Academic literature on the topic 'Identification and Authentication Techniques'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Identification and Authentication Techniques.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Identification and Authentication Techniques"

1

Warda Hassan and Nosheen Sabahat. "Towards Secure Identification: A Comparative Analysis of Biometric Authentication Techniques." VFAST Transactions on Software Engineering 12, no. 1 (March 31, 2024): 105–20. http://dx.doi.org/10.21015/vtse.v12i1.1745.

Full text
Abstract:
This paper provides an overview and analysis of existing biometric authentication methods. Biometric authentication enhances the security of traditional authentication methods by utilizing unique biological characteristics of individuals, such as fingerprints, facial features, or iris patterns, to verify identity. However, implementing biometric authentication may involve initial setup costs for service providers due to the need for specialized hardware and software. Additionally, users may experience some initial inconvenience during the enrollment process to register their biometric data. This paper presents a comparative analysis of the usability of biometric authentication techniques. Initially, a survey of existing work is conducted by comparing techniques, algorithms, and metrics used in research. Later the challenges of the distinct types of authentication techniques are discussed, and their problems are discovered. Subsequently, the findings of a quantitative study based on a are presented, aimed at assessing the usability of those techniques. The findings indicate that authentic biometric techniques are perceived as usable.
APA, Harvard, Vancouver, ISO, and other styles
2

Dara, Suresh, Sri Kavya, A. Naga Varalakshmi Devi, B. Krishna Priya, R. Indira Priyadarsini, and I, Triveni. "An Improved Quality Enhancement Fingerprint Analysis." International Journal of Innovative Research in Computer Science and Technology 11, no. 3 (May 2023): 110–13. http://dx.doi.org/10.55524/ijircst.2023.11.3.22.

Full text
Abstract:
The use of fingerprint authentication as a biometric technique for secure authentication and access control has gained significant traction in recent years. This article presents an overview of the technology used for fingerprint identification, its history, as well as the fundamental components that make up a fingerprint recognition system. We also go through the many approaches to fingerprint identification techniques and algorithms, such as the minutiae-based approach, the ridge feature-based approach, and the pattern recognition-based approach. All of these are utilized in the process of authenticating fingerprints. In addition, we emphasize the limitations of fingerprint authentication as well as the security risks that are linked with it, as well as alternative methods to overcome these constraints.
APA, Harvard, Vancouver, ISO, and other styles
3

Sureshbabu, P., and M. Sakthivadivu. "A Review on Biometrics Authentication System Using Fingerprint." Asian Journal of Computer Science and Technology 8, S1 (February 5, 2019): 4–6. http://dx.doi.org/10.51983/ajcst-2019.8.s1.2016.

Full text
Abstract:
Technology based on Biometric identification and verification is one leading research area. It deals with the concept analyzing the human body characteristics through Biometric devices for various authentications process. There are many Biometric authentication systems are available for verification process. This paper discusses the role of Fingerprint authentication. FP recognition is highly used biometric technique, because of abundance sources (i.e. ten fingers) availability for collecting data. Discussion on Fingerprint matching techniques, recognition methods and their performance analysis are made in the paper.
APA, Harvard, Vancouver, ISO, and other styles
4

B S, Shruthi, and Manasa K B. "USER AUTHENTICATION USING EYE-BLINK PASSWORD." International Journal of Computer Science and Mobile Computing 12, no. 4 (April 30, 2023): 42–46. http://dx.doi.org/10.47760/ijcsmc.2023.v12i04.004.

Full text
Abstract:
Personal identification numbers (PINS) are used to authenticate a user for security purpose. In order to authenticate himself the user should physically input the PIN, which might be susceptible to password cracking via shoulder surfing or thermal tracking. Authenticating a PIN with hands-off eye blinks PIN entry techniques, on the opposite hand, offers a safer password entry option by not leaving any physical footprints behind. User authentication using eye-blink password refers to finding the attention blinks in sequential image frames, and generation of PIN. This paper presents an application with three layer authentication system that are face detection, PIN entry by eye blink and OTP (One Time Password) to avoid thermal tracking attacks and shoulder surfing.
APA, Harvard, Vancouver, ISO, and other styles
5

Joshi, V. C., and I. A. Khan. "MICROSCOPY TECHNIQUES FOR THE IDENTIFICATION AND AUTHENTICATION OF BOTANICALS." Acta Horticulturae, no. 720 (October 2006): 73–80. http://dx.doi.org/10.17660/actahortic.2006.720.7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Dan, Man Kan, and Dr T. Meyappan. "WATERMARKING TECHNIQUES." INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 2, no. 3 (June 30, 2012): 122–24. http://dx.doi.org/10.24297/ijct.v2i3c.2709.

Full text
Abstract:
Embedding a hidden stream of bits in a file is called Digital watermarking. The file could be an image, audio, video or text. Nowadays, a digital watermarking has many applications such as broadcast monitoring, owner identification, proof of ownership, transaction tracking, content authentication, copy control, device control and file reconstruction. It is intended to complement cryptographic processes. It is a visible or preferably invisible, identification code that is permanently embedded in the data and remains present within the data after any decryption process. The focus of this paper will detail digital watermarking for multimedia applications and covered by definition of digital watermarking, purpose, techniques and types of watermarking attacks briefly discussed.
APA, Harvard, Vancouver, ISO, and other styles
7

Divya, C. D., and Dr A. B. Rajendra. "An investigation of IRIS Recognition Techniques: A Literature Survey." Applied and Computational Engineering 2, no. 1 (March 22, 2023): 663–69. http://dx.doi.org/10.54254/2755-2721/2/20220642.

