElGamal homomorphic encryption |
CALIPER: Continuous | authentication | Layered with Integrated PKI Encoding Recognition |
Cancelable face verification using optical encryption and | authentication | |
Capabilities of Biometrics for | authentication | in Wireless Devices |
Capacity and Examples of Template-Protecting Biometric | authentication | Systems |
Cascading Trilinear Tensors for Face | authentication | |
CDVSec: Privacy-preserving biometrical user | authentication | in the cloud with CDVS descriptors |
Cell Phones Personal | authentication | Systems Using Multimodal Biometrics |
Challenges and Opportunities of Biometric User | authentication | in the Age of IoT: A Survey |
Chaotic Map-Based | authentication | Scheme Using Physical Unclonable Function for Internet of Autonomous Vehicle |
Chaotic Watermarking for Video | authentication | in Surveillance Applications |
Cheating in (halftone-secret) visual cryptography: Analysis of blind | authentication | schemes |
class of | authentication | digital watermarks for secure multimedia communication, A |
CNN-based anti-spoofing two-tier multi-factor | authentication | system |
Collusive Attacks to Partition | authentication | Visual Cryptography Scheme |
Color Image | authentication | Method Using Partitioned Palette and Morphological Operations, A |
Combined Handwriting and Speech Modalities for User | authentication | |
Combining Fingerprint, Palmprint and Hand-Shape for User | authentication | |
Combining Hardwaremetry and Biometry for Human | authentication | via Smartphones |
Combining Left and Right Irises for Personal | authentication | |
comment on Sharing secrets in stego images with | authentication | , A |
Comments on Dual | authentication | and Key Management Techniques for Secure Data Transmission in Vehicular Ad Hoc Networks |
Common Method of Share | authentication | in Image Secret Sharing, A |
Comparative analysis of feature extraction and fusion for blind | authentication | of digital images using chroma channels |
comparative approach between cepstral features for human | authentication | using heart sounds, A |
Comparison and combination of iris matchers for reliable personal | authentication | |
Comparison of a Touch-Gesture- and a Keystroke-Based Password Method: Toward Shoulder-Surfing Resistant Mobile User | authentication | , A |
Comparison of different entropies as features for person | authentication | based on EEG signals |
Compensated Signature Embedding Based Multimedia Content | authentication | System |
Comprehensive Survey on | authentication | and Attack Detection Schemes That Threaten It in Vehicular Ad-Hoc Networks, A |
Compression tolerant image | authentication | |
Compressive Sensing-Based Image Encryption and | authentication | in Edge-Clouds |
Concealing Fingerprint-Biometric Data into Audio Signals for Identify | authentication | |
Confidence Based Gating of Multiple Face | authentication | Experts |
Constructing SVM Multiple Tree for Face Membership | authentication | |
Content | authentication | and Tamper Detection in Digital Video |
Content | authentication | for Neural Imaging Pipelines: End-To-End Optimization of Photo Provenance in Complex Distribution Channels |
Content | authentication | of halftone video via flickering as sparse signal |
Content based image | authentication | using HOG feature descriptor |
Content-based | authentication | algorithm for binary images |
Content-based watermarking scheme for image | authentication | |
Context-Aware Active | authentication | Using Smartphone Accelerometer Measurements |
Continuous 3D Face | authentication | Using RGB-D Cameras |
Continuous | authentication | in a real world settings |
Continuous | authentication | With Touch Behavioral Biometrics and Voice on Wearable Glasses |
Continuous Real-Time Vehicle Driver | authentication | Using Convolutional Neural Network Based Face Recognition |
Continuous User | authentication | on Mobile Devices: Recent progress and remaining challenges |
Corrupted Face Image | authentication | Based on Noise Model |
Crc-Ntmac for Image Tamper Proofing and | authentication | , The |
Cross-layer optimized | authentication | and error control for wireless 3D medical video streaming over LTE |
Crypto Signature Scheme For Image | authentication | Over Wireless Channel, A |
Current Developments and Future Trends in Audio | authentication | |
Customizing biometric | authentication | systems via discriminative score calibration |
CVAR: Distributed and Extensible Cross-Region Vehicle | authentication | With Reputation for VANETs |
Database, protocols and tools for evaluating score-level fusion algorithms in biometric | authentication | |
Decision Fusion for Face | authentication | |
Deep features fusion for user | authentication | based on human activity |
Delegating | authentication | to Edge: A Decentralized Authentication Architecture for Vehicular Networks |
Delegating | authentication | to Edge: A Decentralized Authentication Architecture for Vehicular Networks |
Demosaicking recognition with applications in digital photo | authentication | based on a quadratic pixel correlation model |
DePass: A secure hash-based | authentication | scheme |
Design a new visual cryptography for human-verifiable | authentication | in accessing a database |
Design of Blockchain and ECC-Based Robust and Efficient Batch | authentication | Protocol for Vehicular Ad-Hoc Networks |
Design of Provably Secure | authentication | Protocol for Edge-Centric Maritime Transportation System |
Developing a contactless palmprint | authentication | system by introducing a novel ROI extraction method |
Differential Feature Analysis for Palmprint | authentication | |
Digital fragile watermarking scheme for | authentication | of JPEG images |
Digital images | authentication | scheme based on bimodal biometric watermarking in an independent domain |
Digital Watermarking for Image | authentication | with Localization |
Digital watermarking for telltale tamper proofing and | authentication | |
Discriminative and generative vocabulary tree: With application to vein image | authentication | and recognition |
Discriminative multimodal biometric | authentication | based on quality measures |
discriminative parametric approach to video-based score-level fusion for biometric | authentication | , A |
Discriminative training of spiking neural networks organised in columns for stream-based biometric | authentication | |
Distance Measures for Gabor Jets-Based Face | authentication | : A Comparative Evaluation |
Distortion metrics for predicting | authentication | functionality of printed security deterrents |
Distributed Aggregate Privacy-Preserving | authentication | in VANETs |
Do We Need Depth in State-Of-The-Art Face | authentication | ? |
Document | authentication | Using Printing Technique Features and Unsupervised Anomaly Detection |
Document Identity, | authentication | and Ownership: The Future of Biometric Verification |
Double-random-phase encryption with photon counting for image | authentication | using only the amplitude of the encrypted image |
DPCC and QR factorization-based color medical image | authentication | algorithm |
Dual | authentication | and Key Management Techniques for Secure Data Transmission in Vehicular Ad Hoc Networks |
