In-region authentication
MR Akand, R Safavi-Naini - International Conference on Applied …, 2018 - Springer
… authentication system that is called in-Region Authentication … closely related problem of
in-region location verification where the … secured authentication of the user or quantifying error. …
in-region location verification where the … secured authentication of the user or quantifying error. …
RSNet: Region-specific network for contactless palm vein authentication
… We suggest that dividing the rich finegrained vein structure in region M (depicted in Fig. 2(a))
is more beneficial for local feature extraction. While considering the three regions T, C, and …
is more beneficial for local feature extraction. While considering the three regions T, C, and …
Multiple watermarking of medical images for content authentication and recovery
NA Memon, SAM Gilani… - 2009 IEEE 13th …, 2009 - ieeexplore.ieee.org
… embeds robust watermark in region of non interest (RONI) for achieving security and
confidentiality. While integrity control is achieved by inserting fragile watermark in region of interest …
confidentiality. While integrity control is achieved by inserting fragile watermark in region of interest …
A passive image authentication scheme for detecting region-duplication forgery with rotation
… one using the same method at the authentication end. Through comparison, the authenticity
… The passive authentication, also called digital forensic, is the method to make authentication …
… The passive authentication, also called digital forensic, is the method to make authentication …
Food authentication by PCR-based methods
I Mafra, IM Ferreira, MBPP Oliveira - European Food Research and …, 2008 - Springer
… , such as canning, the only possibility to authenticate the food product is by the use of a …
some related species of genus Clupeomorpha in region of cytochrome b gene, developed a …
some related species of genus Clupeomorpha in region of cytochrome b gene, developed a …
Fourier transform infrared spectroscopy (FTIR) technique for food analysis and authentication
A Ahmad, H Ayub - Nondestructive quality assessment techniques for fresh …, 2022 - Springer
… Authentication of different food products like honey, milk, oil, and tea is carried out … region
of 2500–4000 cm −1 , double bonds in region 1500–2000 cm −1 , and triple bonds in the …
of 2500–4000 cm −1 , double bonds in region 1500–2000 cm −1 , and triple bonds in the …
Conceptualising authentication of ruralness
S Frisvoll - Annals of tourism research, 2013 - Elsevier
… framework, uncovering, among other aspects, the political nature of authentication and the
role of rural tourism consumption in authenticating the ‘rural idyll’ as the ‘authentic’ ruralness. …
role of rural tourism consumption in authenticating the ‘rural idyll’ as the ‘authentic’ ruralness. …
Application of vibrational spectroscopy for classification, authentication and quality analysis of mushroom: A concise review
… This review is focused on various studies related to the application of vibrational spectroscopy
for classification, authentication and quality analysis of mushrooms. It was concluded that …
for classification, authentication and quality analysis of mushrooms. It was concluded that …
Watermarking of medical images for content authentication and copyright protection
NA Memon - 2010 - repository.pastic.gov.pk
… authentication using robust and fragile watermarking respectively. In the first part of this
dissertation, we design a fragile watermarking system for the exact authentication … only in region …
dissertation, we design a fragile watermarking system for the exact authentication … only in region …
Non-expanded visual cryptography scheme with authentication
YJ Huang, JD Chang - 2013 International Symposium on Next …, 2013 - ieeexplore.ieee.org
… authentication technology for the original image was proposed in previous studies. Fang
and Lin's scheme [3] combine the principle of traditional visual cryptography with authentication …
and Lin's scheme [3] combine the principle of traditional visual cryptography with authentication …