Full text
Abstract:
Iris is a colored muscle located within the eye that helps to regulate the amount of light that reaches the eye. It has some specific textural details that is not easily altered or manipulated, making it a characteristic that is ideally suited to biometric systems. Iris has been considered in the field of biometric applications for authentication purpose. The main purpose of this study is, due to the stability and unique feature available in Iris region. Iris patterns play a major role in many possible identification or authentication applications due to their uniqueness, durability and stability, universality. Iris recognition techniques have evolved tremendously in biometric identification and authentication systems over the past two decades, since their evolution. The technique of Iris recognition is quantifiable, robust, and highly accurate so that it achieves the fundamental tenant of ideal biometric technology. Purpose of this paper is to include a timeline analysis of different iris recognition techniques and the development of a novel algorithm for the iris recognition system. This paper also discusses various methods used in performing the iris recognition measures involved.
APA, Harvard, Vancouver, ISO, and other styles
8

Yaseen Khudhur, Doaa, Belal Al-Khateeb, and Hadeel Amjed Saeed. "Secure login technique for online banking." International Journal of Engineering & Technology 7, no. 4 (April 3, 2019): 5434–37. http://dx.doi.org/10.14419/ijet.v7i4.23802.

Full text
Abstract:
In recent years, there are many authentication protocols that are used in the accessing of the sensitive and private data. However most of those methods have many weaknesses by which data can be extracted and used by unauthorized people this due to the use of a one level authentication that may face many attacks. This paper presents an authentication method that involves three levels of user authentication; the first two levels use two level passwords authentication together with a Personal Identification Number (third level) for every operation in Electronic Banking system. Hash functions -Secure Hash Algorithms- and Cyclic Redundancy check (32) for the generations of Personal Identification Number are used. This system eliminates the problem that is related with single level password authentication system and improves the security by using Personal Identification Number.Â
APA, Harvard, Vancouver, ISO, and other styles
9

Singh, Preet Amol, Neha Bajwa, Subh Naman, and Ashish Baldi. "A Review on Robust Computational Approaches Based Identification and Authentication of Herbal Raw Drugs." Letters in Drug Design & Discovery 17, no. 9 (September 11, 2020): 1066–83. http://dx.doi.org/10.2174/1570180817666200304125520.

Full text
Abstract:
Background: Over the last decade, there has been a sudden rise in the demand for herbal as well as Information and Technology (IT) industry around the world. Identification of plant species has become useful and relevant to all the members of the society including farmers, traders, hikers, etc. Conventional authentication techniques such as morphological characterization, histological methods, and optical microscopy require multiple skills which are tedious, timeconsuming and difficult to learn for non-experts. This creates a hurdle for individuals interested in acquiring knowledge of species. Relying on rapid, economical and computerized approaches to identify and authenticate medicinal plants has become a recent development. Objective: The purpose of this review is to summarize artificial intelligence-based technologies for wider dissemination of common plant-based knowledge such as identification and authentication to common people earlier limited to only experts. Methods: A robust plant identification design enabling automated plant-organ and feature-based identification utilizing pattern recognition and image processing techniques resulting in image retrieval and recognition has been highlighted in this review for all the concerned stakeholders. Attempts have been made to compare conventional authentication methods with advanced computerized techniques to emphasize the advantages and future applications of an automated identification system in countering adulteration and providing fair trade opportunities to farmers. Results: Major findings suggested that microscopical features such as shape and size of calcium oxalate crystals, trichomes, scleriods, stone cells, fibers, etc. are the essential descriptors for identification and authentication of herbal raw drugs using computational approaches. Conclusion: This computational design can be successfully employed to address quality issues of medicinal plants. Therefore, computational techniques proved as a milestone in the growth of agriculture and medicinal plant industries.
APA, Harvard, Vancouver, ISO, and other styles
10

Gupta, Myra. "Biometric Authentication using Gait Recognition." Universal Research Reports 10, no. 4 (2023): 1–9. http://dx.doi.org/10.36676/urr.2023-v10i4-001.

Full text
Abstract:
The necessity for trustworthy and secure means of user identification has become critical in a society that is becoming more and more digital. The widespread use of biometric authentication has emerged as a possible answer to the hacker-proneness of conventional authentication techniques like passwords and PINs. Biometric authentication uses a person's distinctive physiological and behavioral traits to confirm their identity. "Biometric Authentication using Gait Recognition" is one such new and creative strategy.
APA, Harvard, Vancouver, ISO, and other styles

Dissertations / Theses on the topic "Identification and Authentication Techniques"

1

Bhamra, Sukvinder. "Investigating the use and identity of traditional herbal remedies amongst South Asian communities using surveys and biomolecular techniques." Thesis, De Montfort University, 2016. http://hdl.handle.net/2086/12392.

Full text
Abstract:
Herbal medicines (HMs) have been used to supplement, maintain, and treat health conditions, and have inspired the development of many Western pharmaceuticals. Migrant South Asian (SA) communities in the UK have brought with them their own traditional forms of medicine, yet little is known about their current use of HMs in the UK. Consuming HMs alongside conventional Western medicines could affect pharmacological treatment and lead to herb-drug interactions; hence, healthcare professionals (HCPs) should be aware of their patients’ use of HMs. The import of HMs to the UK raises concerns over the quality, safety and regulation of HMs. Deoxyribonucleic acid (DNA) barcoding can be used to discriminate between different species, and identify contaminants and adulterants, thus can be used for the authentication of HMs. The South Asian Traditional Medicines (SATMED) questionnaire explored the knowledge and use of HMs by diasporic SA communities in the UK. It uncovered a vast range of HMs which were used by participants, where ingredients were sourced from, the concurrent use of herbal and Western medicines, and how minor ailments were treated. An online survey designed to investigate UK based practitioners’ views of HMs revealed that HCPs claimed to lack sufficient knowledge of HMs. HCPs said they needed more training on HMs to help them make better informed decisions. Tulsi (Ocimum tenuiflorum L.) was identified as a culturally and commercially valuable plant, which was used for molecular analysis. A variety of tulsi samples were collected for authentication: community samples from SA families in the UK, commercial samples, and referenced specimens. Both ITS and trnH-psbA regions were successfully used to distinguish between several Ocimum species, and identify a potential species substitution. This research represents the first time that DNA based methods have been used to authenticate medicinal plants species used by migrant SA communities living in the UK. The results of this multi-disciplinary study provide a unique contribution to the evolving discipline of ethnopharmacology.
APA, Harvard, Vancouver, ISO, and other styles
2

Brandão, Luís T. A. N. "The Forge-and-Lose Technique and Other Contributions to Secure Two-Party Computation with Commitments." Research Showcase @ CMU, 2017. http://repository.cmu.edu/dissertations/1001.

