Essays about: "fingerprint combination"

Showing result 1 - 5 of 9 essays containing the words fingerprint combination.

  1. 1. Towards Realistic Datasets forClassification of VPN Traffic : The Effects of Background Noise on Website Fingerprinting Attacks

    University essay from Karlstads universitet/Institutionen för matematik och datavetenskap (from 2013)

    Author : Christoffer Sandquist; Jon-Erik Ersson; [2023]
    Keywords : Data collection; Website fingerprinting; dataset; traffic analysis; VPN; encrypted traffic; machine learning; deep learning; network measurements; twitch; Datainsamling; Profilering av hemsidor; dataset; trafikanalys; VPN; krypterad trafik; maskininlärning; djupinlärning; nätverksmätningar; twitch;

    Abstract : Virtual Private Networks (VPNs) is a booming business with significant margins once a solid user base has been established and big VPN providers are putting considerable amounts of money into marketing. However, there exists Website Fingerprinting (WF) attacks that are able to correctly predict which website a user is visiting based on web traffic even though it is going through a VPN tunnel. READ MORE

  2. 2. Polar Codes for Biometric Identification Systems

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Yicheng Bao; [2022]
    Keywords : Biometrics; Polar codes; Identification systems; Convolutional neural networks; Autoencoder; Privacy preservation; Biometri; Polära koder; Identifieringssystem; Konvolutionella neurala nätverk; Autoencoder; Sekretessskydd;

    Abstract : Biometrics are widely used in identification systems, such as face, fingerprint, iris, etc. Polar code is the only code that can be strictly proved to achieve channel capacity, and it has been proved to be optimal for channel and source coding. READ MORE

  3. 3. Object Based Image Retrieval Using Feature Maps of a YOLOv5 Network

    University essay from KTH/Matematisk statistik

    Author : Hugo Essinger; Alexander Kivelä; [2022]
    Keywords : Content based image retrieval; CBIR; Object based image retrieval; OBIR; image retrieval; YOLO; YOLOv5; object detection; PyTorch; deep learning; convolutional neural network; CNN; Content based image retrieval; CBIR; Object based image retrieval; OBIR; image retrieval; YOLO; YOLOv5; object detection; PyTorch; deep learning; convolutional neural network; CNN;

    Abstract : As Machine Learning (ML) methods have gained traction in recent years, someproblems regarding the construction of such methods have arisen. One such problem isthe collection and labeling of data sets. Specifically when it comes to many applicationsof Computer Vision (CV), one needs a set of images, labeled as either being of someclass or not. READ MORE

  4. 4. Speaker Recognition using Biology-Inspired Feature Extraction

    University essay from Lunds universitet/Institutionen för elektro- och informationsteknik

    Author : Edvin Andersson; [2021]
    Keywords : Artificial Intelligence; AI; Machine Learning; Speaker Recognition; Technology and Engineering;

    Abstract : Distinguishing between people's voices is something the human brain does naturally, using only frequencies picked up by the inner ear. The field of speaker recognition is concerned with making machines do the same thing using digitally sampled speech and data processing. READ MORE

  5. 5. Login hardening with Multi-factor Authentication

    University essay from Lunds universitet/Institutionen för elektro- och informationsteknik

    Author : Michaela Bergman; [2021]
    Keywords : multi-factor authentication; authentication; security; usability; cost; biometrics; biometric authentication; openid connect; oauth 2.0; PKCE; account recovery; security threats; authentication factors; Technology and Engineering;

    Abstract : The aim with this Master’s Thesis work was to conduct research about different available authenticators, as well as implementing a multi-factor authenticator into the currently used login-application. The research included biometric authentication technologies, and investigation of how to implement these to create a highly secure and customizable multi-factor authentication for My Axis-accounts for Axis Communications in Lund. READ MORE