2006
DOI: 10.1007/11738695_27
|View full text |Cite
|
Sign up to set email alerts
|

User Authentication Based on JPEG2000 Images

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2009
2009
2009
2009

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(2 citation statements)
references
References 5 publications
0
2
0
Order By: Relevance
“…Moreover, the use of evolutionary algorithms are almost non-present for this purpose. Some of the relevant work on user authentication system has been reported in [3], [9] and [8]. However only [10] has done some preliminary work using GA. To the best of our knowledge no previous study has used any of the genetic algorithms for user authentication on smart phones.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Moreover, the use of evolutionary algorithms are almost non-present for this purpose. Some of the relevant work on user authentication system has been reported in [3], [9] and [8]. However only [10] has done some preliminary work using GA. To the best of our knowledge no previous study has used any of the genetic algorithms for user authentication on smart phones.…”
Section: Related Workmentioning
confidence: 99%
“…We set four objectives for our UGuard identification system: (1) correctly identify an imposter and the legitimate user, (2) user's identification within 8 calls, (3) if an imposter is detected, block the mobile phone to ensure information security, and (4) the system should be simple and efficient to facilitate its deployment on smart phones.…”
Section: Introductionmentioning
confidence: 99%