Differential Operation Based Palmprint Authentication for Multimedia Security

Author(s):  
Xiangqian Wu ◽  
Kuanquan Wang ◽  
David Zhang
Author(s):  
Guorui Feng ◽  
Sheng Li ◽  
Haoliang Li ◽  
Shujun Li

Author(s):  
Leo Yu Zhang ◽  
Kai Zeng
Keyword(s):  

2010 ◽  
Vol 2010 (DPC) ◽  
pp. 001401-001425
Author(s):  
Michael Kranz

Many MEMS/NEMS sensors, including gyroscopes, chemical sensors, and RF filters utilize the mechanical resonance of the MEMS/NEMS structure as a highly sensitive detector. Typically, changes in the external environment lead to changes in the resonant frequency or amplitude. Due to the low-loss of micro and nano mechanical structures, large quality factors are achievable, leading to sharp resonance curves that change greatly after only small changes in the environment. This allows sensitive detectors, but also leads to poor stability and tight fabrication tolerances. This paper will discuss these issues as well as mitigation techniques including feedback control, tuning, differential operation, and sensor fusion, amongst others.


2019 ◽  
Vol 2019 ◽  
pp. 1-13 ◽  
Author(s):  
Imran Shahzad ◽  
Qaiser Mushtaq ◽  
Abdul Razaq

Substitution box (S-box) is a vital nonlinear component for the security of cryptographic schemes. In this paper, a new technique which involves coset diagrams for the action of a quotient of the modular group on the projective line over the finite field is proposed for construction of an S-box. It is constructed by selecting vertices of the coset diagram in a special manner. A useful transformation involving Fibonacci sequence is also used in selecting the vertices of the coset diagram. Finally, all the analyses to examine the security strength are performed. The outcomes of the analyses are encouraging and show that the generated S-box is highly secure.


Author(s):  
Shiguo Lian

Digital fingerprinting is reported and used in copy tracing. It embeds different information, for example, Customer ID, into multimedia content, produces a different copy, and sends the copy to the corresponding customer. If a copy is spread to unauthorized customers, the unique information in the copy can be detected and used to trace the illegal distributors. In this chapter, we introduce some digital fingerprinting algorithms, review the existing traitor tracing schemes, analyze the performances of some typical algorithms through comparison, and propose the future trends and some open issues in this field. It is expected to provide some valuable information to researchers or engineers working in mobile multimedia security.


2013 ◽  
Vol 411-414 ◽  
pp. 1326-1329
Author(s):  
Yong Yang ◽  
Jian Hua Wang ◽  
Long Hao ◽  
Na Huo

The paper takes license location method based on the low-freq image vertical boundary and region searching. doing the vertical first-order differential operation on the graph, taking the vertical boundary information out, Use the line scan method into license region searching; detect region information of the suitable license texture status-hopping, the algorithm located accurately and lose less operation time than traditionally which has been achieved at the goal for license location fast and accurately.


Sign in / Sign up

Export Citation Format

Share Document