A Channel Coding Approach for Human Authentication From Gait Sequences (English)
- New search for: Argyropoulos, S.
- New search for: Tzovaras, D.
- New search for: Ioannidis, D.
- New search for: Strintzis, M.G.
- New search for: Argyropoulos, S.
- New search for: Tzovaras, D.
- New search for: Ioannidis, D.
- New search for: Strintzis, M.G.
In:
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY
;
4
, 3
;
428-440
;
2009
-
ISSN:
- Article (Journal) / Print
-
Title:A Channel Coding Approach for Human Authentication From Gait Sequences
-
Contributors:Argyropoulos, S. ( author ) / Tzovaras, D. ( author ) / Ioannidis, D. ( author ) / Strintzis, M.G. ( author )
-
Published in:IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY ; 4, 3 ; 428-440
-
Publisher:
- New search for: Institute of Electrical and Electronics Engineers
-
Publication date:2009-01-01
-
Size:13 pages
-
ISSN:
-
Type of media:Article (Journal)
-
Type of material:Print
-
Language:English
- New search for: 006.3
- Further information on Dewey Decimal Classification
-
Classification:
DDC: 006.3 -
Source:
© Metadata Copyright the British Library Board and other contributors. All rights reserved.
Table of contents – Volume 4, Issue 3
The tables of contents are generated automatically and are based on the data records of the individual contributions available in the index of the TIB portal. The display of the Tables of Contents may therefore be incomplete.
- 273
-
On Reliability and Security of Randomized Detectors Against Sensitivity Analysis AttacksEl Choubassi, M. / Moulin, P. et al. | 2009
- 284
-
On Estimation Accuracy of Desynchronization Attack Channel ParametersSadasivam, S. / Moulin, P. et al. | 2009
- 293
-
Performance of Orthogonal Fingerprinting Codes Under Worst-Case NoiseKiyavash, N. / Moulin, P. et al. | 2009
- 302
-
Robust MC-CDMA-Based Fingerprinting Against Time-Varying Collusion AttacksByung-Ho Cha, / Kuo, C.-C.J. et al. | 2009
- 318
-
Regular Simplex Fingerprints and Their Optimality PropertiesKiyavash, N. / Moulin, P. / Kalker, T. et al. | 2009
- 330
-
Fingerprinting Compressed Multimedia SignalsVarna, A.L. / Shan He, / Swaminathan, A. / Min Wu, et al. | 2009
- 346
-
MPSteg-Color: Data Hiding Through Redundant Basis DecompositionCancelli, G. / Barni, M. et al. | 2009
- 359
-
Temporal Derivative-Based Spectrum and Mel-Cepstrum Audio SteganalysisQingzhong Liu, / Sung, A.H. / Mengyu Qiao, et al. | 2009
- 369
-
Steganalysis of YASSBin Li, / Jiwu Huang, / Yun Qing Shi, et al. | 2009
- 383
-
Halftone Visual Cryptography Via Error DiffusionZhongmin Wang, / Arce, G.R. / Di Crescenzo, G. et al. | 2009
- 397
-
Fingerprint Verification Using Spectral Minutiae RepresentationsHaiyun Xu, / Veldhuis, R.N.J. / Bazen, A.M. / Kevenaar, T.A.M. / Akkermans, T.A.H.M. / Gokberk, B. et al. | 2009
- 410
-
Low-Complexity Iris Coding and Recognition Based on DirectionletsVelisavljevic, V. et al. | 2009
- 418
-
Fast Algorithm for Updating the Discriminant Vectors of Dual-Space LDAWenming Zheng, / Xiaoou Tang, et al. | 2009
- 428
-
A Channel Coding Approach for Human Authentication From Gait SequencesArgyropoulos, S. / Tzovaras, D. / Ioannidis, D. / Strintzis, M.G. et al. | 2009
- 441
-
Fast Haar Transform Based Feature Extraction for Face Representation and RecognitionYanwei Pang, / Xuelong Li, / Yuan Yuan, / Dacheng Tao, / Jing Pan, et al. | 2009
- 451
-
A Sensing Seat for Human AuthenticationFerro, M. / Pioggia, G. / Tognetti, A. / Carbonaro, N. / De Rossi, D. et al. | 2009
- 460
-
Digital image source coder forensics via intrinsic fingerprintsLin, W.S. / Tjoa, S.K. / Zhao, H.V. / Liu, K.J.R. et al. | 2009
- 476
-
Intrinsic Sensor Noise Features for Forensic Analysis on Scanners and Scanned ImagesHongmei Gou, / Swaminathan, A. / Min Wu, et al. | 2009
- 492
-
Channel-Based Detection of Sybil Attacks in Wireless NetworksLiang Xiao, / Greenstein, L.J. / Mandayam, N.B. / Trappe, W. et al. | 2009
- 504
-
Exploiting the Human–Machine Gap in Image Recognition for Designing CAPTCHAsDatta, R. / Jia Li, / Wang, J.Z. et al. | 2009
- 519
-
Mathematical Model for Low-Rate DoS Attacks Against Application ServersMacia-Fernandez, G. / Diaz-Verdejo, J.E. / Garcia-Teodoro, P. et al. | 2009
- 530
-
An Information-Theoretic View of Network-Aware Malware AttacksZesheng Chen, / Chuanyi Ji, et al. | 2009
- 542
-
Improvement in Intrusion Detection With Advances in Sensor FusionThomas, C. / Balakrishnan, N. et al. | 2009
- 552
-
Adversary Aware Surveillance SystemsSingh, V.K. / Kankanhalli, M.S. et al. | 2009
- 564
-
Generalization of the ZZW Embedding Construction for SteganographyWeiming Zhang, / Xin Wang, et al. | 2009
- 570
-
Performance Analysis of Fridrich–Goljan Self-Embedding Authentication MethodDominguez-Conde, G. / Comesana, P. / Perez-Gonzalez, F. et al. | 2009
- 578
-
Corrections to “A Selective Feature Information Approach for Iris Image-Quality Measure” [Sep 08 572-277]Belcher, Craig / Du, Yingzi et al. | 2009
- 579
-
IEEE Transactions on Information Forensics and Security EDICS| 2009
- 580
-
IEEE Transactions on Information Forensics and Security Information for authors| 2009
- 582
-
Special issue on distributed camera networks: sensing, processing, communication and computing| 2009
- 583
-
Special issue on signal processing in cooperative cognitive radio systems| 2009
- 584
-
Special issue on recent advances in video processing for consumer displays| 2009
- 585
-
IEEE ICIP 2010| 2009
- 586
-
IEEE THEMES| 2009
- 587
-
Call for papers ISBI 2010| 2009
- 588
-
Special issue on multimodal affective interaction| 2009
- 589
-
Special issue on Processing Reverberant Speech| 2009
- 590
-
Leading the field since 1884| 2009
- 591
-
Why we joined| 2009
- 592
-
Explore IEL IEEE's most comprehensive resource| 2009
- C1
-
Table of contents| 2009
- C2
-
IEEE Transactions on Information Forensics and Security publication information| 2009
- C3
-
IEEE Signal Processing Society Information| 2009