Dual Domain Watermarking for | authentication | and Compression of Cultural Heritage Images |
Dual-Factor | authentication | System Featuring Speaker Verification and Token Technology, A |
Dynamic Pore Filtering for Keypoint Detection Applied to Newborn | authentication | |
Dynamic User | authentication | Based on Mouse Movements Curves |
E-Key: An EEG-Based Biometric | authentication | and Driving Fatigue Detection System |
EAAP: Efficient Anonymous | authentication | With Conditional Privacy-Preserving Scheme for Vehicular Ad Hoc Networks |
ECG | authentication | System Design Based on Signal Analysis in Mobile and Wearable Devices |
ECG based biometric | authentication | -a novel data modelling approach |
Editorial for the special issue on implicit biometric | authentication | and monitoring through Internet of Biometric Things (I-BIO) |
EEG-based biometric | authentication | modelling using incremental fuzzy-rough nearest neighbour technique |
effective voiceprint based identity | authentication | system for Mandarin smartphone users, An |
Efficient and Anonymous | authentication | With Succinct Multi-Subscription Credential in SAGVN |
Efficient Anonymous Batch | authentication | Scheme Based on HMAC for VANETs, An |
Efficient Anonymous Batch | authentication | Scheme With Conditional Privacy in the Internet of Vehicles (IoV) Applications |
Efficient Conditional Privacy-Preserving | authentication | Scheme for Vehicular Sensor Networks Without Pairings, An |
Efficient Group Handover | authentication | for Secure 5G-Based Communications in Platoons |
efficient image | authentication | method based on Hamming code, An |
Efficient Message- | authentication | Scheme Based on Edge Computing for Vehicular Ad Hoc Networks, An |
Efficient multimodal ocular biometric system for person | authentication | based on iris texture and corneal shape |
Efficient person | authentication | based on multi-level fusion of ear scores |
Efficient Privacy-Preserving Dual | authentication | and Key Agreement Scheme for Secure V2V Communications in an IoV Paradigm |
efficient reversible | authentication | scheme for demosaiced images with improved detectability, An |
efficient reversible image | authentication | method using improved PVO and LSB substitution techniques, An |
Efficient Vehicle-Assisted Aggregate | authentication | Scheme for Infrastructure-Less Vehicular Networks, An |
Electrocardiogram | authentication | method robust to dynamic morphological conditions |
Electromyograph and keystroke dynamics for spoof-resistant biometric | authentication | |
Embedded Fingerprint | authentication | System Integrated with a Hardware-Based Truly Random Number Generator, An |
Encryption, Visual Cryptography, | authentication | |
Enhancing biometric security with wavelet quantization watermarking based two-stage multimodal | authentication | |
Environment | authentication | Through 3D Structural Analysis |
Error Resilient Image | authentication | Using Feature Statistical and Spatial Properties |
Estimating Sample Size Requirements for Reliable Personal | authentication | Using User-Specific Samples |
Evaluation of combined visible/NIR camera for iris | authentication | on smartphones |
Evaluation Techniques for Biometrics-based | authentication | Systems (FRR) |
Even big data is not enough: need for a novel reference modelling for forensic document | authentication | |
Event-based unobtrusive | authentication | using multi-view image sequences |
Evolution of Document | authentication | , The |
expert vision system for analysis of Hebrew characters and | authentication | of manuscripts, An |
Exploitation of 3D images for face | authentication | under pose and illumination variations |
Exploiting JPEG2000 and Jpip for Image Based | authentication | |
Exploration of an adaptive NoC architecture on FPGA dedicated to multi and hysperspectral algorithm for art | authentication | |
Exploring orientation and accelerometer sensor data for personal | authentication | in smartphones using touchscreen gestures |
Exploring touch-based behavioral | authentication | on smartphone email applications in IoT-enabled smart cities |
Extreme Value Analysis for Mobile Active User | authentication | |
Eye Blink Based Detection of Liveness in Biometric | authentication | Systems Using Conditional Random Fields |
Eye movement analysis for human | authentication | : a critical survey |
EyePAD++: A Distillation-based approach for joint Eye | authentication | and Presentation Attack Detection using Periocular Images |
Face and Eye Detection for Person | authentication | in Mobile Phones |
Face | authentication | Based on Morphological Grid Matching |
Face | authentication | Based on Multiple Profiles Extracted from Range Data |
Face | authentication | by Retinotopic Sampling of the Gabor Decomposition and Support Vector Machines |
Face | authentication | Competition on the BANCA Database |
Face | authentication | for Banking |
Face | authentication | for multiple subjects using eigenflow |
Face | authentication | from Cell Phone Camera Images with Illumination and Temporal Variations |
Face | authentication | From Grayscale Coded Light Field |
Face | authentication | test on the BANCA database |
Face | authentication | Using Adapted Local Binary Pattern Histograms |
Face | authentication | using graph-based low-rank representation of facial local structures for mobile vision applications |
Face | authentication | Using One-Class Support Vector Machines |
Face | authentication | using speed fractal technique |
Face | authentication | using the trace transform |
Face | authentication | with Gabor Information on Deformable Graphs |
Face | authentication | With Makeup Changes |
Face | authentication | with Salient Local Features and Static Bayesian Network |
Face | authentication | with undercontrolled pose and illumination |
Face Localization and | authentication | Using Color and Depth Images |
Face recognition for | authentication | on mobile devices |
Face Verification Systems, Face | authentication | |
Face Verification, | authentication | , Evaluations, Verification Benchmarks |
Face-Voice | authentication | Based on 3D Face Models |
Facial attributes for active | authentication | on mobile devices |
False Rejection Oriented Threat Model for the Design of Biometric | authentication | Systems, A |
fast and memory efficient approach for fingerprint | authentication | system, A |
Fast features for face | authentication | under illumination direction changes |
Feature Extraction For Visual Speaker | authentication | Against Computer-Generated Video Attacks |
Feature-Based Digital Image Watermarking for Copyright Protection and Content | authentication | , A |
Feature-Level Fusion for Effective Palmprint | authentication | |
Feature-Level Fusion of Finger Veins and Finger Dorsal Texture for Personal | authentication | Based on Orientation Selection |
Feature-Watermarking Scheme for JPEG Image | authentication | , A |
FewFaceNet: A Lightweight Few-Shot Learning-based Incremental Face | authentication | for Edge Cameras |
Finger Vein Recognition Model for Biometric | authentication | Using Intelligent Deep Learning |
Finger-drawn pin | authentication | on touch devices |