Full text
Abstract:
This doctoral dissertation presents contributions advancing the state-of-the-art of secure two-party computation (S2PC) — a cryptographic primitive that allows two mutually distrustful parties, with respective private inputs, to evaluate a function of their combined input, while ensuring privacy of inputs and outputs and integrity of the computation, externally indistinguishable from an interaction mediated by a trusted party. The dissertation shows that S2PC can be made more practical by means of innovative cryptographic techniques, namely by engineered use of commitment schemes with special properties, enabling more efficient protocols, with provable security and applicable to make systems more dependable. This is one further step toward establishing S2PC as a practical tool for privacy-preserving applications. The main technical contribution is a new protocol for S2PC of Boolean circuits, based on an innovative technique called forge-and-lose.1 Building on top of a traditional cut-and-choose of garbled circuits (cryptographic versions of Boolean circuits), the protocol improves efficiency by reducing by a factor of approximately 3 the needed number of garbled circuits. This significantly reduces a major communication component of S2PC with malicious parties, for circuits of practical size. The protocol achieves simulatable S2PC-with-commitments, producing random commitments of the circuit input and output bits of both parties. The commitments also enable direct linkage of several S2PCs in a malicious adversarial setting. As second result, the dissertation describes an improvement to the efficiency of one of the needed sub-protocols: simulatable two-party coin-flipping.1 The sub-protocol is based on a new universally composable commitment scheme that for bit-strings of increasing size can achieve an asymptotic communication-complexity rate arbitrarily close to 1. The dissertation then discusses how S2PC-with-commitments can enable in brokered identification systems a difficult-to-achieve privacy property — a kind of unlinkability.1 This mitigates a vector of potential mass surveillance by an online central entity (a hub), which is otherwise empowered in systems being developed at nation scale for authentication of citizens. When the hub mediates between identity providers and service providers the authentication of users, an adequate S2PC (e.g., of a block-cipher) can prevent the hub from learning user pseudonyms that would allow linking transactions of the same user across different services providers. 1 Parts of these contributions were previously presented at ASIACRYPT 2013, PETS 2015 and PKC 2016.
APA, Harvard, Vancouver, ISO, and other styles
3

Ge, He. "Flexible Digital Authentication Techniques." Thesis, University of North Texas, 2006. https://digital.library.unt.edu/ark:/67531/metadc5277/.

Full text
Abstract:
Abstract This dissertation investigates authentication techniques in some emerging areas. Specifically, authentication schemes have been proposed that are well-suited for embedded systems, and privacy-respecting pay Web sites. With embedded systems, a person could own several devices which are capable of communication and interaction, but these devices use embedded processors whose computational capabilities are limited as compared to desktop computers. Examples of this scenario include entertainment devices or appliances owned by a consumer, multiple control and sensor systems in an automobile or airplane, and environmental controls in a building. An efficient public key cryptosystem has been devised, which provides a complete solution to an embedded system, including protocols for authentication, authenticated key exchange, encryption, and revocation. The new construction is especially suitable for the devices with constrained computing capabilities and resources. Compared with other available authentication schemes, such as X.509, identity-based encryption, etc, the new construction provides unique features such as simplicity, efficiency, forward secrecy, and an efficient re-keying mechanism. In the application scenario for a pay Web site, users may be sensitive about their privacy, and do not wish their behaviors to be tracked by Web sites. Thus, an anonymous authentication scheme is desirable in this case. That is, a user can prove his/her authenticity without revealing his/her identity. On the other hand, the Web site owner would like to prevent a bunch of users from sharing a single subscription while hiding behind user anonymity. The Web site should be able to detect these possible malicious behaviors, and exclude corrupted users from future service. This dissertation extensively discusses anonymous authentication techniques, such as group signature, direct anonymous attestation, and traceable signature. Three anonymous authentication schemes have been proposed, which include a group signature scheme with signature claiming and variable linkability, a scheme for direct anonymous attestation in trusted computing platforms with sign and verify protocols nearly seven times more efficient than the current solution, and a state-of-the-art traceable signature scheme with support for variable anonymity. These three schemes greatly advance research in the area of anonymous authentication. The authentication techniques presented in this dissertation are based on common mathematical and cryptographical foundations, sharing similar security assumptions. We call them flexible digital authentication schemes.
APA, Harvard, Vancouver, ISO, and other styles
4

Nastasiu, Dragos-Florin. "Développement de solutions pour l’identification (THID) et l’authentification par des approches non intrusives dans le domaine THz." Electronic Thesis or Diss., Chambéry, 2024. http://www.theses.fr/2024CHAMA007.

