Learn More
Signature verification and Identification has great importance in authentication systems. Persian signatures are different from other signature types because people usually do not use text in it and they draw a shape as their signature. In this paper, a method for off-line Persian signature identification and verification is proposed that is based on DWT(More)
— Signature verification and Identification has great importance for authentication purpose. Persian signatures are different from other signature types because people usually do not use text in it and they draw a shape as their signature, therefore, a different approach should be considered to process such signatures. In this paper, a method for off-line(More)
The signature verification system is always the most sought after biometric verification system. Being a behavioral biometric trait which can be imitated, the researcher faces a challenge in designing such a system to counter intrapersonal and interpersonal variations. This papers presents DWT based Off-line Signature Verification using Angular Features(More)
In this paper a novel steganography technique based on the combination of a secret sharing method and wavelet transform is presented. In this method, a secret image is shared into some shares. Then, the shares and Fletcher- 16 checksum of shares are hidden into cover images using an integer wavelet based steganography technique. In the decoding part, the(More)
This paper presents a novel diagnosis and logic debugging method for gate-level arithmetic circuits. It detects logic bugs in a synthesized circuit caused by using a wrong gate ("gate replacement" error), which change the functionality of the circuit. The method is based on modeling the circuit in an algebraic domain and computing its algebraic "signature".(More)
Over the last decade, hardware Trojans have gained increasing attention in academia, industry and by government agencies. In order to design reliable countermeasures, it is crucial to understand how hardware Trojans can be built in practice. This is an area that has received relatively scant treatment in the literature. In this contribution, we examine how(More)