Finger-vein | authentication | based on deformation-tolerant feature-point matching |
Finger-Vein | authentication | Based on Wide Line Detector and Pattern Normalization |
Fingerprint | authentication | Based on Matching Scores with Other Data |
Fingerprint | authentication | Device Based on Optical Characteristics Inside a Finger |
Fingerprint | authentication | System Based on Mobile Phone, A |
Fingerprint Quality Indices for Predicting | authentication | Performance |
Fingerprint-based User-friendly Interface and Pocket-PID for Mobile | authentication | |
Fingerprint-PKI | authentication | using Zernike moments |
First Approach to Contact-Based Biometrics for User | authentication | , A |
Fractal Based Image Watermarking for | authentication | and Verification, A |
Fragile and blind watermarking technique based on Weber's law for medical image | authentication | |
Fragile and semi-fragile image | authentication | based on image self-similarity |
Fragile watermark based on the Gaussian mixture model in the wavelet domain for image | authentication | |
Fragile Watermarking Scheme Based CRC Checksum and Public Key Cryptosystem for RGB Color Image | authentication | , A |
Fragile Watermarking Scheme for Image | authentication | Using Wavelet Transform, A |
Free-text keystroke dynamics | authentication | for Arabic language |
Freely typed keystroke dynamics-based user | authentication | for mobile devices based on heterogeneous features |
Frontal Face | authentication | Through Creaseness-Driven Gabor Jets |
Frontal Face | authentication | Using Morphological Elastic Graph Matching |
Frontal face | authentication | using variants of dynamic link matching based on mathematical morphology |
Fundamentals Of Biometric | authentication | Technologies |
Furthering fingerprint-based | authentication | : Introducing the true-neighbor template |
Fusion of Audio and Video Information for Multi Modal Person | authentication | |
Fusion of Auxiliary Information for Multi-modal Biometrics | authentication | |
Fusion of color spaces for ear | authentication | |
Fusion of electrocardiogram with unobtrusive biometrics: An efficient individual | authentication | system |
Fusion of iris and palmprint for multimodal biometric | authentication | |
Fusion of Person | authentication | Probabilities by Bayesian Statistics |
Fusion of Phase And Orientation Information for Palmprint | authentication | |
Fusion of submanifold and local texture features for palmprint | authentication | |
Fusion of visible and synthesised near infrared information for face | authentication | |
Fuzzy Extractors for Minutiae-Based Fingerprint | authentication | |
Fuzzy rule based approach for face and facial feature extraction in biometric | authentication | |
GA SVM Wrapper Ensemble for Keystroke Dynamics | authentication | |
Gait | authentication | using distributed source coding |
Gait based | authentication | using gait information image features |
Generalized Butterfly Graph and Its Application to Video Stream | authentication | |
Generating Fixed-Length Representation From Minutiae Using Kernel Methods for Fingerprint | authentication | |
Genetic algorithm attack on minutiae-based fingerprint | authentication | and protected template fingerprint systems |
GPS Signal | authentication | From Cooperative Peers |
Graph application on face for personal | authentication | and recognition |
Graphical Password-Based User | authentication | With Free-Form Doodles |
Group-Based Multicast Service | authentication | and Data Transmission Scheme for 5G-V2X, A |
Guest Editorial: BIOSIG 2020 special issue on trustworthiness of person | authentication | |
Hand Gesture | authentication | by Discovering Fine-Grained Spatiotemporal Identity Characteristics |
Hand vein | authentication | using biometric graph matching |
hand-based personal | authentication | using a coarse-to-fine strategy, A |
Handwriting | authentication | by envelopes of sound signatures |
Hardware Architecture for Video | authentication | Using Sensor Pattern Noise |
Hardware Implementation of a Digital Watermarking System for Video | authentication | |
Hardware Implementation of Fingerprint Verification for Secure Biometric | authentication | Systems, A |
Hash function for 3D mesh model | authentication | |
HDMA: Hybrid D2D Message | authentication | Scheme for 5G-Enabled VANETs |
Heartbeat biometrics for human | authentication | |
HEVC video | authentication | using data embedding technique |
Hierarchical Image | authentication | Watermark with Improved Localization and Security, A |
Hierarchical multiple image watermarking for image | authentication | and ownership verification |
Hierarchical watermarking for secure image | authentication | with localization |
High Capacity Data Hiding for Binary Image | authentication | |
High-Capacity Invisible Background Encoding for Digital | authentication | of Hardcopy Documents |
High-Resolution Remote Sensing Image Integrity | authentication | Method Considering Both Global and Local Features |
HSS-based robust and lightweight multiple group | authentication | for ITS towards 5G, An |
Hybrid Biometric Person | authentication | Using Face and Voice Features |
hybrid novelty score and its use in keystroke dynamics-based user | authentication | , A |
Hybrid Watermarking Scheme for Video | authentication | , A |
I-Am: Implicitly Authenticate Me: Person | authentication | on Mobile Devices Through Ear Shape and Arm Gesture |
Identity | authentication | Based on Dynamic Touch Behavior on Smartphone |
Identity | authentication | based on keystroke dynamics for mobile device users |
Identity | authentication | Scheme for the Distributed Centers System |
Identity | authentication | using improved online signature verification method |
Identity- | authentication | System Using Fingerprints, An |
Identity-Based | authentication | Mechanism for Secure Information Sharing in the Maritime Transport System |
ill-posed operator for secure image | authentication | , An |
Illumination Normalization for Sift Based Finger Vein | authentication | |
Illumination Normalization Using Logarithm Transforms for Face | authentication | |
Image alignment based perceptual image hash for content | authentication | |
Image | authentication | algorithm with recovery capabilities based on neural networks in the DCT domain |
Image | authentication | and Integrity Verification Via Content-based Watermarks and a Public Key Cryptosystem |
Image | authentication | and tamper detection using two complementary watermarks |
Image | authentication | and Tamperproofing for Noisy Channels |
Image | authentication | Based on Distributed Source Coding |
Image | authentication | Based on Faber Schauder DWT |
Image | authentication | by detecting traces of demosaicing |
image | authentication | method by applying Hamming code on rearranged bits, An |
Image | authentication | Scheme Based on Self-embedding Watermarking |
Image | authentication | Scheme for Accurate Localization and Restoration, An |
Image | authentication | techniques for surveillance applications |
Image | authentication | using a vector beam with sparse phase information |
Image | authentication | Using Block Truncation Coding in Lifting Wavelet Domain |
