Learn More
An age group classification system for gray-scale facial images is proposed in this paper. Four age groups, including babies, young adults, middle-aged adults, and old adults, are used in the classification system. The process of the system is divided into three phases: location, feature extraction, and age classification. Based on the symmetry of human(More)
Password based authentication with smart cards has been adopted as a more secure means in insecure networks to validate the legitimacy of users. Traditional authentication schemes are based on the tamper-resistant smart card; that is, the data stored in the smart card cannot be revealed. However, it is a challenging problem for considering(More)
Recently, Kim and Chung proposed a more secure remote user authentication scheme, which is an improvement over Yoon-Yoo's scheme to remedy their security flaws, such as leak of password and vulnerabilities to the masquerading user attack, the masquerading server attack, and the stolen-verifier attack. In this paper, we will show that Kim-Chung's improved(More)
Anonymity is one of the important properties of remote authentication schemes to preserve user privacy. Besides, it can avoid unauthorized entities from using the user ID and other intercepted information to forge legal login messages. In 2004, Das et al. first proposed a remote user authentication scheme with smart cards using dynamic ID to protect user(More)
In this study, both linear discriminant technique and logistic regression method are considered and compared to develop a flame feature model. Based on the comparison, the logistic regression method is chosen and plugged into a flame detection system for segmenting the fire regions. Some spurious fire-like regions are then removed by the image difference(More)
Dynamic textures are common in natural scenes. Examples of dynamic textures in video include fire, smoke, trees in the wind, clouds, sky, ocean waves etc. The fire is characterized using efficient features and detection of the same using a suitable processing. Every pixel is checked for the presence or absence of fire using color features, and periodic(More)
A complete remote authentication scheme should provide the following security properties: (1) mutual authentication, (2) session key exchange, (3) protection of user anonymity, (4) support of immediate revocation capability, (5) low communication and computation cost, (6) resistance to various kinds of attacks, (7) freely choosing and securely changing(More)
Remote user authentication is an important part in electronic commerce to identify legitimate users over the Internet. Recently, Chang et al. proposed a robust and efficient smart card based remote user authentication scheme to provide user anonymity. However, in this paper we will show that Chang et al.'s scheme fails to protect user privacy in terms of(More)