منابع مشابه
A Study on the Iris Biometric Authentication
This paper presents a methodology for quantitatively establishing the discriminative power of iris biometric data. It is difficult, however, to establish that any biometric modality is capable of distinguishing every person because the classification task has an extremely large and unspecified number of classes. The purpose of this study is to investigate various combinations of features, dista...
متن کاملA Study on Biometric Template Security
The increasing popularity of biometrics and cryptography is driven by the widespread stipulation on information security. Abundant efforts have been made in developing successful methods in these areas in order to accomplish an enhanced level of information security. There are two dominant issues in information security enhancement. One is to defend the user ownership and control the access to ...
متن کاملOn Steganographic Chosen Covertext Security
At TCC 2005, Backes and Cachin proposed a new and very strong notion of security for public key steganography: secrecy against adaptive chosen covertext attack (SS-CCA); and posed the question of whether SS-CCA security was achievable for any covertext channel. We resolve this question in the affirmative: SS-CCA security is possible for any channel that admits a secure stegosystem against the s...
متن کاملEffect of Arousal on Chosen
Many previous studies have shown that arousal affects time perception, suggesting a direct influence of arousal on the speed of the pacemaker of the internal clock. However, it is unknown whether arousal influences the mental representation of tempo (speed) for highly familiar and complex stimuli, such as well-known melodies, that have long-term representations in memory. Previous research sugg...
متن کاملChosen Ciphertext Attack on SSS
The stream cipher Self-Synchronizing Sober (SSS) is a candidate in the ECRYPT stream cipher competition. In this paper, we describe a chosen ciphertext attack on SSS. Our implementation of the attack recovers the entire secret state of SSS in around 10 seconds on a 2.8GHz PC, and requires a single chosen ciphertext of less than 10 kByte. The designers of SSS state that chosen ciphertext attacks...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Nihon Chikusan Gakkaiho
سال: 1929
ISSN: 1346-907X,1880-8255
DOI: 10.2508/chikusan.4.1