default search action
ISBAST 2012: Taipei, Taiwan
- 2012 International Symposium on Biometrics and Security Technologies, ISBAST 2012, Taipei, Taiwan, March 26-29, 2012. IEEE Computer Society 2012, ISBN 978-1-4673-0917-2
- Kuo-Feng Hwang, Cian-Cih Huang, Geeng-Neng You:
A Spelling Based CAPTCHA System by Using Click. 1-8 - Chien-Cheng Lin, Chin-Chun Chang, Deron Liang:
A New Non-intrusive Authentication Approach for Data Protection Based on Mouse Dynamics. 9-14 - Tsozen Yeh, Weian Cheng:
Improving Fault Tolerance through Crash Recovery. 15-22 - Rongfeng Li, Darun Tang, Beining Huang, Wenxin Li:
How Many Samples Does Convincible Performance Evaluation of a Biometric System Need? 23-26 - Madhavi Gudavalli, S. Viswanadha Raju, A. Vinaya Babu, D. Srinivasa Kumar:
Multimodal Biometrics - Sources, Architecture and Fusion Techniques: An Overview. 27-34 - Hao Ni, Dongju Li, Tsuyoshi Isshiki, Hiroaki Kunieda:
Robust Multiple Minutiae Partitions for Fingerprint Authentication. 35-44 - Liang-Hwa Chen, Po-Lun Chang, Yen-Ching Chang, Chiou-Yng Lee:
A Scalable Architecture for Dual Basis GF(2m) Multiplications. 45-50 - Baohua Yuan, Honggen Cao, Jiuliang Chu:
Combining Local Binary Pattern and Local Phase Quantization for Face Recognition. 51-53 - Jia-Lun Tsai, Nai-Wei Lo, Tzong-Chen Wu:
Efficient Convertible Multi-authenticated Encryption Scheme for Group Communications. 54-58 - Chih-Tung Lin, Shi-Jinn Horng, Yao-Lin Huang:
Hardware Resource Manager for Reconfiguration System. 59-65 - Yao-Lin Huang, Shi-Jinn Horng, Tzong-Wann Kao, I-Hong Kuo, Takao Terano:
A Hybrid Forecasting Model Based on Adaptive Fuzzy Time Series and Particle Swarm Optimization. 66-70 - Shiang-Feng Tzeng, Shi-Jinn Horng:
Enhancement of Generalized Ring Signatures with Convertibility. 71-76 - Mohamed Hamdy Eldefrawy, Khaled Alghathbar, Muhammad Khurram Khan:
Hardcopy Document Authentication Based on Public Key Encryption and 2D Barcodes. 77-81 - Rong-Jian Chen, Shi-Jinn Horng:
Multi-bit Adaptive Embedding Algorithm for Anti-forensic Steganography. 82-89 - Hsiang-Chuan Liu, Hsien-Chang Tsai, Yu-Ting Cheng, Yen-Kuei Yu:
An Integrated Algorithm of Liu's Generalized Lambda-Measure Based Choquet Integral and Hurst Exponent. 90-95 - Darun Tang, Beining Huang, Wenxin Li, Xiaoming Li:
A Method of Evolving Finger Vein Template. 96-101 - Yu-Chen Shu, Wen-Liang Hwang, Dean Chou:
Message Passing Using the Cover Text as Secret Key. 102-107 - Han-Yu Lin, Chien-Ming Chen, Yu-Lun Cheng, Ya-Hui Chang, Tun-Wen Pai:
Construction of a Taiwan Biodiversity Genetic Database in Cloud Environments. 108-112 - Yuan-Liang Tang, Chia-Jung Yang:
Print-and-Scan Resilient Watermarking Based on Modulating the Averages of DCT Coefficients. 113-117 - Ming-Chang Huang:
Introduction to Two P2P Network Based Reputation Systems. 118-125 - Rudolf B. Blazek, Wei-Tyng Hong:
Robust Hierarchical Linear Model Comparison for End-of-Utterance Detection under Noisy Environments. 126-133 - Hung-Chuan Lai, Shi-Jinn Horng, Pingzhi Fan, Xian Wang, Yi Pan:
An Efficient Run Time Control Flow Errors Detection by DCT Technique. 134-150
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.