Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- articleJanuary 2009
Intersubject differences in false nonmatch rates for a fingerprint-based authentication system
EURASIP Journal on Advances in Signal Processing (JASP), Volume 2009Article No.: 10, Pages 1–9https://doi.org/10.1155/2009/896383The intersubject dependencies of false nonmatch rates were investigated for a minutiae-based biometric authentication process using single enrollment and verification measurements. A large number of genuine comparison scores were subjected to ...
- articleJanuary 2008
A sharing-based fragile watermarking method for authentication and self-recovery of image tampering
EURASIP Journal on Advances in Signal Processing (JASP), Volume 2008Article No.: 200, Pages 1–17https://doi.org/10.1155/2008/846967This study presents an authentication method with self-recovery ability. The hidden watermark in the proposed method not only detects and locates the tampered portion of an image, but also self-recovers the tampered portion. To increase the ability to ...
- articleJanuary 2008
Biometric template security
EURASIP Journal on Advances in Signal Processing (JASP), Volume 2008Article No.: 113, Pages 1–17https://doi.org/10.1155/2008/579416Biometric recognition offers a reliable solution to the problem of user authentication in identity management systems. With the widespread deployment of biometric systems in various applications, there are increasing concerns about the security and ...
- articleJanuary 2008
Unobtrusive multimodal biometric authentication: the HUMABIO project concept
EURASIP Journal on Advances in Signal Processing (JASP), Volume 2008Article No.: 110, Pages 1–11https://doi.org/10.1155/2008/265767Human Monitoring and Authentication using Biodynamic Indicators and Behavioural Analysis (HUMABIO) (2007) is an EU Specific Targeted Research Project (STREP) where new types of biometrics are combined with state-of-the-art sensorial technologies in ...
- articleJanuary 2008
Analysis of human electrocardiogram for biometric recognition
EURASIP Journal on Advances in Signal Processing (JASP), Volume 2008Article No.: 19, Page 19https://doi.org/10.1155/2008/148658Security concerns increase as the technology for falsification advances. There are strong evidences that a difficult to falsify biometric trait, the human heartbeat, can be used for identity recognition. Existing solutions for biometric recognition from ...
- articleJanuary 2008
Unobtrusive biometric system based on electroencephalogram analysis
EURASIP Journal on Advances in Signal Processing (JASP), Volume 2008Article No.: 18, Page 18https://doi.org/10.1155/2008/143728Features extracted from electroencephalogram (EEG) recordings have proved to be unique enough between subjects for biometric applications. We show here that biometry based on these recordings offers a novel way to robustly authenticate or identify ...
- articleJanuary 2004
Image content authentication using pinned sine transform
EURASIP Journal on Advances in Signal Processing (JASP), Volume 2004Pages 2174–2184https://doi.org/10.1155/S111086570440506XDigital image content authentication addresses the problem of detecting any illegitimate modification on the content of images. To cope with this problem, a novel semifragile watermarking scheme using the pinned sine transform (PST) is presented in this ...
- articleJanuary 2004
Linear and nonlinear oblivious data hiding
EURASIP Journal on Advances in Signal Processing (JASP), Volume 2004Pages 2102–2112https://doi.org/10.1155/S1110865704403059The majority of the existing data hiding schemes are based on the direct-sequence (DS) modulation where a low-power random sequence is embedded into the original cover signal to represent hidden information. In this paper, we investigate linear and non-...
- articleJanuary 2004
Secure multimedia authoring with dishonest collaborators
EURASIP Journal on Advances in Signal Processing (JASP), Volume 2004Pages 2214–2223https://doi.org/10.1155/S1110865704401085Many systems have been proposed for protecting the intellectual property of multimedia authors and owners from the public at large, who have access to the multimedia only after it is published. In this paper, we consider the problem of protecting ...
- articleJanuary 2004
Video waterscrambling: towards a video protection scheme based on the disturbance of motion vectors
EURASIP Journal on Advances in Signal Processing (JASP), Volume 2004Pages 2224–2237https://doi.org/10.1155/S1110865704401061With the popularity of high-bandwidth modems and peer-to-peer networks, the contents of videos must be highly protected from piracy. Traditionally, the models utilized to protect this kind of content are scrambling and watermarking. While the former ...
- articleJanuary 2004
A secure and robust object-based video authentication system
EURASIP Journal on Advances in Signal Processing (JASP), Volume 2004Pages 2185–2200https://doi.org/10.1155/S1110865704312217An object-based video authentication system, which combines watermarking, error correction coding (ECC), and digital signature techniques, is presented for protecting the authenticity between video objects and their associated backgrounds. In this ...
- articleJanuary 2004
Voice biometrics over the internet in the framework of COST action 275
- Laurent Besacier,
- Aladdin M. Ariyaeeinia,
- John S. Mason,
- Jean-Fran�ois Bonastre,
- Pedro Mayorga,
- Corinne Fredouille,
- Sylvain Meignier,
- Johann Siau,
- Nicholas W. D. Evans,
- Roland Auckenthaler,
- Robert Stapert
EURASIP Journal on Advances in Signal Processing (JASP), Volume 2004Pages 466–479https://doi.org/10.1155/S1110865704310012The emerging field of biometric authentication over the Internet requires both robust person authentication and secure computer network protocols. This paper presents investigations of vocal biometric person authentication over the Internet, both at the ...
- articleJanuary 2004
Offline signature verification using the discrete radon transform and a hidden Markov model
EURASIP Journal on Advances in Signal Processing (JASP), Volume 2004Pages 559–571https://doi.org/10.1155/S1110865704309042We developed a system that automatically authenticates offine handwritten signatures using the discrete Radon transform (DRT) and a hidden Markov model (HMM). Given the robustness of our algorithm and the fact that only global features are considered, ...
- articleJanuary 2003
Watermarking-based digital audio data authentication
EURASIP Journal on Advances in Signal Processing (JASP), Volume 2003Pages 1001–1015https://doi.org/10.1155/S1110865703304081Digital watermarking has become an accepted technology for enabling multimedia protection schemes. While most efforts concentrate on user authentication, recently interest in data authentication to ensure data integrity has been increasing. Existing ...
- articleFebruary 2002
Multimedia data hiding and authentication via halftoning and coordinate projection
EURASIP Journal on Advances in Signal Processing (JASP), Volume 2002, Issue 2Pages 143–151https://doi.org/10.1155/S1110865702000513We present image data hiding and authentication schemes based on halftoning and coordinate projection. The proposed data hiding scheme can embed images of the same size and similar bit depth into the cover image and robustness against compression is ...
- articleJanuary 2002
A survey of watermarking algorithms for image authentication
Digital image manipulation software is now readily available on personal computers. It is therefore very simple to tamper with any image and make it available to others. Insuring digital image integrity has therefore become a major issue. Watermarking ...
- articleJanuary 2002
Multimedia data hiding and authentication via halftoning and coordinate projection
We present image data hiding and authentication schemes based on halftoning and coordinate projection. The proposed data hiding scheme can embed images of the same size and similar bit depth into the cover image and robustness against compression is ...