Work Plan and Methodology

ثبت نشده
چکیده

The proposed method is based on 2-dimensional quantization of distance vectors between biometrics features and pairs of random vectors in this method the concept of changeable cryptographic key generation using face biometrics signal. A previously introduced scheme, fuzzy vault, is utilized for secure binding of randomly generated key with extracted biometrics features. The major technical difficulty is to map noisy biometrics representation to the exactly correct key. A windowing process is applied to tolerate the variations of biometrics signals. Further, a two-factor scheme, where the quantized distance vectors are generated with userdependent random vectors. By integrating a second factor, both the biometrics and the key are changeable, and zero error rate can be obtained.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Developing an Evaluation Plan for a Fully Online Degree Program in HRD

Effectiveness in distance education has been scrutinized for years, but only recently has literature focused on Web-based learning. As more online degree programs are established, the need for evaluation methodologies and processes guiding those activities increases. This paper describes on-going research to develop an evaluation plan for a fully online graduate degree program in HRD, including...

متن کامل

Automatically Utilizing Science Opportunities with Continuous Plan Improvements

We describe a methodology for representing and optimizing user preferences on plans. Our approach differs from previous work on plan optimization in that we employ a generalization of commonly occurring plan quality metrics, providing an expressive preference language. We introduce a domain independent algorithm for incrementally improving the quality of feasible plans with respect to preferenc...

متن کامل

Using Generic Preferences to Incrementally Improve Plan Quality

We describe a methodology for representing and optimizing user preferences on plans. Our approach differs from previous work on plan optimization in that we employ a generalization of commonly occurring plan quality metrics, providing an expressive preference language. We introduce a domain independent algorithm for incrementally improving the quality of feasible plans with respect to preferenc...

متن کامل

Licentiate Thesis Proposal A design methodology for systematic Multiple properties-based Partitioning of embedded systems applications

........................................................................................................................................................ 3 1 Research Description ............................................................................................................................ 4 1.1 Problem Formulation .......................................................................

متن کامل

Mapping of McGraw Cycle to RUP Methodology for Secure Software Developing

Designing a secure software is one of the major phases in developing a robust software. The McGraw life cycle, as one of the well-known software security development approaches, implements different touch points as a collection of software security practices. Each touch point includes explicit instructions for applying security in terms of design, coding, measurement, and maintenance of softwar...

متن کامل

Book Abstract: How to Write an Emergency Plan by David Alexander; Reproduced by Permission

In 2002, David Alexander wrote Principles of Emergency Planning and Management. Long a standard reference work in that book he described the processes of preparing for and responding to disasters, crises, and civil contingencies. He based the work on principles because he wanted to dissociate it from any particular system of emergency management. Then, as now, many books in this subject are tie...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2012