Image | authentication | Using Distributed Source Coding |
Image | authentication | using generalised finite automata |
Image based document | authentication | using DCT |
Image Databases: A Case Study in Norwegian Silver | authentication | |
Image Integrity | authentication | Scheme Based on Fixed Point Theory |
Image model and printed document | authentication | : A theoretical analysis |
Image quality-augmented intramodal palmprint | authentication | |
Image-Based Multimodal Face | authentication | |
Implementation of TiOISSS with meaningful shadows and with an additional | authentication | image |
Improved | authentication | Accuracy by Individually Set Orders of the Fractional Fourier Transform and Effects of Damage of Fingerprint Image on Authentication Accuracy |
Improved | authentication | Accuracy by Individually Set Orders of the Fractional Fourier Transform and Effects of Damage of Fingerprint Image on Authentication Accuracy |
improved BioHashing for human | authentication | , An |
Improving Fusion with Margin-Derived Confidence in Biometric | authentication | Tasks |
Improving the Binding of Electronic Signatures to the Signer by Biometric | authentication | |
Improving the Security of LTE-R for High-Speed Railway: From the Access | authentication | View |
Including Biometric | authentication | in a Smart Card Operating System |
Incorporating Cohort Information for Reliable Palmprint | authentication | |
Incorporating color information for reliable palmprint | authentication | |
integrated visual saliency-based watermarking approach for synchronous image | authentication | and copyright protection, An |
Integration of 2D and 3D images for enhanced face | authentication | |
Integration of Device Fingerprint | authentication | and Physical-Layer Secret Key Generation |
Intelligent Terminal Based Privacy-Preserving Multi-Modal Implicit | authentication | Protocol for Internet of Connected Vehicles, An |
Introduction to the special issue on | authentication | , copyright protection, and information hiding |
Inverse biometrics: A case study in hand geometry | authentication | |
Inversion attack resilient zero-watermarking scheme for medical image | authentication | |
Invertible secret image sharing with steganography and | authentication | for AMBTC compressed images |
Invertible Watermarking Algorithm with Detecting Locations of Malicious Manipulation for Biometric Image | authentication | |
Invisible Semi-Fragile Watermarking and Steganography of Digital Videos for Content | authentication | and Data Hiding |
Iris and Signature | authentication | Using Continuous Dynamic Programming |
Iris | authentication | apparatus |
Iris | authentication | Using Privatized Advanced Correlation Filter |
Iris-Based Personal | authentication | Using a Normalized Directional Energy Feature |
ISURE: User | authentication | in mobile devices using ocular biometrics in visible spectrum |
Iterative compensation schemes for multimedia content | authentication | |
Java-based internet biometric | authentication | system |
Joint near-lossless compression and watermarking of still images for | authentication | and tamper localization |
Joint wavelet compression and | authentication | watermarking |
K out of N Secret Sharing Scheme for Multiple Color Images with Steganography and | authentication | |
Kernel Deep Regression Network for Touch-Stroke Dynamics | authentication | |
Key binding biometrics-based remote user | authentication | scheme using smart cards |
Keystroke dynamics for user | authentication | |
Keystroke Mobile | authentication | : Performance of Long-Term Approaches and Fusion with Behavioral Profiling |
Large-Scale Evaluation of Multimodal Biometric | authentication | Using State-of-the-Art Systems |
largest inertial sensor-based gait database and performance evaluation of gait-based personal | authentication | , The |
LBP-based biometric hashing scheme for human | authentication | |
Learning based video | authentication | using statistical local information |
Learning to Hash for Personalized Image | authentication | |
Leveraging shape and depth in user | authentication | from in-air hand gestures |
Lightweight | authentication | for MP4 Format Container Using Subtitle Track |
Lightweight | authentication | Scheme for 6G-IoT Enabled Maritime Transport System, A |
Likelihood normalization for face | authentication | in variable recording conditions |
Local Binary Patterns as an Image Preprocessing for Face | authentication | |
Local Feature Integration Method Using Phase Congruency for Palm Print | authentication | |
Localization and Security Enhancement of Block-based Image | authentication | |
Lossless | authentication | of mpeg-2 video |
Lossless Watermarking for Image | authentication | : A New Framework and an Implementation |
Machine | authentication | of Security Documents |
Machine-assisted | authentication | of paper currency: An experiment on Indian banknotes |
MasterPrint: Exploring the Vulnerability of Partial Fingerprint-based | authentication | Systems |
Mean Quantization Blind Watermarking for Image | authentication | |
Membership | authentication | in dynamic face groups |
Membership | authentication | in the dynamic group by face classification using SVM ensemble |
Method for Estimating | authentication | Performance over Time, with Applications to Face Biometrics, A |
Mini-batch bagging and attribute ranking for accurate user | authentication | in keystroke dynamics |
Minutiae-based template synthesis and matching for fingerprint | authentication | |
Mobile behavioral biometrics for passive | authentication | |
Morphological elastic graph matching applied to frontal face | authentication | under well-controlled and real conditions |
Motion Features from Lip Movement for Person | authentication | |
Multi scale multi descriptor local binary features and exponential discriminant analysis for robust face | authentication | |
Multi-attack Reference Hashing Generation for Image | authentication | |
multi-biometric system for continuous student | authentication | in e-learning platforms, A |
Multi-Factor | authentication | on Cloud |
Multi-feature Based Invertible | authentication | Watermarking for JPEG Images, A |
Multi-layer | authentication | scheme for HEVC video based on embedded statistics |
multi-matcher for ear | authentication | , A |
Multi-Modal Data Fusion for Person | authentication | Using SVM |
Multi-Modal Human | authentication | Using Silhouettes, Gait and RGB |
Multi-patches Iris Based Person | authentication | System Using Particle Swarm Optimization And Fuzzy C-means Clustering |
Multibiometrics for Identity | authentication | : Issues, Benefits and Challenges |
Multimedia content | authentication | : fundamental limits |
Multimedia Data Hiding and | authentication | via Halftoning and Coordinate Projection |
Multimedia Quality-Driven Network Resource Management Architecture for Wireless Sensor Networks With Stream | authentication | , A |
Multimodal | authentication | on smartphones: Combining iris and sensor recognition for a double check of user identity |
Multimodal | authentication | Using Asynchronous HMMs |
Multimodal biometric | authentication | based on iris pattern and pupil light reflex |
