logo

Wireless Communication and Network - Desklib

   

Added on  2023-06-04

7 Pages1254 Words351 Views
 | 
 | 
 | 
Running head: WIRELESS COMMUNICATION AND NETWORK
WIRELESS COMMUNICATION AND NETWORK
Name of the Student
Name of the University
Author Note
Wireless Communication and Network - Desklib_1

2WIRELESS COMMUNICATION AND NETWORK
Table of Contents
Article 6...........................................................................................................................................3
Article 7...........................................................................................................................................3
Article 8...........................................................................................................................................3
Article 9...........................................................................................................................................4
Article 10.........................................................................................................................................4
Bibliography....................................................................................................................................6
Wireless Communication and Network - Desklib_2

3WIRELESS COMMUNICATION AND NETWORK
Article 6
Anees, A., & Chen, Y. P. P. (2018). Discriminative binary feature learning and quantization in
biometric key generation. Pattern Recognition, 77, 289-305.
Summary
The concept which is related to the biometric key generation can be considered by far
more complex technology than face recognition technology. The main problem which is seen in
the sector of the working is related to no relevant information are saved in the concept of the
database for the aspect of matching features of facial in the system of key generation. The paper
directly takes into consideration a method which has a unified framework for stable generation,
secure cryptography based on the concept of facial features.
Critique
It can be stated here that the author directly puts focus on the different security
implication which can be put in the sector of the face recognition technology. On the other
authors have stated that there are security implementations which can be involved into the
working of the concept. The main concept is the delivering of the standard of working which
includes security implications which can safeguard the system.
Article 7
Hussain, I., Anees, A., Aslam, M., Ahmed, R., & Siddiqui, N. (2018). A noise resistant
symmetric key cryptosystem based on S 8 S-boxes and chaotic maps. The European Physical
Journal Plus, 133, 1-23.
Summary
Wireless Communication and Network - Desklib_3

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents