Lecture Notes in Computer Science on Advances in Cryptology-EUROCRYPT'88
Eigenfaces vs. Fisherfaces: Recognition Using Class Specific Linear Projection
IEEE Transactions on Pattern Analysis and Machine Intelligence
The FERET Evaluation Methodology for Face-Recognition Algorithms
IEEE Transactions on Pattern Analysis and Machine Intelligence
A method for obtaining digital signatures and public-key cryptosystems
Communications of the ACM
Handbook of Applied Cryptography
Handbook of Applied Cryptography
Two-Dimensional PCA: A New Approach to Appearance-Based Face Representation and Recognition
IEEE Transactions on Pattern Analysis and Machine Intelligence
Journal of Cognitive Neuroscience
Multi-modal biometrics with PKI technologies for border control applications
ISI'05 Proceedings of the 2005 IEEE international conference on Intelligence and Security Informatics
IEEE Transactions on Image Processing
Hi-index | 0.00 |
The rapid growth of the Internet has caused a large number of social problems including invasion of privacy and violation of personal identity. Currently, it is an emerging trend to verify personal identity based on hybrid methods (for example, by combining the existing off-line and on-line verification methods) using the Internet in the legacy applications. As a result, many security problems of the Internet is now becoming the practical impacts on our social applications. In this paper, we study multi-modal techniques for preventing identity theft in the social applications from the practical perspectives. A digital signature techniques and multi-modal biometrics are exploited in our scheme without requiring users to hold additional hardware devices.