Multimodal biometric | authentication | using quality signals in mobile communications |
Multimodal biometric | authentication | using speech and hand geometry fusion |
Multimodal Biometric Person | authentication | Using Face, Ear and Periocular Region Based on Convolution Neural Networks |
Multimodal Biometric-Based | authentication | with Secured Templates |
Multimodal Decision-Level Fusion for Person | authentication | |
Multimodal person | authentication | using speech, face and visual speech |
Multipurpose watermarking for image | authentication | and protection |
Multiresolution fragile watermarking using complex chirp signals for content | authentication | |
NavCom Signal | authentication | Scheme Based on Twice Two-Way Satellite Time Transfer, A |
New Approach for Biometric Template Storage and Remote | authentication | , A |
New Approach to Signature-Based | authentication | , A |
New Audio Watermarking for Copyright Protection and Content | authentication | , A |
new | authentication | based cheating prevention scheme in Naor-Shamir’s visual cryptography, A |
New Card | authentication | Scheme Based on Image Watermarking and Encryption, A |
New Experiments on ICP-Based 3D Face Recognition and | authentication | |
New Features for | authentication | by On-Line Handwritten Signatures |
New Fragile | authentication | Watermark for Images |
new multi-level approach to EEG based human | authentication | using eye blinking, A |
New Multi-Unit Iris | authentication | Based on Quality Assessment and Score Level Fusion for Mobile Phones, A |
New Public-Key | authentication | Watermarking for Binary Document Images Resistant to Parity Attacks, A |
new scheme of sharing secrets in stego images with | authentication | , A |
New Self-Recovery Technique for Image | authentication | , A |
New Semi-Fragile Watermarking Scheme for | authentication | and Tamper Localization in Remote Sensing Images, A |
New Study On Wood Fibers Textures: Documents | authentication | Through LBP Fingerprint, A |
New Watermarking Method for Video | authentication | with Tamper Localization, A |
Non-conventional keystroke dynamics for user | authentication | |
Non-redundant frame identification and keyframe selection in DWT-PCA domain for | authentication | of video |
novel approach for secured multimodal biometric | authentication | based on data fusion technique, A |
novel approach for securing data against adversary attacks in UAV embedded HetNet using identity based | authentication | scheme, A |
novel approach to adaptive image | authentication | , A |
novel approach to design of user re- | authentication | systems, A |
Novel Fast Self-restoration Semi-fragile Watermarking Algorithm for Image Content | authentication | Resistant to JPEG Compression, A |
Novel framework for multimodal biometric image | authentication | using visual share neural network |
Novel Hybrid Crypto-Biometric | authentication | Scheme for ATM Based Banking Applications, A |
Novel Hybrid Image | authentication | Scheme for AMBTC-Compressed Images, A |
Novel Line Pattern Algorithm for Embedded Fingerprint | authentication | System, A |
Novel MAC-Based | authentication | Scheme (NoMAS) for Internet of Vehicles (IoV), A |
novel public key self-embedding fragile watermarking technique for image | authentication | , A |
Novel Watermarking Algorithm for Image | authentication | : Robustness Against Common Attacks and JPEG2000 Compression, A |
novel watermarking scheme for H.264/AVC video | authentication | , A |
Obtaining cryptographic keys using feature level fusion of iris and face biometrics for secure user | authentication | |
On combining classifiers for speaker | authentication | |
On Combining Textural and Geometrical Scores for Discriminative Face | authentication | |
On Continuous User | authentication | via Typing Behavior |
On modeling variations for face | authentication | |
On Person | authentication | by Fusing Visual and Thermal Face Biometrics |
On the design of biometric-based user | authentication | protocol in smart city environment |
On the discriminability of keystroke feature vectors used in fixed text keystroke | authentication | |
On the security of the digest function in the SARI image | authentication | system |
On the security of the SARI image | authentication | system |
On the transferability of adversarial perturbation attacks against fingerprint based | authentication | systems |
On the Use of Log-Likelihood Ratio Based Model-Specific Score Normalisation in Biometric | authentication | |
On the Use of SIFT Features for Face | authentication | |
On using error bounds to optimize cost-sensitive multimodal biometric | authentication | |
On-line signature | authentication | using Zernike moments |
One-Class Classification Method for Human Gait | authentication | Using Micro-Doppler Signatures, A |
One-class Random Maxout Probabilistic Network for Mobile Touchstroke | authentication | |
One-factor Cancellable Biometrics based on Indexing-First-Order Hashing for Fingerprint | authentication | |
One-Pass Incremental Membership | authentication | by Face Classification |
One-shot lip-based biometric | authentication | : Extending behavioral features with authentication phrase information |
One-shot lip-based biometric | authentication | : Extending behavioral features with authentication phrase information |
One-shot Representational Learning for Joint Biometric and Device | authentication | |
Online biometric | authentication | using facial thermograms |
Online finger-knuckle-print verification for personal | authentication | |
Optimized Content-Aware | authentication | Scheme for Streaming JPEG-2000 Images Over Lossy Networks, An |
Orientation Field Estimation for Embedded Fingerprint | authentication | System |
Orientation-Compensative Signal Registration for Owner | authentication | Using an Accelerometer |
PACP: An Efficient Pseudonymous | authentication | -Based Conditional Privacy Protocol for VANETs |
Palm line extraction and matching for personal | authentication | |
palm print | authentication | system using quantized phase feature representation, A |
Palm Vein Extraction and Matching for Personal | authentication | |
Palmprint and Finger Knuckle Based Person | authentication | with Random Forest via Kernel-2DPCA |
Palmprint | authentication | |
Palmprint | authentication | Based on Orientation Code Matching |
Palmprint | authentication | System for Civil Applications |
Palmprint | authentication | using a symbolic representation of images |
Palmprint | authentication | Using Time Series |
Palmprint texture analysis based on low-resolution images for personal | authentication | |
Partial face detection for continuous | authentication | |
Password hardened fuzzy vault for fingerprint | authentication | system |
Password policy characteristics and keystroke biometric | authentication | |
Pattern-Based Data Hiding for Binary Image | authentication | by Connectivity-Preserving |
Perceptual analysis of handwritten signatures for biometric | authentication | |
Perceptual | authentication | Hashing for Digital Images With Contrastive Unsupervised Learning |
Perceptual hashing for image | authentication | : A survey |
Perceptual Image Hashing for Content | authentication | Based on Convolutional Neural Network With Multiple Constraints |
