Algebraic Attacks on Human Identification Protocols.
Hassan Jameel AsgharRon SteinfeldShujun LiDali KaafarJosef PieprzykPublished in: IACR Cryptol. ePrint Arch. (2014)
Keyphrases
- human identification
- security protocols
- cryptographic protocols
- gait recognition
- facial asymmetry
- pattern classification
- feature analysis
- human recognition
- feature extraction
- gait analysis
- recognition algorithm
- human gait
- biometric systems
- face recognition
- gait patterns
- expression classification
- dimensionality reduction
- image processing
- machine learning
- spatio temporal