The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Juels and Sudan proposed in 2002 an algorithm for computing a fuzzy vault that binds a user's biometric template with his secret. It was suggested that this vault could be used to securely store one's secret or a cryptographic key without losing his biometric information. However, in this classical fuzzy vault, if an attacker captures multiple vaults generated from one biometric template, he is able...
With the development of science and the improvement of social information, Biological Recognition Technology (BIT) is becoming increasingly important. Among them, the fingerprint identification technology has become the hot spot because of its feasibility and reliability. The traditional fingerprint identification method relies on matching feature points to get the similarity. Undoubtedly, this method...
Considered actions of Virtual battlefield individual with the intelligence and autonomy characteristic, internal factors that influence personnel external behavior were broken down into mate-Agents with considering behavior functions, and a battlefield individual behavioral model was advanced by aggregating mate-Agents. Mate-Agent structure was accomplished by intelligent model based on its main features,...
Under the background of formation cooperative antiship combat, theory of MAS (Multi-agent System) was introduced into the decision-making process, the general commander, formation commander as well as each operational platform were described as agents, the formation cooperative anti-ship combat agent model was established, then after the analysis of anti-ship combat mission planning process, framework...
An effective blind detection for four kinds of echo hiding based on three cepstrums is proposed. Due to statistic characteristic changing with echo in stego speech, real cepstrum, complex cepstrum and power cepstrum are analyzed. Firstly we calculate high order statistics of each cepstrum, including coefficients of skewness and kurtosis in combination. Then we train the combinatorial skewness and...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.