Full text
Abstract:
L'imagerie THz est un domaine émergent depuis les avancées technologiques en termes d'émission de rayonnement THz et d'équipement de détection. L'objectif principal de la thèse est de contribuer et d'améliorer les systèmes d'imagerie THz, de la reconstruction et de l'analyse d'images aux tâches de classification d'images. Dans la première partie de la thèse, nous nous attaquons au défi de l'estimation de l'amplitude dans des conditions de bruit idéal et multiplicatif. Le bruit multiplicatif déforme la phase et introduit des artefacts complexes, tels que la perte d'information sur les contours et la dégradation du contraste, qui ne peuvent être éliminés à l'aide des techniques de reconstruction d'image les plus récentes. À cet égard, nous présentons cinq nouvelles méthodes de reconstruction qui exploitent la représentation du diagramme de phase des signaux. Deux de ces méthodes sont basées sur le filtrage du diagramme de phase pour estimer l'amplitude dans les deux conditions. Deux autres méthodes utilisent le concept de déformation temporelle dynamique (DTW) pour augmenter la capacité à modéliser le type de bruit multiplicatif. Enfin, nous exploitons la dynamique de la trajectoire de phase décrite par les courbures pour reconstruire l'image. Parmi le grand nombre de méthodes, nous évaluons tout au long de la thèse que la méthode basée sur les courbures reconstruit efficacement l'image dans des contextes idéaux et bruités. Après une reconstruction efficace de l'image, la deuxième partie de la thèse, nous étudions les méthodes d'analyse et de classification d'images en tenant compte des instabilités des systèmes d'imagerie du monde réel, telles que les translations et les rotations. Dans ce sens, nous proposons d'utiliser des décompositions de paquets d'ondelettes invariantes par rapport à la translation et à la rotation, qui fournissent une représentation unique et optimale d'une image, indépendamment de la translation ou de la rotation de l'image. Sur la base des représentations d'images invariantes, de nouvelles techniques d'extraction de caractéristiques sont introduites, telles que les cadres verticaux, horizontaux, N-directionnels et N-zonaux. En outre, deux structures de caractéristiques sont introduites, qui prennent en compte le partitionnement en fréquence de la décomposition en ondelettes et sont adaptées pour fonctionner avec des réseaux neuronaux graphiques (GNN) et des classificateurs ML classiques tels que les k-voisins les plus proches (k-NN), les machines à vecteurs de support (SVM), etc. Dans l'ensemble, les approches que nous proposons augmentent la précision de tous les classificateurs
THz imaging is an emerging field since the technological advances in terms of THz radiation emission and detection equipment. The main objective of the thesis is to contribute and to improve THz imaging systems, from image reconstruction and analysis to image classification tasks. In the first part of the thesis, we tackle the amplitude estimation challenge under ideal and multiplicative noise conditions. The multiplicative noise deforms the phase and introduces complex artefacts, such as contour information loss and contrast degradation, that cannot be eliminated using state-of-the-art image reconstruction techniques. In this regard, we introduce five novel reconstruction methods which exploit the phase diagram representation of signals. Two of the methods are based on phase-diagram match filtering to estimate the amplitude in both conditions. Another two methods use the concept of dynamic time warping (DTW) to increase the capability to model the multiplicative type of noise. Lastly, we exploit the dynamic of the phase trajectory described by the curvatures to reconstruct the image. From the large pool of methods, we evaluate throughout the thesis that the curvature-based method efficiently reconstructs the image in both ideal and noisy contexts. After an efficient image reconstruction, the second part of the thesis, we study image analysis and classification methods considering the instabilities of real-world imaging systems, such as translations and rotations. In this sense, we propose to use translation and rotation invariant wavelet packet decompositions, that provide a unique and optimal representation of an image, regardless if the image is translated or rotated. Based on the invariant image representations, novel feature extraction techniques are introduced such as vertical, horizontal, N-directional and N-zonal frameworks. Additionally, two feature structures are introduced and that consider the frequency partitioning of the wavelet decomposition and are adapted to work with Graph Neural Networks (GNNs) and classic ML classifiers such as k-nearest neighbors (k-NN), support vector machine (SVM), etc. Overall, our proposed approaches increase the accuracy of all classifiers
APA, Harvard, Vancouver, ISO, and other styles
5

Wong, Chin Man. "Personal identification/authentication by using hand geometry /." View Abstract or Full-Text, 2003. http://library.ust.hk/cgi/db/thesis.pl?COMP%202003%20WONG.

Full text
Abstract:
Thesis (M. Phil.)--Hong Kong University of Science and Technology, 2003.
Includes bibliographical references (leaves 104-109). Also available in electronic version. Access restricted to campus users.
APA, Harvard, Vancouver, ISO, and other styles
6

Jiang, Feng. "Efficient Public-Key Watermark Techniques for Authentication." Thesis, Purdue University, 2018. http://pqdtopen.proquest.com/#viewpdf?dispub=10618833.

Full text
Abstract:

The security of digital media content has received significant attention as the usage of multimediahas increased in today's society. Digital watermarking is widely applied for digital image copyright protection and authentication. The extraction and verification of the watermark can be used for many applications, for example, authenticating the image. In some situations, the authentication should be accessible to all, thus public-key watermarking would be necessary.

In addition, many essential image-embedded documents are kept in a physical format and used widely for authentication purposes. These documents include the personal ID, license, passport, immigration document, commercial ticket with identity information, personal medical report, etc.

A digital watermarking system with high embedding capacity, robust to various attacks, high extraction efficiency is needed for such practical use. A public-key watermarking system is proposed for such applications. The embedded watermark/message can be extracted and verified publicly using a public-key. The watermark extraction process is efficient and blind. The watermark can be only embedded by the document issuer. The watermark embedded is robust against not only common digital signal processing attacks, geometric attacks but also the print-scan process. Differing from existing watermarking approaches, the watermark is embedded according to the result of proposed object weight map detection and automatic object segmentation. Higher watermark robustness and embedding capacity are achieved. Our simulation results demonstrate that the proposed approach is effective and is able to be applied to various applications.

APA, Harvard, Vancouver, ISO, and other styles
7

Balisane, Hewa. "Human gait analysis for biometric identification and authentication." Thesis, Manchester Metropolitan University, 2011. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.539385.

Full text
Abstract:
The study of biometrics is concerned with any human physiological or behavioural characteristic which is universal, unique and measurable. Biometric systems operate by acquiring biometric data from individuals, extracting feature sets from data and comparing this feature with the enrolment set in a database. The aIm of this research is to compare the performance of gait-based user recognition of children with adults. Existing analyses techniques in gait-based recognition using wearable sensors for adults are applied to gait analyses in children. This is the first known study to be conducted on children (5-16 years old) for biometric gait recognition. Results presented here show that the performance degradation for children's walking compared to adult walking is approximately 100%. In comparable settings, a 6.21 % Equal Error Rate (EER) for adult gait recognition was reached, whilst for children's walking an EER of 12.69% was achieved. The performance of children's walking whilst carrying an object has also been studied. Results show that carrying an object actually improves the performance when walking normally, but when the children were asked to walk faster the walking becomes unstable, resulting in a higher Equal Error Rate (EER). A comparative investigation of the effects of time on gait recognition in children's walking pattern was carried out. The effects of age and gender have also been considered. In addition, children were tested six months apart; with the sensor on the hip position the performance of gait recognition shows significant variations with EER values. Abstract Finally, this thesis offers for the first time a coupled approach of statistical timedomain and frequency domain methods have been employed in order to match biometric gait signals. It has been shown that initially using root mean squared, crest-factor and kurtosis obtained similar matches in gait signals of children for the ages of 5-16 than for the traditional methods. Hence these novel methods employed can be exploited to verify these more established methods resident in gait recognition software.
APA, Harvard, Vancouver, ISO, and other styles
8

Jiang, Weina. "Multi-level image authentication techniques in printing-and-scanning." Thesis, University of Surrey, 2012. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.576163.

Full text
Abstract:
Printed media, such as facsimile, newspaper, document, magazine and any other publishing works, plays an important role in communicating information in today's world. The printed media can be easily manipulated by advanced image editing software. Image authentication techniques are, therefore, indispensable for preventing undesired manipulations and protecting infringement of copyright. In this thesis, we investigate image authentication for multi-level greyscale and halftone images using digital watermarking, image hashing and digital forensic techniques including application for printing-and-scanning process. Digital watermarking is the process of embedding information into the cover image which is used to verify its authenticity. The challenge of digital watermarking is the trade-off between embedding capacity and image imperceptibility. In this thesis, we compare the work of halftone watermarking algorithm proposed by Fu and Au. We observe that the image perceptual quality is reduced after watermark embedding due to the problems of sharpening distortion and uneven tonality distribution. To optimize the imperceptibility of watermark embedding, we propose an iterative linear gain halftoning algorithm. Our experiments show that the proposed halftone watermarking algorithm improves a significant amount of image quality of 6.5% to 12% by Weighted Signal-to- Noise Ratio (WSNR) and of 11% to 23% by Visual Information Fidelity (VIF), compared to Fu and Au's algorithm. While halftone watermarking provides a limited robustness against print-and-scan processes, im- age hashing provides an alternative way to verify the authenticity of the content. Little work has been reported for image hashing to printed media. In this thesis, we develop a novel image hashing algorithm based on SIFT local descriptor and introduce a normalization procedure to syn- chronize the printed-and-scanned image. We compare our proposed hashing algorithm with the singular value decomposition based image hashing (SVD-hash) and feature-point based image hashing (FP-hash) using the average Normalized Hamming Distance (NHD) and the Receiver Operating Characteristic (ROC). The proposed hash algorithm has shown good performance trade-off between robustness and discrimination, as compared to the SVD-hash and FP-hash al- gorithms quantified by the results obtained via NHD and ROC. Our proposed algorithm is found to be robust against a wide range of content preserving attacks, including non-geometric attacks, geometric attacks and printing-and-scanning. For our work in digital forensics, we propose in this thesis a statistical approach based on Multi- sized block Benford's Law (MBL), and a texture analysis based on Local Binary Pattern (LBP) to identify the origins of printed documents. We compare MBL-based and LBP-based approaches to a statistical feature-based approach proposed by Gou et al .. The proposed MBL-based approach provides an ability to identify printers from a relatively diverse sets, while it proves less accurate at identifying printers of similar models. The proposed LBP-based approach provides a highly accurate identification rate at approximately 99.4%, with a low variance. In particular, our LBP- based approach only causes 2% mis-identification rate between two identical printers, whereas Gou et al.'s approach causes 20% mis-identification rate. Our proposed LBP-based approach has also successfully demonstrated on printed-and-scanned text documents. Moreover, it remains robust against common image processing attacks, including averaging filtering, median filtering, sharpening, rotation, resizing, and JPEG compression, with computational efficiency of the order of O(N). Key words: Authentication, Watermarking, Image Hashing, Perceptual Quality, Local Binary Pattern, Scale Invariant Feature Transform, Printer Identification, Scanner Identification, Sensor
APA, Harvard, Vancouver, ISO, and other styles
9

Parker, William A. "Evaluation of data processing techniques for unobtrusive gait authentication." Thesis, Monterey, California: Naval Postgraduate School, 2014. http://hdl.handle.net/10945/41429.

Full text
Abstract:
Approved for public release; distribution is unlimited.
The growth in smartphone usage has led to increased storage of sensitive data on these easily lost or stolen devices. In order to mitigate the effects of users who ignore, disable, or circumvent authentication measures like passwords, we evaluate a method employing gait as a source of identifying information. This research is based on previously reported methods with a goal of evaluating gait signal processing and classification techniques. This thesis evaluates the performance of four signal normalization techniques (raw signal, zero-scaled, gravity-rotated, and gravity rotated with zero-scaling). Additionally, we evaluate the effect of carrying position on classification. Data was captured from 23 subjects carrying the device in the front pocket, back pocket, and on the hip. Unlike previous research, we analyzed classifier performance on data collected from multiple positions and tested on each individual location, which would be necessary in a robust, deployable system. Our results indicate that restricting device position can achieve the best overall performance using zero-scaling with 6.13% total error rate (TER) on the XY-axis but with a high variance across different axes. Using data from all positions with gravity rotation can achieve 12.6% TER with a low statistical variance.
APA, Harvard, Vancouver, ISO, and other styles
10

Bhide, Priyanka. "Design and Evaluation of Aceelerometer Based Mobile Authentication Techniques." Thesis, Linköpings universitet, Datorteknik, 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-133968.

