Guidelines for Appropriate Use of Simulated Data for Bio-Authentication Research.
Yan MaMichael E. SchuckersBojan CukicPublished in: AutoID (2005)
Keyphrases
- biometric authentication
- user authentication
- clinical guidelines
- authentication scheme
- image authentication
- identity authentication
- authentication protocol
- security mechanisms
- security analysis
- digital watermarking
- molecular structures
- real time
- keystroke dynamics
- identity management
- design patterns
- face recognition
- genetic algorithm
- data mining