Login / Signup
Distortion-bounded authentication techniques.
Nasir D. Memon
Poorvi L. Vora
Boon-Lock Yeo
Minerva M. Yeung
Published in:
Security and Watermarking of Multimedia Contents (2000)
Keyphrases
</>
biometric authentication
fragile watermarking scheme
identity authentication
data sets
vector quantizer
geometric distortions
error propagation
image authentication
lightweight
quantization error
continuous functions
biometric data
identity management