Integrating Faces and Fingerprints for Personal Identification
IEEE Transactions on Pattern Analysis and Machine Intelligence
3D Object Recognition from Color Intensity Images
ICPR '96 Proceedings of the 1996 International Conference on Pattern Recognition (ICPR '96) Volume I - Volume 7270
XML Syntax Conscious Compression
DCC '06 Proceedings of the Data Compression Conference
Automated personal identification system based on human iris analysis
Pattern Analysis & Applications
HOTMOBILE '07 Proceedings of the Eighth IEEE Workshop on Mobile Computing Systems and Applications
Semantic Policies for Service Access in Mobile Supported Sensor Networks
ICSNC '08 Proceedings of the 2008 Third International Conference on Systems and Networks Communications
Keystroke-Based User Identification on Smart Phones
RAID '09 Proceedings of the 12th International Symposium on Recent Advances in Intrusion Detection
Near Field Communications Handbook: Internet and Communications
Near Field Communications Handbook: Internet and Communications
Universal Bluetooth Access Control and Security System for e-Keys Enviroments
SECURWARE '10 Proceedings of the 2010 Fourth International Conference on Emerging Security Information, Systems and Technologies
Wireless Access Monitoring and Control System based on Digital Door Lock
IEEE Transactions on Consumer Electronics
Testing context-aware services based on smartphones by agent based social simulation
Journal of Ambient Intelligence and Smart Environments - Intelligent agents in Ambient Intelligence and smart environments
Hi-index | 0.00 |
This paper describes the application and the suitability of color sensors and mobile devices for the design and development of secure personal identification systems in pervasive environments. The system uses a color sequence properly encrypted and stored on a mobile device to be used as the only identification. An application stored in the phone device is responsible for decrypting and displaying the sequence of colors that is read by a real color sensor that could be connected to any kind of objects in a pervasive scenario. Data structure of the identification key, encriptation type, processing and application of the system is described in this paper.