Information Security Applications
11th International Workshop, WISA 2010, Jeju Island, Korea, August 24-26, 2010, Revised Selected Papers
Chapter and Conference Paper
It is challenging to parallelize the problems with irregular computation and communication. In this paper, we proposed a scalable and efficient algorithm for solving irregular inter-processor data dependency i...
Chapter and Conference Paper
The fingerprint has been used as biometrics for user identification and authentication because of its characteristics like uniqueness in that no two fingerprints pair from different fingers is definitely ident...
Chapter and Conference Paper
In the modern electronic world, the authentication of a person is an important task in many areas of day-to-day. Using biometrics to authenticate a person’s identity has several advantages over the present pra...
Chapter and Conference Paper
As a method of preserving of privacy and the security of sensitive information, biometrics has been studied and used for the past few decades. A number of fingerprint verification approaches have been proposed...
Chapter and Conference Paper
In this paper, we describe various watermarking techniques for secure user verification in the remote, multimodal biometric systems employing both fingerprint and face information, and compare their effects on...
Chapter and Conference Paper
Biometrics-based user authentication has several advantages over traditional password-based systems for standalone authentication applications. This is also true for new authentication architectures known as cryp...
Chapter and Conference Paper
Biometric based authentication can provide strong security guarantee about the identity of users. However, security of biometric data is particularly important as compromise of the data will be permanent. Cancela...
Chapter and Conference Paper
To heighten the biometrics security level, the biometrics feature extraction and verification need to be performed within smart cards, not in external card readers. However, the smart card chip has very limite...
Chapter and Conference Paper
Biometrics-based user authentication has several advantages over traditional password-based systems for standalone authentication applications such as home networks. This is also true for new authentication ar...
Chapter and Conference Paper
Verification of a person’s identity using fingerprint has several advantages over the present practices of Personal Identification Numbers(PINs) and passwords. Also, as the VLSI technology has been improved, t...
Chapter and Conference Paper
SECMPEG selectively encrypts data to protect MPEG video streams with minimum overhead. However, this scheme is known to provide only confidentiality but not integrity for data. In this paper, we apply AES-CCM ...
Book and Conference Proceedings
11th International Workshop, WISA 2010, Jeju Island, Korea, August 24-26, 2010, Revised Selected Papers