2006

Biometrics, Computer Security Systems and Artificial Intelligence Applications

Editors:

ISBN: 978-0-387-36232-8 (Print) 978-0-387-36503-9 (Online)

Table of contents (31 chapters)

previous Page of 2
  1. Front Matter

    Pages i-xi

  2. Image Analysis and Biometrics

    1. Front Matter

      Pages 1-1

    2. No Access

      Book Chapter

      Pages 3-12

      Image Filtration and Feature Extraction for Face Recognition

    3. No Access

      Book Chapter

      Pages 13-22

      Visualization of Some Multi-Class Erosion Data Using GDA and Supervised SOM

    4. No Access

      Book Chapter

      Pages 23-29

      Wavelet Transform in Face Recognition

    5. No Access

      Book Chapter

      Pages 31-44

      Content-Based Image Retrieval — A Survey

    6. No Access

      Book Chapter

      Pages 45-55

      Method of Speech Recognition and Speaker Identification using Audio-Visual of Polish Speech and Hidden Markov Models

    7. No Access

      Book Chapter

      Pages 57-67

      Synthesis of Codebooks with Perceptually Monitored Structure for Multiband CELP-Coders

    8. No Access

      Book Chapter

      Pages 69-78

      The Color Information as a Feature for Postage Stamps Recognition

    9. No Access

      Book Chapter

      Pages 79-88

      Iris Shape Evaluation in Face Image with Simple Background

    10. No Access

      Book Chapter

      Pages 89-98

      Experimental Algorithm for Characteristic Points Evaluation in Static Images of Signatures

  3. Computer Security Systems

    1. Front Matter

      Pages 99-99

    2. No Access

      Book Chapter

      Pages 101-110

      Parallelization of Standard Modes of Operation for Symmetric Key Block Ciphers

    3. No Access

      Book Chapter

      Pages 111-120

      On Differential and Linear Approximation of S-box Functions

    4. No Access

      Book Chapter

      Pages 121-135

      Random Generation of S-Boxes for Block Ciphers

    5. No Access

      Book Chapter

      Pages 137-154

      Problems of Sending Sensitive Information

    6. No Access

      Book Chapter

      Pages 155-164

      Hash Chaining for Authenticated Data Structures Freshness Checking

    7. No Access

      Book Chapter

      Pages 165-173

      Stream Cipher Keys Generation with Low Power Consumption Based on LFSR

    8. No Access

      Book Chapter

      Pages 175-182

      The Quality of Obfuscation and Obfuscation Techniques

  4. Artificial Intelligence and Applications

    1. Front Matter

      Pages 183-183

    2. No Access

      Book Chapter

      Pages 185-195

      Capability and Functionings: A Fuzzy Way to Measure Interaction between Father and Child

    3. No Access

      Book Chapter

      Pages 197-206

      Remarks on Computer Simulations

    4. No Access

      Book Chapter

      Pages 207-216

      Analysis of E-learning System Dynamics

    5. No Access

      Book Chapter

      Pages 217-226

      Can a Negative Selection Detect an Extremely few Non-self among Enormous Amount of Self Cells?

previous Page of 2