Work Plan and Methodology
ثبت نشده
چکیده
The proposed method is based on 2-dimensional quantization of distance vectors between biometrics features and pairs of random vectors in this method the concept of changeable cryptographic key generation using face biometrics signal. A previously introduced scheme, fuzzy vault, is utilized for secure binding of randomly generated key with extracted biometrics features. The major technical difficulty is to map noisy biometrics representation to the exactly correct key. A windowing process is applied to tolerate the variations of biometrics signals. Further, a two-factor scheme, where the quantized distance vectors are generated with userdependent random vectors. By integrating a second factor, both the biometrics and the key are changeable, and zero error rate can be obtained.
منابع مشابه
Developing an Evaluation Plan for a Fully Online Degree Program in HRD
Effectiveness in distance education has been scrutinized for years, but only recently has literature focused on Web-based learning. As more online degree programs are established, the need for evaluation methodologies and processes guiding those activities increases. This paper describes on-going research to develop an evaluation plan for a fully online graduate degree program in HRD, including...
متن کاملAutomatically Utilizing Science Opportunities with Continuous Plan Improvements
We describe a methodology for representing and optimizing user preferences on plans. Our approach differs from previous work on plan optimization in that we employ a generalization of commonly occurring plan quality metrics, providing an expressive preference language. We introduce a domain independent algorithm for incrementally improving the quality of feasible plans with respect to preferenc...
متن کاملUsing Generic Preferences to Incrementally Improve Plan Quality
We describe a methodology for representing and optimizing user preferences on plans. Our approach differs from previous work on plan optimization in that we employ a generalization of commonly occurring plan quality metrics, providing an expressive preference language. We introduce a domain independent algorithm for incrementally improving the quality of feasible plans with respect to preferenc...
متن کاملLicentiate Thesis Proposal A design methodology for systematic Multiple properties-based Partitioning of embedded systems applications
........................................................................................................................................................ 3 1 Research Description ............................................................................................................................ 4 1.1 Problem Formulation .......................................................................
متن کاملMapping of McGraw Cycle to RUP Methodology for Secure Software Developing
Designing a secure software is one of the major phases in developing a robust software. The McGraw life cycle, as one of the well-known software security development approaches, implements different touch points as a collection of software security practices. Each touch point includes explicit instructions for applying security in terms of design, coding, measurement, and maintenance of softwar...
متن کاملBook Abstract: How to Write an Emergency Plan by David Alexander; Reproduced by Permission
In 2002, David Alexander wrote Principles of Emergency Planning and Management. Long a standard reference work in that book he described the processes of preparing for and responding to disasters, crises, and civil contingencies. He based the work on principles because he wanted to dissociate it from any particular system of emergency management. Then, as now, many books in this subject are tie...
متن کامل