Adaptive filter theory (2nd ed.)
Adaptive filter theory (2nd ed.)
Applied cryptography (2nd ed.): protocols, algorithms, and source code in C
Applied cryptography (2nd ed.): protocols, algorithms, and source code in C
Cryptography and Network Security: Principles and Practice
Cryptography and Network Security: Principles and Practice
Automatic Fingerprint Recognition Systems
Automatic Fingerprint Recognition Systems
Handbook of Learning and Approximate Dynamic Programming (IEEE Press Series on Computational Intelligence)
Security on FPGAs: State-of-the-art implementations and attacks
ACM Transactions on Embedded Computing Systems (TECS)
On-Chip Lookup Tables for Fast Symmetric-Key Encryption
ASAP '05 Proceedings of the 2005 IEEE International Conference on Application-Specific Systems, Architecture Processors
Development of a neural net-based, personalized secure communication link
ICANN'06 Proceedings of the 16th international conference on Artificial Neural Networks - Volume Part I
IEEE Transactions on Information Theory
Filterbank-based fingerprint matching
IEEE Transactions on Image Processing
The multi-bit watermarking method for speech signals in the time-frequency domain
Integrated Computer-Aided Engineering
Hi-index | 0.00 |
We describe a novel secure communication system (SCS) via public networks. For the generation of a unique pair of encryption module (EM) and decryption module (DM), learning algorithms are applied in combination with biometric data of the future DM-user. Subsequently, EM can be attached to any computer to form a generally usable encryption unit (EU) while DM, if attached to another computer to form the matching decryption unit (DU), can only be activated by the specific pair-generating DM-user. EU transforms spatial data to temporal data by means of spatio-temporal (ST) filters. DU uses a combination of analytical- and learning algorithms for decryption.