Full text
Abstract:
Smartphones’ usages are growing rapidly. Smart phone usages are not limited to the receiving/calling or SMSing anymore. People use smartphone for online shopping, searching various information in the web, bank transactions, games, different applications for different usages etc. Anything is possible by just having a smartphone and the internet. The more usages of the smartphone also increase keeping more secrete information about the user in the phone. The popularity is increasing and so is different ways to steal/hack the phones. There are many areas which require further investigation in the field of smartphone security and authentication. This thesis work evaluates the scope of different inbuilt sensors in smartphones for mobile authentication based techniques. The Android Operating system was used in the implementation phase. Android OS has many open source library and Services which have been used for the sensor identification using Java Android platform. Two applications using Accelerometer sensor and one using Magnetometer sensor were developed. Two foremost objectives of this thesis work were-1) To figure it out the possibilities of sensor based authentication technique. 2) To check the end user perception/opinion about the applications. Usability testing was conducted to gather the user’s assessments/vision of the applications. Two methods which were used for usability testing are named Magical move and Tapping. Users (Most of them) have shown interest and inclination towards tapping application. Although, some users were also expressed inhibitions using both sensor based methods.
APA, Harvard, Vancouver, ISO, and other styles

Books on the topic "Identification and Authentication Techniques"

1

Zhang, David D. Palmprint authentication. Norwell, Mass: Kluwer Academic Publishers, 2004.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

(Firm), Knovel, ed. Modern techniques for food authentication. Amsterdam: Elsevier/Academic Press, 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

W, Mak M., and Lin Shang-Hung 1968-, eds. Biometric authentication: A machine learning approach. Upper Saddle River, N.J: Prentice Hall Professional Technical Reference, 2005.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Borivoje, Furht, and Kirovski Darko, eds. Multimedia encryption and authentication techniques and applications. Boca Raton, Fla: Auerbach Publications, 2006.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Zviran, Moshe. A comparison of password techniques for multilevel authentication mechanisms. Monterey, Calif: Naval Postgraduate School, 1990.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

1953-, Budowle Bruce, ed. Protein staining and identification techniques. [Natick, MA]: BioTechniques Books, 1999.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

National Computer Security Center (U.S.), ed. A Guide to understanding identification and authentication in trusted systems. [Ft. George G. Meade, MD]: National Computer Security Center, 1991.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Schuckers, Michael E. Computational methods in biometric authentication: Statistical methods for performance evaluation. London: Springer, 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

ECCV 2004 International Workshop (2004 Prague, Czech Republic). Biometric authentication: ECCV 2004 International Workshop, BioAW 2004, Prague, Czech Republic, May 15th, 2004 : proceedings. Berlin: Springer, 2004.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Phēsatchasāt, Mahāwitthayālai Mahidon Khana, ed. A Guide to the identification and authentication of some Thai medicinal plants. Bangkok, Thailand: Faculty of Pharmacy, Mahidol University, 1986.

Find full text
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "Identification and Authentication Techniques"

1

Lehtonen, Mikko, Thorsten Staake, and Florian Michahelles. "From Identification to Authentication – A Review of RFID Product Authentication Techniques." In Networked RFID Systems and Lightweight Cryptography, 169–87. Berlin, Heidelberg: Springer Berlin Heidelberg, 2008. http://dx.doi.org/10.1007/978-3-540-71641-9_9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Spenger, Gabriele. "Authentication, Identification Techniques, and Secure Containers – Baseline Technologies." In Lecture Notes in Computer Science, 62–80. Berlin, Heidelberg: Springer Berlin Heidelberg, 2003. http://dx.doi.org/10.1007/10941270_5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Orun, A. B. "Metrological remote identification of a human body by stereoscopic camera techniques." In Audio- and Video-based Biometric Person Authentication, 119–23. Berlin, Heidelberg: Springer Berlin Heidelberg, 1997. http://dx.doi.org/10.1007/bfb0015987.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Fu, Zhonghua, and Rongchun Zhao. "Speaker Modeling Technique Based on Regression Class for Speaker Identification with Sparse Training." In Advances in Biometric Person Authentication, 610–16. Berlin, Heidelberg: Springer Berlin Heidelberg, 2004. http://dx.doi.org/10.1007/978-3-540-30548-4_70.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Hsieh, Yun-Hwa Peggy, and Jack Appiah Ofori. "Immunological Techniques." In Food Authentication, 355–75. Chichester, UK: John Wiley & Sons, Ltd, 2017. http://dx.doi.org/10.1002/9781118810224.ch10.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Price, T. Douglas, and James H. Burton. "Identification and Authentication." In An Introduction to Archaeological Chemistry, 127–54. New York, NY: Springer New York, 2011. http://dx.doi.org/10.1007/978-1-4419-6376-5_5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Schneier, Bruce. "Identification and Authentication." In Secrets and Lies, 135–50. Indianapolis, Indiana: Wiley Publishing, Inc., 2015. http://dx.doi.org/10.1002/9781119183631.ch9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Sandhu, Ravi, Jennifer Hadley, Steven Lovaas, and Nicholas Takacs. "Identification and Authentication." In Computer Security Handbook, 28.1–28.21. Hoboken, NJ, USA: John Wiley & Sons, Inc., 2015. http://dx.doi.org/10.1002/9781118851678.ch28.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Wu, Xiangqian, Kuanquan Wang, and David Zhang. "HMMs Based Palmprint Identification." In Biometric Authentication, 775–81. Berlin, Heidelberg: Springer Berlin Heidelberg, 2004. http://dx.doi.org/10.1007/978-3-540-25948-0_105.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Yu, Kun, Yunhong Wang, and Tieniu Tan. "Writer Identification Using Dynamic Features." In Biometric Authentication, 512–18. Berlin, Heidelberg: Springer Berlin Heidelberg, 2004. http://dx.doi.org/10.1007/978-3-540-25948-0_70.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Identification and Authentication Techniques"

1

Elbendary, Tarek A., Hossam El-Din Moustafa, and Shaimaa Ahmed Elsaid. "Palmprint Authentication Techniques: A Comparative Study." In 2024 International Telecommunications Conference (ITC-Egypt), 386–93. IEEE, 2024. http://dx.doi.org/10.1109/itc-egypt61547.2024.10620503.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Sathiaseelan, Mukhil Azhagan Mallaiyan, Olivia P. Paradis, Rajat Rai, Suryaprakash Vasudev Pandurangi, Manoj Yasaswi Vutukuru, Shayan Taheri, and Navid Asadizanjani. "Logo Classification and Data Augmentation Techniques for PCB Assurance and Counterfeit Detection." In ISTFA 2021. ASM International, 2021. http://dx.doi.org/10.31399/asm.cp.istfa2021p0012.

