Login / Signup
Collusion of fingerprints via the gradient attack.
Darko Kirovski
Published in:
ISIT (2005)
Keyphrases
</>
edge detection
countermeasures
gradient direction
malicious users
fingerprint verification
image gradient
block cipher
attack graph
attack detection
malicious attacks
denial of service attacks
orientation histogram
detection mechanism
genetic algorithm
secret key
color images
recommender systems
image processing