2018 IEEE 9th International Conference on Dependable Systems, Services and Technologies (DESSERT) 2018
DOI: 10.1109/dessert.2018.8409153
|View full text |Cite
|
Sign up to set email alerts
|

Network steganography application for remote biometrie user authentication

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
1
0
1

Year Published

2019
2019
2022
2022

Publication Types

Select...
2
2
1

Relationship

1
4

Authors

Journals

citations
Cited by 5 publications
(2 citation statements)
references
References 9 publications
0
1
0
1
Order By: Relevance
“…When using authentication based on iris biometric template as the fabric used «trabecular meshwork», which makes visible to divide the iris radial sectors. The recognition process on the iris of the eye combines several stages: the eye image processing, filtering, iris code generation [5].…”
Section: Fig1 сOmparison Of Biometric Authentication Methods Based Omentioning
confidence: 99%
“…When using authentication based on iris biometric template as the fabric used «trabecular meshwork», which makes visible to divide the iris radial sectors. The recognition process on the iris of the eye combines several stages: the eye image processing, filtering, iris code generation [5].…”
Section: Fig1 сOmparison Of Biometric Authentication Methods Based Omentioning
confidence: 99%
“…Як показано у праці [11], для задач мережевої автентифікації найкращі показники забезпечують такі методи мережевої стеганографії: HICCUPS (0,21); TranSteg, LACK (0,18); RSTEG (0,15) та SCTP (0,12), де в дужках наведено значення векторів пріоритету.…”
Section: застосування методів стеганографії для підвищення захищеност...unclassified