Authentication of paprika using HPLC-UV fingerprints

نویسندگان
چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Identity Authentication Using Fingerprints

We describe the design and implementation of an automatic identity authentication system which uses fingerprint to establish the identity of an individual. An improved minutia extraction algorithm that is much faster and more accurate than our earlier algorithm [12] has been implemented. An alignment-based elastic matching algorithm has been developed. This algorithm is capable of finding the c...

متن کامل

automatic verification of authentication protocols using genetic programming

implicit and unobserved errors and vulnerabilities issues usually arise in cryptographic protocols and especially in authentication protocols. this may enable an attacker to make serious damages to the desired system, such as having the access to or changing secret documents, interfering in bank transactions, having access to users’ accounts, or may be having the control all over the syste...

15 صفحه اول

An Identity-Authentication System Using Fingerprints

Fingerprint verification is an important biometric technique for personal identification. In this paper, we describe the design and implementation of a prototype automatic identity-authentication system that uses fingerprints to authenticate the identity of an individual. We have developed an improved minutiae-extraction algorithm that is faster and more accurate than our earlier algorithm [58]...

متن کامل

Vitality detection in personal authentication systems using fingerprints

Concluding remarks 102 iii Bibliography 105 iv Introduction Fingerprints have always been an identification mean due to their some important properties: universality (everyone have one), permanence in the time (they do not change when the time passes), individuality (there are no two identical fingerprints). From the first forensic applications to the last biometric technology applied to access...

متن کامل

Data - Dependent Fingerprints for Wireless Device Authentication

Number of Papers published in peer-reviewed journals: Number of Papers published in non peer-reviewed journals: Data-Dependent Fingerprints for Wireless Device Authentication Report Title While authenticating wireless radios based on the unique imperfections in their transmitted waveform has become a topic of some interest, such fingerprinting techniques are vulnerable to an attacker who can li...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: LWT

سال: 2020

ISSN: 0023-6438

DOI: 10.1016/j.lwt.2020.109153