메뉴 건너뛰기




Volumn 2007, Issue , 2007, Pages

Secure hashing of dynamic hand signatures using wavelet-fourier compression with BioPhasor mixing and 2N discretization

Author keywords

[No Author keywords available]

Indexed keywords

ERROR CORRECTION; MATHEMATICAL TRANSFORMATIONS; METRIC SYSTEM; NUMERICAL METHODS; VECTORS;

EID: 33846224825     PISSN: 11108657     EISSN: 16870433     Source Type: Journal    
DOI: 10.1155/2007/59125     Document Type: Article
Times cited : (25)

References (25)
  • 2
    • 2942592700 scopus 로고    scopus 로고
    • Handwriting: Feature correlation analysis for biometric hashes
    • claus.vielhauer@iti.cs.uni-magdeburg.de ralf.steinmetz@kom.tu-darmstadt. de. special issue on Biometric Signal Processing
    • C. Vielhauer claus.vielhauer@iti.cs.uni-magdeburg.de R. Steinmetz ralf.steinmetz@kom.tu-darmstadt.de Handwriting: feature correlation analysis for biometric hashes. EURASIP Journal on Applied Signal Processing 2004 4 2004 542 558 special issue on Biometric Signal Processing
    • (2004) EURASIP Journal on Applied Signal Processing , vol.2004 , Issue.4 , pp. 542-558
    • Vielhauer, C.1    Steinmetz, R.2
  • 3
    • 0036037919 scopus 로고    scopus 로고
    • Private key generation from on-line handwritten signatures
    • H. Feng C. W. Chan Private key generation from on-line handwritten signatures. Information Management & Computer Security 10 4 159 164 2002
    • (2002) Information Management & Computer Security , vol.10 , Issue.4 , pp. 159-164
    • Feng, H.1    Chan, C.W.2
  • 10
    • 33744964385 scopus 로고    scopus 로고
    • Generation of replaceable cryptographic keys from dynamic handwritten signatures
    • david.ngo@mmu.edu.my alwyn@corentix.com yip.wai.kuan04@mmu.edu.my bjteoh@mmu.edu.my Hong KongLecture Notes in Computer Science
    • W.-K. Yip yip.wai.kuan04@mmu.edu.my A. Goh alwyn@corentix.com D.-C. L. Ngo david.ngo@mmu.edu.my A.-B. J. Teoh bjteoh@mmu.edu.my Generation of replaceable cryptographic keys from dynamic handwritten signatures. Proceedings of International Conference on Advances in Biometrics (ICB '06) Hong Kong Lecture Notes in Computer Science 3832 2006 509 515
    • (2006) Proceedings of International Conference on Advances in Biometrics (ICB '06) , vol.3832 , pp. 509-515
    • Yip, W.-K.1    Goh, A.2    Ngo, D.-C.L.3    Teoh, A.-B.J.4
  • 11
    • 33750947671 scopus 로고    scopus 로고
    • Cryptographic keys from dynamic hand-signatures with biometric secrecy preservation and replaceability
    • david.ngo@mmu.edu.my alwyn@corentix.com yip.wai.kuan04@mmu.edu.my bjteoh@mmu.edu.my Buffalo, NY, USA
    • W.-K. Yip yip.wai.kuan04@mmu.edu.my A. Goh alwyn@corentix.com D.-C. L. Ngo david.ngo@mmu.edu.my A.-B. J. Teoh bjteoh@mmu.edu.my Cryptographic keys from dynamic hand-signatures with biometric secrecy preservation and replaceability. Proceedings of the 4th IEEE on Automatic Identification Advanced Technologies (AutoID '05) Buffalo, NY, USA 2005 27 32
    • (2005) Proceedings of the 4th IEEE on Automatic Identification Advanced Technologies (AutoID '05) , pp. 27-32
    • Yip, W.-K.1    Goh, A.2    Ngo, D.-C.L.3    Teoh, A.-B.J.4
  • 12
    • 31344447750 scopus 로고    scopus 로고
    • Random projection-based multiplicative data perturbation for privacy preserving distributed data mining
    • hillol@cs.umbc.edu kunliul@cs.umbc.edu jryan4@cs.umbc.edu
    • K. Liu kunliul@cs.umbc.edu H. Kargupta hillol@cs.umbc.edu J. Ryan jryan4@cs.umbc.edu Random projection-based multiplicative data perturbation for privacy preserving distributed data mining. IEEE Transactions on Knowledge and Data Engineering 18 1 2006 92 106
    • (2006) IEEE Transactions on Knowledge and Data Engineering , vol.18 , Issue.1 , pp. 92-106
    • Liu, K.1    Kargupta, H.2    Ryan, J.3
  • 14
    • 0142088895 scopus 로고    scopus 로고
    • Online signature verification using a new extreme points warping technique
    • haofeng@pmailntu.edu.sg ecwchan@ntu.edu.sg
    • H. Feng haofeng@pmailntu.edu.sg C. W. Chan ecwchan@ntu.edu.sg Online signature verification using a new extreme points warping technique. Pattern Recognition Letters 24 16 2003 2943 2951
    • (2003) Pattern Recognition Letters , vol.24 , Issue.16 , pp. 2943-2951
    • Feng, H.1    Chan, C.W.2
  • 21
    • 0024858506 scopus 로고
    • Signature recognition through spectral analysis
    • C. F. Lam D. Kamins Signature recognition through spectral analysis. Pattern Recognition 22 1 1989 39 44
    • (1989) Pattern Recognition , vol.22 , Issue.1 , pp. 39-44
    • Lam, C.F.1    Kamins, D.2
  • 25
    • 84890522850 scopus 로고
    • Communication Theory of Secrecy Systems
    • C. E. Shannon Communication Theory of Secrecy Systems. Bell Systems Technical Journal 28 1949 656 715
    • (1949) Bell Systems Technical Journal , vol.28 , pp. 656-715
    • Shannon, C.E.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.