Elements of information theory
Elements of information theory
Person Identification Using Multiple Cues
IEEE Transactions on Pattern Analysis and Machine Intelligence
A Unified and Generalized Treatment of Authentification Theory
STACS '96 Proceedings of the 13th Annual Symposium on Theoretical Aspects of Computer Science
Robust Bit Extraction from Images
ICMCS '99 Proceedings of the IEEE International Conference on Multimedia Computing and Systems - Volume 2
Enhancing security and privacy in biometrics-based authentication systems
IBM Systems Journal - End-to-end security
Security with Noisy Data: Private Biometrics, Secure Key Storage and Anti-Counterfeiting
Security with Noisy Data: Private Biometrics, Secure Key Storage and Anti-Counterfeiting
Biometrics: a tool for information security
IEEE Transactions on Information Forensics and Security
Hi-index | 0.00 |
In this paper, we consider an authentication framework for independent modalities based on binary hypothesis testing using source coding jointly with the random projections. The source coding ensures the multimodal signals reconstruction at the decoder based on the authentication data. The random projections are used to cope with the security, privacy, robustness and complexity issues. Finally, the authentication performance is investigated for both direct and random projections domains. The asymptotic performance approximation is derived and compared with the exact solutions. The impact of modality fusion on the authentication system performance is demonstrated.