Full text
Abstract:
Abstract This paper evaluates several approaches for automating the identification and classification of logos on printed circuit boards (PCBs) and ICs. It assesses machine learning and computer vision techniques as well as neural network algorithms. It explains how the authors created a representative dataset for machine learning by collecting variants of logos from PCBs and by applying data augmentation techniques. Besides addressing the challenges of image classification, the paper presents the results of experiments using Random Forest classifiers, Bag of Visual Words (BoVW) based on SIFT and ORB Fully Connected Neural Networks (FCN), and Convolutional Neural Network (CNN) architectures. It also discusses edge cases where the algorithms are prone to fail and where potential opportunities exist for future work in PCB logo identification, component authentication, and counterfeit detection. The code for the algorithms along with the dataset incorporating 18 classes of logos and more than 14,000 images is available at this link: https://www.trusthub.org/#/data.
APA, Harvard, Vancouver, ISO, and other styles
3

Nokovic, Bojan. "Authentication Technique based on Image Recognition: Example of Quantitative Evaluation by Probabilistic Model Checker." In 8th International Conference on Software Engineering. Academy & Industry Research Collaboration, 2023. http://dx.doi.org/10.5121/csit.2023.131206.

Full text
Abstract:
A probabilistic model checker is a software tool for formal modeling and analysis of systems that exhibit random or probabilistic behaviour. Over probabilistic models, we analyze an innovative online authentication process based on image recognition. For true positive identification, the user needs to recognize the relationship between identified objects on distinct images which we call an outer relation, and the relation between objects in the same image which we call an inner relation. We use probabilistic computational tree logic formulas (PCTL) to quantify false-negative detection and analyze the proposed authentication process. That helps to tune up the process and make it more convenient for the user while maintaining the integrity of the authentication process.
APA, Harvard, Vancouver, ISO, and other styles
4

Therese, S. Shanthi, and Chelpa Lingam. "Speaker Identification and Authentication System using Energy based Cepstral Data Technique." In the Second International Conference. New York, New York, USA: ACM Press, 2016. http://dx.doi.org/10.1145/2905055.2905139.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

R. S, Bala Kumar, and Sujitha R. "Efficient Privacy-Preserving Biometric Identification in Cloud Computing." In The International Conference on scientific innovations in Science, Technology, and Management. International Journal of Advanced Trends in Engineering and Management, 2023. http://dx.doi.org/10.59544/ieko8866/ngcesi23p5.

Full text
Abstract:
Benefited from its reliability and convenience, biometric identification has become one of the most popular authentication technologies. Due to the sensitivity of biometric data, various privacy-preserving biometric identification protocols have been proposed. However, the low computational efficiency or the security vulnerabilities of these protocols limit their wide deployment in practice. To further improve the efficiency and enhance the security, in this project, propose two new privacy-preserving biometric identification outsourcing protocols. One mainly utilizes the efficient Householder transformation and permutation technique to realize the high-efficiency intention under the known candidate attack model. The other initializes a novel random split technique and combines it with the invertible linear transformation to achieve a higher security requirement under the known-plaintext attack model. Also, argue the security of our proposed two protocols with a strict theoretical analysis and, by comparing them with the prior existing works, comprehensively evaluate their efficiency.
APA, Harvard, Vancouver, ISO, and other styles
6

Lopes, Kelvin S., Davi O. Lopes, Wesley G. P. Pavanello, César L. C. Mattos, Jarelio G. da S. Filho, José D. C. Neto, Rafael L. Gomes, Nicksson C. A. de Freitas, and Emanuel B. Rodrigues. "Behavioral Biometrics for Continuous Authentication on Mobile Devices: Anomaly Detection through Keystroke Dynamics with Machine Learning." In Encontro Nacional de Inteligência Artificial e Computacional. Sociedade Brasileira de Computação - SBC, 2023. http://dx.doi.org/10.5753/eniac.2023.234623.

Full text
Abstract:
The popularity of mobile devices generates the need for security solutions to ensure user identity. One approach to deal with this scenario is behavioral biometric for continuous authentication (BBCA), which has become increasingly known with advances in hardware and data science technologies. However, this approach still lacks greater robustness in how to model the user’s behavioral biometrics as well as maximize the effectiveness of this authentication. It is particularly important to note in this context that this paper presents an approach to BBCA using machine learning (ML) techniques integrated with sliding windows. Accordingly, biometric data collected from keystroke dynamics typing activities on mobile devices were used to identify genuine users, random (unskilled) imposters and skilled imposters. The ML models for impostor identification followed an anomaly detection (AD) approach, where only genuine data is available at training time. In addition, the use of sliding windows allowed the inclusion of the temporal dimension of the task. The results obtained indicate that the proposed solution has a practical feasibility in terms of its suitability to perform user identification, specifically, the KNN model stood out by achieving a superior performance in the value window 4. In this configuration, it achieved a score of 94% for the F1-score metric in the random imposter scenario, and 93% in the skilled imposter scenario.
APA, Harvard, Vancouver, ISO, and other styles
7

Ghoshal, Dibyendu. "A proposed technique of online face authentication to be used for the user identification." In 2012 International Conference on Computer Communication and Informatics (ICCCI). IEEE, 2012. http://dx.doi.org/10.1109/iccci.2012.6158786.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

M, Anand, and Anuja S. B. "Load Distribution in Software Defined Networks for Enabling Big Data Tasks Scheduling." In The International Conference on scientific innovations in Science, Technology, and Management. International Journal of Advanced Trends in Engineering and Management, 2023. http://dx.doi.org/10.59544/jppl8547/ngcesi23p34.

