From post

Touchpad Input for Continuous Biometric Authentication.

, , и . Communications and Multimedia Security, том 8735 из Lecture Notes in Computer Science, стр. 86-91. Springer, (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

How to protect biometric templates., , и . Security, Steganography, and Watermarking of Multimedia Contents, том 6505 из SPIE Proceedings, стр. 650514. SPIE, (2007)Design of a Laboratory for Information Security Education., , , и . World Conference on Information Security Education, том 253 из IFIP Conference Proceedings, стр. 61-73. Kluwer, (2003)Buyer-seller watermarking protocol based on amplitude modulation and the El Gamal Public Key Crypto System., и . Security and Watermarking of Multimedia Contents, том 3657 из SPIE Proceedings, стр. 289-295. SPIE, (1999)Benchmarking steganographic and steganalysis techniques., , и . Security, Steganography, and Watermarking of Multimedia Contents, том 5681 из Proceedings of SPIE, стр. 252-263. SPIE, (2005)Emerging NUI-based methods for user authentication.. ICCE, стр. 1. IEEE, (2018)Circuits and systems for real-time security and copyright protection of multimedia., , и . Comput. Electr. Eng., 35 (2): 231-234 (2009)A 2-D vector excitation coding technique.. Signal Process., 67 (2): 163-172 (1998)Content Authentication for Neural Imaging Pipelines: End-to-end Optimization of Photo Provenance in Complex Distribution Channels., и . CoRR, (2018)Robust discretization, with an application to graphical passwords., , и . IACR Cryptology ePrint Archive, (2003)Optimizing Prediction Gain in Symmetric Axial Scans., , и . ICIP, стр. 932-935. IEEE, (2000)