Perceptual Video Hashing for Content Identification and | authentication | |
Perfomance analysis of the Fridrich-Goljan self-embedding | authentication | method |
Performance evaluation of continuous | authentication | systems |
Performance Generalization in Biometric | authentication | Using Joint User-Specific and Sample Bootstraps |
Periocular | authentication | based on FEM using Laplace-Beltrami eigenvalues |
Person | authentication | from neural activity of face-specific visual self-representation |
Person | authentication | from Video of Faces: A Behavioral and Physiological Approach Using Pseudo Hierarchical Hidden Markov Models |
Person | authentication | System Based on RFID Tags and a Cascade of Face Recognition Algorithms, A |
Person | authentication | using ASM based lip shape and intensity information |
Person | authentication | Using Brainwaves (EEG) and Maximum A Posteriori Model Adaptation |
Person | authentication | Using Head Images |
Person Localization and Soft | authentication | Using an Infrared Ceiling Sensor Network |
Personal | authentication | and risk evaluation by sensible keyboard sound |
Personal | authentication | Based on 3D Configuration of Micro-feature Points on Facial Surface |
Personal | authentication | using feature points on finger and palmar creases |
Personal | authentication | using hand images |
Personal | authentication | Using Hand Vein Triangulation and Knuckle Shape |
Personal | authentication | using multiple palmprint representation |
Personal | authentication | using palm-print features |
Personalized Face | authentication | Based on Few-Shot Meta-Learning |
Photo-Image | authentication | by Pattern Recognition and Cryptography |
PLVA: Privacy-Preserving and Lightweight V2I | authentication | Protocol |
PNU Spoofing: a menace for biometrics | authentication | systems? |
Polynomial features for robust face | authentication | |
Portable | authentication | device and method using iris patterns |
Pose Correction and Subject-Specific Features for Face | authentication | |
Practical Biometric | authentication | with Template Protection |
practical design of digital video watermarking in H.264/AVC for content | authentication | , A |
Practical Systems for Personal Fingerprint | authentication | |
Predicting Biometric | authentication | System Performance Across Different Application Conditions: A Bootstrap Enhanced Parametric Approach |
Privacy and | authentication | Scheme for IoT Environments Using ECC and Fuzzy Extractor, A |
Privacy preserving biometric-based remote | authentication | with secure processing unit on untrusted server |
Privacy Preserving Facial and Fingerprint Multi-biometric | authentication | |
PRIVV: Private remote iris- | authentication | with Vaulted Verification |
Projected texture for hand geometry based | authentication | |
Prolog to an Identity- | authentication | System Using Fingerprints |
Protection motivation theory using multi-factor | authentication | for providing security over social networking sites |
Provably Secure and Anonymous V2I and V2V | authentication | Protocol for VANETs |
Provably Secure Mobile User | authentication | Scheme for Big Data Collection in IoT-Enabled Maritime Intelligent Transportation System, A |
Proxy-Based | authentication | and Billing Scheme With Incentive-Aware Multihop Forwarding for Vehicular Networks, A |
public key watermark for image verification and | authentication | , A |
Public Key Watermarking for Reversible Image | authentication | |
public-key | authentication | watermarking for binary images, A |
Quad Phase Minimum Average Correlation Energy Filters for Reduced Memory Illumination Tolerant Face | authentication | |
Quality-Based Score Normalization for Audiovisual Person | authentication | |
Quality-Optimized and Secure End-to-End | authentication | for Media Delivery |
Quantifying Gait Similarity: User | authentication | and Real-World Challenge |
quantitive semi-fragile jpeg2000 image | authentication | system, A |
Quantization-Based Fragile Watermarking Using Block-Wise | authentication | and Pixel-Wise Recovery Scheme for Tampered Image |
quantization-based semi-fragile watermarking scheme for image content | authentication | , A |
Quickest Intruder Detection For Multiple User Active | authentication | |
Radar-Based Non-Contact Continuous Identity | authentication | |
Radon/ridgelet signature for image | authentication | |
Random hand gesture | authentication | via efficient Temporal Segment Set Network |
Random subspace for an improved BioHashing for face | authentication | |
Rate-Distortion- | authentication | Optimized Streaming of Authenticated Video |
Rate-Distortion- | authentication | optimized streaming with Generalized Butterfly Graph authentication |
Rate-Distortion- | authentication | optimized streaming with Generalized Butterfly Graph authentication |
Re-quantization Based Semi-Fragile | authentication | for General Uniform Quantizer |
Real Time Lip Motion Analysis for a Person | authentication | System using Near Infrared Illumination |
Real-time adult | authentication | scheme for digital contents using X.509 certificate in ubiquitous Web environment |
real-time reversible image | authentication | method using uniform embedding strategy, A |
Region-Level Image | authentication | Using Bayesian Structural Content Abstraction |
Regularized Framework for Feature Selection in Face Detection and | authentication | , A |
Reliable Cooperative | authentication | for Vehicular Networks |
Remote | authentication | System Using Fingerprints, A |
Remote | authentication | Using Vaulted Fingerprint Verification |
Remote multimodal biometric | authentication | using bit priority-based fragile watermarking |
Reply to Comments on Dual | authentication | and Key Management Techniques for Secure Data Transmission in Vehicular Ad Hoc Networks |
Research and Design of CAS Protocol Identity | authentication | |
Retinal vision applied to facial features detection and face | authentication | |
Retraining a Novelty Detector with Impostor Patterns for Keystroke Dynamics-Based | authentication | |
Reversibility-oriented secret image sharing mechanism with steganography and | authentication | based on code division multiplexing |
Reversible watermarking technique to enhance security of a biometric | authentication | system |
Robust | authentication | scheme for protecting copyrights of images and graphics |
Robust | authentication | Using Dorsal Hand Vein Images |
Robust biometric | authentication | system with a secure user template |
robust content based digital signature for image | authentication | , A |
Robust Features for Frontal Face | authentication | in Difficult Image Conditions |
Robust Fingerprint | authentication | Using Local Structural Similarity |
Robust human | authentication | using appearance and holistic anthropometric features |
robust image | authentication | method distinguishing JPEG compression from malicious manipulation, A |
Robust image hash in Radon transform domain for | authentication | |
Robust Lossless Image Data Hiding Designed for Semi-Fragile Image | authentication | |
Robust multimodal 2D and 3D face | authentication | using local feature fusion |
Robust Revocable Anonymous | authentication | for Vehicle to Grid Communications |
Robust Video Facial | authentication | With Unsupervised Mode Disentanglement |
robust watermark | authentication | technique based on Weber's descriptor, A |
Robust watermarking scheme for tamper detection and | authentication | exploiting CA |
Role of Statistical Models in Biometric | authentication | , The |
SAPSC: SignRecrypting | authentication | protocol using shareable clouds in VANET groups |
Satellite Navigation Signal | authentication | in GNSS: A Survey on Technology Evolution, Status, and Perspective for BDS |
SAVE: Efficient Privacy-Preserving Location-Based Service Bundle | authentication | in Self-Organizing Vehicular Social Networks |
Scalable | authentication | for various representations of JPEG 2000 images |
Scalable watermark extraction for real-time | authentication | of JPEG 2000 images |
score calculation method using positional information of feature points for biometric | authentication | , A |
Score Selection Techniques for Fingerprint Multi-modal Biometric | authentication | |
Score-Level Fusion Benchmark Database for Biometric | authentication | , A |
Screen-based active user | authentication | |
Scribble-a-Secret: Similarity-based password | authentication | using sketches |
Secret and public key image watermarking schemes for image | authentication | and ownership verification |
Secret image sharing scheme with adaptive | authentication | strength |
Secret image sharing with separate shadow | authentication | ability |
Secret-Sharing-Based Method for | authentication | of Grayscale Document Images via the Use of the PNG Image With a Data Repair Capability, A |
Securable networked scheme with face | authentication | |
Secure and Efficient | authentication | Scheme for Access Control in Mobile Pay-TV Systems, A |
Secure and Localizing Watermarking Technique for Image | authentication | , A |
Secure and Robust | authentication | Scheme for Video Transcoding, A |
Secure and Robust Two-Phase Image | authentication | |
Secure | authentication | and Key Management Protocol for Deployment of Internet of Vehicles (IoV) Concerning Intelligent Transport Systems |
secure | authentication | watermarking for halftone and binary images, A |
Secure biometric template generation for multi-factor | authentication | |
Secure Biometrics: Concepts, | authentication | Architectures, and Challenges |
Secure Fingerprint | authentication | with Homomorphic Encryption |
Secure Fragile Digital Watermarking Technique for Image | authentication | |
secure high capacity full-gray-scale-level multi-image information hiding and secret image | authentication | scheme via Tchebichef moments, A |
secure image | authentication | algorithm with pixel-level tamper localization, A |
secure media streaming mechanism combining encryption, | authentication | , and transcoding, A |
Secure multicasting of images via joint privacy-preserving fingerprinting, decryption, and | authentication | |
Secure reversible visible image watermarking with | authentication | |
Secure Self-Recovery Image | authentication | Using Randomly-Sized Blocks |
Secure speech biometric templates for user | authentication | |
Secure transcoding with JPSEC confidentiality and | authentication | |
Secure transfer of medical images using hybrid encryption: | authentication | , confidentiality, integrity |
Securing Electronic Medical Records Using Biometric | authentication | |
Security and privacy enhanced smartphone-based gait | authentication | with random representation learning and digital lockers |
Security | authentication | with a three-dimensional optical phase code using random forest classifier |
Security Enhanced | authentication | Protocol for Space-Ground Integrated Railway Networks |
Security Enhancement for Real-Time Parallel In-Vehicle Applications by CAN FD Message | authentication | |
Security evaluation of biometric | authentication | systems under real spoofing attacks |
Security of an Ill-Posed Operator for Image | authentication | |
Security-Enhanced Certificateless Conditional Privacy-Preserving | authentication | Scheme for Vehicular Ad Hoc Networks, A |
Seeing-Is-Believing: Using Camera Phones for Human-Verifiable | authentication | |
Selecting 3d Curves On The Nasal Surface Using Adaboost for Person | authentication | |
Self Recovery | authentication | Of Images In The Dwt Domain |
SEMBA: secure multi-biometric | authentication | |
Semi-fragile image | authentication | using generic wavelet domain features and ecc |
Semi-fragile Image | authentication | Using Robust Image Hashing with Localization |
Semi-fragile watermarking for grayscale image | authentication | and tamper detection based on an adjusted expanded-bit multiscale quantization-based technique |
Semi-fragile Watermarking for Tamper Proofing and | authentication | of Still Images |
Session variability modelling for face | authentication | |
Shape Contexts and Gabor Features for Face Description and | authentication | |
Sharing secrets in stego images with | authentication | |
Shoulder-Surfing Resistant | authentication | Using Pass Pattern of Pattern Lock |
SIC DB: multi-modal database for person | authentication | |
Signal Structure-Based | authentication | for Civil GNSSs: Recent Solutions and Perspectives |
Signature | authentication | based on human intervention: Performance and complementarity with automatic systems |
Silhouettes versus skeletons in gesture-based | authentication | with Kinect |
Similarity Metrics Analysis for Feature Point Based Retinal | authentication | |
Similarity-based matching for face | authentication | |
single watermark based scheme for both protection and | authentication | of identities, A |
Single-Semantic Multi-Instance Fusion of Handwriting Based Biometric | authentication | Systems |
singular-value-based semi-fragile watermarking scheme for image content | authentication | with tamper localization, A |
Sketch-Based User | authentication | With a Novel String Edit Distance Model |
Small scale single pulse ECG-based | authentication | using GLRT that considers T wave shift and adaptive template update with prior information |
SmartCAMPP: Smartphone-based continuous | authentication | leveraging motion sensors with privacy preservation |
Smart_Auth: User Identity | authentication | Based on Smartphone Motion Sensors |
Soft-Biometrics: Unconstrained | authentication | in a Surveillance Environment |
Spatio-temporal representation for face | authentication | by using multi-task learning with human attributes |
Spatiotemporal analysis of human activities for biometric | authentication | |
Special Issue on Audio-Based and Video-Based Person | authentication | |
Spectral Subband Centroids as Complementary Features for Speaker | authentication | |
Speech | authentication | and Recovery Scheme in Encrypted Domain |
Speech | authentication | system using digital watermarking and pattern recovery |
Spoofing detection on adaptive | authentication | System-A survey |
Statistical independence of ECG for biometric | authentication | |
Statistical Model-Based Detector via Texture Weight Map: Application in Re-Sampling | authentication | |
Statistical Performance Evaluation of Biometric | authentication | Systems Using Random Effects Models |
Steganographic | authentication | Method for Electronic IDs |
Stream | authentication | Based on Generalized Butterfly Graph |
Study of Identical Twins' Palmprints for Personal | authentication | , A |
Study on Color Spaces for Single Image Enrolment Face | authentication | |
study on security evaluation methodology for image-based biometrics | authentication | systems, A |
Subject-Sensitive Perceptual Hash Based on MUM-Net for the Integrity | authentication | of High Resolution Remote Sensing Images, A |
Superpixel-Based Watermarking Scheme for Image | authentication | and Recovery |
Support Vector Machines for Face | authentication | |
Surveillance Video | authentication | Using Universal Image Quality Index of Temporal Average |
Survey of Watermarking Algorithms for Image | authentication | , A |
SVD-Based Fragile Watermarking Scheme for Image | authentication | , A |
SVD-based image compression, encryption, and identity | authentication | algorithm on cloud |
SVD-based self-embedding image | authentication | scheme using quick response code features |
SviaB: Secure and verifiable multi-instance iris remote | authentication | using blockchain |
SVM-Based Biometric | authentication | Using Intra-Body Propagation Signals |
SVM-Based Selection of Colour Space Experts for Face | authentication | |
System for Reading Braille Embossed on Beverage Can Lids for | authentication | |
Tablet owner | authentication | based on behavioral characteristics of multi-touch actions |
Tampering with a watermarking-based image | authentication | scheme |
Task-Driven Biometric | authentication | of Users in Virtual Reality (VR) Environments |
TASTNet: An end-to-end deep fingerprinting net with two-dimensional attention mechanism and spatio-temporal weighted fusion for video content | authentication | |
taxonomy for image | authentication | techniques and its application to the current state of the art, A |
Template protection for HMM-based on-line signature | authentication | |
Theoretical Framework for Constructing Matching Algorithms in Biometric | authentication | Systems |
Three Byte-Based Mutual | authentication | Scheme for Autonomous Internet of Vehicles |
Token-Based Fingerprint | authentication | |
Touch Gesture-Based Active User | authentication | Using Dictionaries |
Touch-Stroke Dynamics | authentication | Using Temporal Regression Forest |
Touchstroke: Smartphone User | authentication | Based on Touch-Typing Biometrics |
Toward a Secure Public-key Blockwise Fragile | authentication | Watermarking |
Toward Person | authentication | with Point Light Display Using Neural Network Ensembles |
Toward secure public-key blockwise fragile | authentication | watermarking |
Toward Ubiquitous Acceptance of Biometric | authentication | : Template Protection Techniques |
Towards contactless palmprint | authentication | |
Towards Effective Content | authentication | for Digital Videos by Employing Feature Extraction and Quantization |
Towards Gesture-Based User | authentication | |
Towards mobile | authentication | using dynamic signature verification: Useful features and performance evaluation |
Towards Multiple User Active | authentication | in Mobile Devices |
Transmission-Efficient Image-Based | authentication | for Mobile Devices |
Trends in User Identity and Continuous | authentication | |
Two Factor Face | authentication | Scheme with Cancelable Feature |
Two-Factor | authentication | or How to Potentially Counterfeit Experimental Results in Biometric Systems |
Two-Factor | authentication | System Using P300 Response to a Sequence of Human Photographs |
Unifying Probabilistic Linear Discriminant Analysis Variants in Biometric | authentication | |
Usability Study of Continuous Biometrics | authentication | , An |
User | authentication | based on Face Recognition with Support Vector Machines |
User | authentication | based on foot motion |
User | authentication | Based on JPEG2000 Images |
User | authentication | System Based on Speech and Cascade Hybrid Facial Feature |
User | authentication | through Typing Biometrics Features |
User | authentication | Using Fusion Of Face And Palmprint |
User Classification for Keystroke Dynamics | authentication | |
Using adapted Levenshtein distance for on-line signature | authentication | |
Using Phase and Directional Line Features for Efficient Palmprint | authentication | |
Using recurrent neural networks for continuous | authentication | through gait analysis |
Using Score Normalization to Solve the Score Variation Problem in Face | authentication | |
Using SIFT features in palmprint | authentication | |
Using Support Vector Machines for Face | authentication | Based on Elastic Graph Matching |
Using Support Vector Machines to Enhance the Performance of Elastic Graph Matching for Frontal Face | authentication | |
Utilizing overt and latent linguistic structure to improve keystroke-based | authentication | |
Validating a Biometric | authentication | System: Sample Size Requirements |
Value of Multiple Viewpoints in Gesture-Based User | authentication | , The |
Variable block-size image | authentication | with localization and self-recovery |
Variants of Dynamic Link Architecture Based on Mathematical Morphology for Frontal Face | authentication | |
Video Encryption, Video Cryptography, | authentication | |
Video-based signature verification and pen-grasping posture analysis for user-dependent identification | authentication | |
Visual speaker | authentication | by ensemble learning over static and dynamic lip details |
Visual speaker | authentication | with random prompt texts by a dual-task CNN framework |
Vulnerabilities, Threats, and | authentication | in Satellite-Based Navigation Systems |
Watermarking 3D triangle meshes for | authentication | and integrity |
Watermarking for | authentication | of LZ-77 Compressed Documents |
Watermarking for image | authentication | |
Watermarking for JPEG Image | authentication | Surviving Integer Rounding in Decompression |
Watermarking for self- | authentication | of compressed video |
Watermarking JBIG2 Text Region for Image | authentication | |
Watermarking Technique for | authentication | of 3-D Polygonal Meshes |
Watermarking-based image | authentication | with recovery capability using halftoning technique |
watermarking-based image ownership and tampering | authentication | scheme, A |
Watermarks for Copyright, Ownership Protection, | authentication | , Verification |
Wavelet decomposition tree selection for palm and face | authentication | |
Wavelet Packet and Adaptive Spatial Transformation of Watermark for Digital Image | authentication | |
Wavelet-Based Fragile Watermarking Scheme for Secure Image | authentication | , A |
Who's Who? Challenges in Biometric | authentication | |
Wolf Attack Probability: A New Security Measure in Biometric | authentication | Systems |
wrapper based feature subset selection using ACO-ELM-ANP and GA-ELM-ANP approaches for keystroke dynamics | authentication | , A |
Writers | authentication | and fractal compression |
µPEWFace: Parallel ensemble of weighted deep convolutional neural networks with novel loss functions for face-based | authentication | |
774 for authentication