Full text
Abstract:
Benefited from its reliability and convenience, biometric identification has become one of the most popular authentication technologies. Due to the sensitivity of biometric data, various privacy-preserving biometric identification protocols have been proposed. However, the low computational efficiency or the security vulnerabilities of these protocols limit their wide deployment in practice. To further improve the efficiency and enhance the security, in this project, propose two new privacy-preserving biometric identification outsourcing protocols. One mainly utilizes the efficient Householder transformation and permutation technique to realize the high-efficiency intention under the known candidate attack model. The other initializes a novel random split technique and combines it with the invertible linear transformation to achieve a higher security requirement under the known-plaintext attack model. Also, we argue the security of our proposed two protocols with a strict theoretical analysis and, by comparing them with the prior existing works, comprehensively evaluate their efficiency.
APA, Harvard, Vancouver, ISO, and other styles
9

Khandre, Abhijeet Anil, and Sudhir Shikalpure. "WAAM Web & Android Authentication Model using Improvised User Identification and Verification Technique using Biometric and Digital Certificate." In 2018 2nd International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC). IEEE, 2018. http://dx.doi.org/10.1109/i-smac.2018.8653703.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Marcillo, Pablo, Ángel Leonardo Valdivieso Caraguay, and Myriam Hernandez-Alvarez. "Security in Vehicle-to-Infrastructure Communications." In 13th International Conference on Applied Human Factors and Ergonomics (AHFE 2022). AHFE International, 2022. http://dx.doi.org/10.54941/ahfe1002210.

Full text
Abstract:
By 2020, the number of connected vehicles will reach 250 million units. Thus, one of five vehicles worldwide will count on any wireless connection. Functional areas such as telecommunications, infotainment, automatic driving, or mobility services will have to face the implications caused by that growth. As long as vehicles require exchanging information with other vehicles or accessing external networks through a communication infrastructure, these vehicles must be part of a network. A VANET is a type of mobile network formed by base stations known as Road Side Units (RSU) and vehicles equipped with communication units known as Onboard Units (OBU). The two modes of communication in a VANET are Vehicle to Vehicle (V2V) and Vehicle to Infrastructure (V2I). Some authors consider that V2I communication has more advantages than V2V communication because V2I communication provides services such as driving guidance or early warning for drivers. This consideration has meant that researchers show more interest in this mode of communication. Likewise, others affirm that the problem of V2I communication is its security. This review focuses on knowing the most relevant and current approaches on security in V2I communication. Among the solutions, we have authentication schemes based on Blockchain technology, Elliptic Curve cryptography, key insulation strategy, and certificateless aggregate signature technique. Also, we found security arquitectures and identification schemes based on SDN, NFV, and Fog / Edge / Cloud computing. The proposals focus on resolving issues such as the privacy-preserving, high computational work, regular updating and exposure of secret keys, large number of revoked pseudonyms lists, lack of scalability in networks, and high dependence on certification authorities. In addition, these proposals provide countermeasures or strategies against replay, message forgery, impersonation, eavesdropping, DDoS, fake information, modification, Sybil, man-in-the-middle, and spoofing attacks. Finally, we determined that the attacks in V2I communications mostly compromise security requirements such as confidentiality, integrity, authentication, and availability. Preserving privacy by reducing computational costs by integrating emerging technologies is the direction toward security in vehicular network points.
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Identification and Authentication Techniques"

1

SECRETARY OF THE AIR FORCE WASHINGTON DC. Communications and Information: Identification and Authentication. Fort Belvoir, VA: Defense Technical Information Center, June 1998. http://dx.doi.org/10.21236/ada404983.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Fridrich, Jessica. Secure Oblivious Hiding, Authentication, Tamper Proofing, and Verification Techniques. Fort Belvoir, VA: Defense Technical Information Center, August 2002. http://dx.doi.org/10.21236/ada408266.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Kalman, Rudolf E. Mathematical Techniques for System Realization and Identification. Fort Belvoir, VA: Defense Technical Information Center, June 1988. http://dx.doi.org/10.21236/ada207927.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Kalman, R. E. Mathematical Techniques for System Realization and Identification. Fort Belvoir, VA: Defense Technical Information Center, June 1989. http://dx.doi.org/10.21236/ada212088.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Kalman, R. E. Mathematical Techniques for System Realization and Identification. Fort Belvoir, VA: Defense Technical Information Center, February 1986. http://dx.doi.org/10.21236/ada174487.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Goodman, D. M. Deconvolution/identification techniques for 1-D transient signals. Office of Scientific and Technical Information (OSTI), October 1990. http://dx.doi.org/10.2172/6350478.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Card, S., and R. Moskowitz. DRIP Entity Tag (DET) Authentication Formats and Protocols for Broadcast Remote Identification (RID). Edited by A. Wiethuechter. RFC Editor, June 2024. http://dx.doi.org/10.17487/rfc9575.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Klyde, David, Chuck Harris, Peter M. Thompson, and Edward N. Bachelder. System Identification Methods for Improving Flutter Flight Test Techniques. Fort Belvoir, VA: Defense Technical Information Center, August 2004. http://dx.doi.org/10.21236/ada426452.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Steele, L. L., J. R. Grant, Harrold Jr., Erhart D. P., Anex J. J., and R. P. Application of System Identification Techniques to Combustor Poststall Dynamics. Fort Belvoir, VA: Defense Technical Information Center, September 1987. http://dx.doi.org/10.21236/ada187898.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Pierre, John W., Richard Wies, and Daniel Trudnowski. Advanced Techniques for Power System Identification from Measured Data. Office of Scientific and Technical Information (OSTI), November 2008. http://dx.doi.org/10.2172/943294.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography