


default search action
ISBAST 2012: Taipei, Taiwan
- 2012 International Symposium on Biometrics and Security Technologies, ISBAST 2012, Taipei, Taiwan, March 26-29, 2012. IEEE Computer Society 2012, ISBN 978-1-4673-0917-2

- Kuo-Feng Hwang, Cian-Cih Huang, Geeng-Neng You:

A Spelling Based CAPTCHA System by Using Click. 1-8 - Chien-Cheng Lin, Chin-Chun Chang, Deron Liang:

A New Non-intrusive Authentication Approach for Data Protection Based on Mouse Dynamics. 9-14 - Tsozen Yeh, Weian Cheng:

Improving Fault Tolerance through Crash Recovery. 15-22 - Rongfeng Li, Darun Tang, Beining Huang, Wenxin Li:

How Many Samples Does Convincible Performance Evaluation of a Biometric System Need? 23-26 - Madhavi Gudavalli, S. Viswanadha Raju, A. Vinaya Babu, D. Srinivasa Kumar:

Multimodal Biometrics - Sources, Architecture and Fusion Techniques: An Overview. 27-34 - Hao Ni, Dongju Li, Tsuyoshi Isshiki, Hiroaki Kunieda:

Robust Multiple Minutiae Partitions for Fingerprint Authentication. 35-44 - Liang-Hwa Chen, Po-Lun Chang, Yen-Ching Chang, Chiou-Yng Lee

:
A Scalable Architecture for Dual Basis GF(2m) Multiplications. 45-50 - Baohua Yuan, Honggen Cao, Jiuliang Chu:

Combining Local Binary Pattern and Local Phase Quantization for Face Recognition. 51-53 - Jia-Lun Tsai, Nai-Wei Lo, Tzong-Chen Wu:

Efficient Convertible Multi-authenticated Encryption Scheme for Group Communications. 54-58 - Chih-Tung Lin, Shi-Jinn Horng, Yao-Lin Huang:

Hardware Resource Manager for Reconfiguration System. 59-65 - Yao-Lin Huang, Shi-Jinn Horng, Tzong-Wann Kao, I-Hong Kuo, Takao Terano:

A Hybrid Forecasting Model Based on Adaptive Fuzzy Time Series and Particle Swarm Optimization. 66-70 - Shiang-Feng Tzeng, Shi-Jinn Horng:

Enhancement of Generalized Ring Signatures with Convertibility. 71-76 - Mohamed Hamdy Eldefrawy, Khaled Alghathbar, Muhammad Khurram Khan

:
Hardcopy Document Authentication Based on Public Key Encryption and 2D Barcodes. 77-81 - Rong-Jian Chen, Shi-Jinn Horng:

Multi-bit Adaptive Embedding Algorithm for Anti-forensic Steganography. 82-89 - Hsiang-Chuan Liu, Hsien-Chang Tsai, Yu-Ting Cheng

, Yen-Kuei Yu:
An Integrated Algorithm of Liu's Generalized Lambda-Measure Based Choquet Integral and Hurst Exponent. 90-95 - Darun Tang, Beining Huang, Wenxin Li, Xiaoming Li:

A Method of Evolving Finger Vein Template. 96-101 - Yu-Chen Shu, Wen-Liang Hwang, Dean Chou:

Message Passing Using the Cover Text as Secret Key. 102-107 - Han-Yu Lin, Chien-Ming Chen, Yu-Lun Cheng, Ya-Hui Chang, Tun-Wen Pai:

Construction of a Taiwan Biodiversity Genetic Database in Cloud Environments. 108-112 - Yuan-Liang Tang, Chia-Jung Yang:

Print-and-Scan Resilient Watermarking Based on Modulating the Averages of DCT Coefficients. 113-117 - Ming-Chang Huang:

Introduction to Two P2P Network Based Reputation Systems. 118-125 - Rudolf B. Blazek, Wei-Tyng Hong:

Robust Hierarchical Linear Model Comparison for End-of-Utterance Detection under Noisy Environments. 126-133 - Hung-Chuan Lai, Shi-Jinn Horng, Pingzhi Fan, Xian Wang, Yi Pan

:
An Efficient Run Time Control Flow Errors Detection by DCT Technique. 134-150

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














