Open Access. Powered by Scholars. Published by Universities.®
- Keyword
-
- 3D Delaunay triangulation (1)
- Authentication (1)
- Biometrics (1)
- Cloud-based applications (1)
- Computer crime (1)
-
- Computer forensics (1)
- Delau-nay triangulations (1)
- Digital forensics (1)
- Discrimination ability (1)
- Emergency providers (1)
- Emergency situation (1)
- Feature extraction algorithms (1)
- Feature representation (1)
- Fences (1)
- Fiber optic sensors (1)
- Fibers (1)
- Fingerprint authentication (1)
- Fingerprint authentication system (1)
- Fingerprint matching (1)
- Gateways (computer networks) (1)
- Harsh environment (1)
- Identity verification (1)
- In-ground (1)
- Internet of Things (IOT) (1)
- Internet of things (1)
- Internet protocol address (1)
- Internet protocols (1)
- Intrusion Detection Systems (1)
- Intrusion detection (1)
- Matching performance (1)
Articles 1 - 4 of 4
Full-Text Articles in Engineering
Application Of 3d Delaunay Triangulation In Fingerprint Authentication System, Wencheng Yang, Ahmed Ibrahim, Junaid Chaudhry, Song Wang, Jiankun Hu, Craig Valli
Application Of 3d Delaunay Triangulation In Fingerprint Authentication System, Wencheng Yang, Ahmed Ibrahim, Junaid Chaudhry, Song Wang, Jiankun Hu, Craig Valli
Research outputs 2014 to 2021
Biometric security has found many applications in Internet of Things (IoT) security. Many mobile devices including smart phones have supplied fingerprint authentication function. However, the authentication performance in such restricted environment has been downgraded significantly. A number of methods based on Delaunay triangulation have been proposed for minutiae-based fingerprint matching, due to some favorable properties of the Delaunay triangulation under image distortion. However, all existing methods are based on 2D pattern, of which each unit, a Delaunay triangle, can only provide limited discrimination ability and could cause low matching performance. In this paper, we propose a 3D Delaunay triangulation based …
A Novel Privacy Preserving User Identification Approach For Network Traffic, Nathan Clarke, Fudong Li, Steven Furnell
A Novel Privacy Preserving User Identification Approach For Network Traffic, Nathan Clarke, Fudong Li, Steven Furnell
Research outputs 2014 to 2021
The prevalence of the Internet and cloud-based applications, alongside the technological evolution of smartphones, tablets and smartwatches, has resulted in users relying upon network connectivity more than ever before. This results in an increasingly voluminous footprint with respect to the network traffic that is created as a consequence. For network forensic examiners, this traffic represents a vital source of independent evidence in an environment where anti-forensics is increasingly challenging the validity of computer-based forensics. Performing network forensics today largely focuses upon an analysis based upon the Internet Protocol (IP) address – as this is the only characteristic available. More typically, …
Optical Fiber Sensors In Physical Intrusion Detection Systems: A Review, Gary Andrew Allwood, Graham Wild, Steven Hinkley
Optical Fiber Sensors In Physical Intrusion Detection Systems: A Review, Gary Andrew Allwood, Graham Wild, Steven Hinkley
Research outputs 2014 to 2021
Fiber optic sensors have become a mainstream sensing technology within a large array of applications due to their inherent benefits. They are now used significantly in structural health monitoring, and are an essential solution for monitoring harsh environments. Since their first development over 30 years ago, they have also found promise in security applications. This paper reviews all of the optical fiber-based techniques used in physical intrusion detection systems. It details the different approaches used for sensing, interrogation, and networking, by research groups, attempting to secure both commercial and residential premises from physical security breaches. The advantages and the disadvantages …
Performance Evaluation Of A Technology Independent Security Gateway For Next Generation Networks, Fudong Li, Nathan Clarke, Steven Furnell, Is-Mkwawa Mkwawa
Performance Evaluation Of A Technology Independent Security Gateway For Next Generation Networks, Fudong Li, Nathan Clarke, Steven Furnell, Is-Mkwawa Mkwawa
Research outputs 2014 to 2021
With the all IP based Next Generation Networks being deployed around the world, the use of real-time multimedia service applications is being extended from normal daily communications to emergency situations. However, currently different emergency providers utilise differing networks and different technologies. As such, conversations could be terminated at the setup phase or data could be transmitted in plaintext should incompatibility issues exit between terminals. To this end, a novel security gateway that can provide the necessary security support for incompatible terminals was proposed, developed and implemented to ensure the successful establishment of secure real-time multimedia conversations. A series of experiments …