Tesi sul tema "Techniques d'identification et d'authentification"
Cita una fonte nei formati APA, MLA, Chicago, Harvard e in molti altri stili
Vedi i top-19 saggi (tesi di laurea o di dottorato) per l'attività di ricerca sul tema "Techniques d'identification et d'authentification".
Accanto a ogni fonte nell'elenco di riferimenti c'è un pulsante "Aggiungi alla bibliografia". Premilo e genereremo automaticamente la citazione bibliografica dell'opera scelta nello stile citazionale di cui hai bisogno: APA, MLA, Harvard, Chicago, Vancouver ecc.
Puoi anche scaricare il testo completo della pubblicazione scientifica nel formato .pdf e leggere online l'abstract (il sommario) dell'opera se è presente nei metadati.
Vedi le tesi di molte aree scientifiche e compila una bibliografia corretta.
Nastasiu, Dragos-Florin. "Développement de solutions pour l’identification (THID) et l’authentification par des approches non intrusives dans le domaine THz". Electronic Thesis or Diss., Chambéry, 2024. http://www.theses.fr/2024CHAMA007.
Testo completoTHz imaging is an emerging field since the technological advances in terms of THz radiation emission and detection equipment. The main objective of the thesis is to contribute and to improve THz imaging systems, from image reconstruction and analysis to image classification tasks. In the first part of the thesis, we tackle the amplitude estimation challenge under ideal and multiplicative noise conditions. The multiplicative noise deforms the phase and introduces complex artefacts, such as contour information loss and contrast degradation, that cannot be eliminated using state-of-the-art image reconstruction techniques. In this regard, we introduce five novel reconstruction methods which exploit the phase diagram representation of signals. Two of the methods are based on phase-diagram match filtering to estimate the amplitude in both conditions. Another two methods use the concept of dynamic time warping (DTW) to increase the capability to model the multiplicative type of noise. Lastly, we exploit the dynamic of the phase trajectory described by the curvatures to reconstruct the image. From the large pool of methods, we evaluate throughout the thesis that the curvature-based method efficiently reconstructs the image in both ideal and noisy contexts. After an efficient image reconstruction, the second part of the thesis, we study image analysis and classification methods considering the instabilities of real-world imaging systems, such as translations and rotations. In this sense, we propose to use translation and rotation invariant wavelet packet decompositions, that provide a unique and optimal representation of an image, regardless if the image is translated or rotated. Based on the invariant image representations, novel feature extraction techniques are introduced such as vertical, horizontal, N-directional and N-zonal frameworks. Additionally, two feature structures are introduced and that consider the frequency partitioning of the wavelet decomposition and are adapted to work with Graph Neural Networks (GNNs) and classic ML classifiers such as k-nearest neighbors (k-NN), support vector machine (SVM), etc. Overall, our proposed approaches increase the accuracy of all classifiers
Etrog, Jonathan. "Cryptanalyse linéaire et conception de protocoles d'authentification à sécurité prouvée". Versailles-St Quentin en Yvelines, 2010. http://www.theses.fr/2010VERS0025.
Testo completoThis Ph. D, devoted to symmetric cryptography, addresses two separate aspects of cryptology. First, the protection of messages using encryption algorithms and, second, the protection of privacy through authentication protocols. The first part concerns the study of linear cryptanalysis while the second is devoted to the design of authentication protocols with proven security. Although introduced in the early 90s, linear cryptanalysis has recently experienced a revival due to the development of new variants. We are both interested in its practical and theoretical aspects. First, we present a cryptanalysis of a reduced version of SMS4, the encryption algorithm used in WiFi in China then, second, we introduce multilinear cryptanalysis and describe a new form of multilinear cryptanalysis. The second part of the thesis concerns the study of RFID authentication protocols respecting privacy. We define a model to formalize the notions of security for these protocols. Then we propose two protocols, each one performing a compromise between strong unlinkability and resistance to denial of service attacks, which allow low-cost implementations. We establish security proofs in the standard model for these two protocols
Dejean, Marie. "Nouvelles techniques de protection et d'authentification d'imprimés de valeur". Thesis, Ecole nationale supérieure Mines-Télécom Atlantique Bretagne Pays de la Loire, 2020. http://www.theses.fr/2020IMTA0181.
Testo completoThe security of valuable documents (banknotes) is essential to prevent counterfeiting. In this context, we have developed optical techniques that guarantee protection and authentication of valuable documents by creating visual effects induced by the observer’s motion parallax. In particular, we have focused on multiscopy using a two-dimensional microlens array and micro-images. First, we have developed a protection system by applying spatialen cryption through the use of off-center Fresnel lenses. The micro-images are adapted accordingly, so that a symbol appears at a precise angle. The protection results from the necessary association of both arrays (microlenses and micro-images). Second, we have developed new visual effects, based on non monotonic motion-in-depth. The kinetics of the seeffects is very characteristic and is a way to authenticate the documents thanks to impressive effects. The multiscopic systems scaling leads to a barrier to miniaturizing these systems, since they require a very high resolution for the micro-images. Solutions have been proposed to use accessible resolutions while satisfying the specifications. Because of the encountered technological difficulties, we have also explored a completely different type of system, only based on the phenomenon of specular reflection. Reflective micro-structures create luminous contrast and movement effects also thanks to parallax motion. This technique allows to create simple but very fluid movements unlike microlenses that allow complex movements and objects but jerky trajectories. Finally, we present a comparison between the various technique with the advantages and disadvantages of each one
Dousteyssier, Buvat Hélène. "Sur des techniques déterministes et stochastiques appliquées aux problèmes d'identification". Université Joseph Fourier (Grenoble), 1995. http://tel.archives-ouvertes.fr/tel-00346058.
Testo completoDousteyssier, Buvat Hélène Blum J. "Sur des techniques déterministes et stochastiques appliquées aux problèmes d'identification". S.l. : Université Grenoble 1, 2008. http://tel.archives-ouvertes.fr/tel-00346058.
Testo completoDolveck-Guilpart, Bénédicte. "Deux problèmes de représentation et d'identification d'un milieu à partir de sondages". Montpellier 2, 1989. http://www.theses.fr/1989MON20222.
Testo completoHilal, Alaa. "Système d'identification à partir de l'image d'iris et détermination de la localisation des informations". Thesis, Troyes, 2013. http://www.theses.fr/2013TROY0021/document.
Testo completoIris identification system is considered among the best biometric technologies. However problems related to the segmentation of the iris and to the normalization of iris templates are generally reported and induce loss of recognition performance. In this work three main contributions are made to the progress of the iris identification system. A new segmentation method is developed. It approximates the outer iris boundary with a circle and segments accurately the inner boundary of the iris by use of an active contour model. Next, a new normalization method is proposed. It leads to a more robust characterization and a better sampling of iris textures compared to traditional normalization methods. Finally using the proposed iris identification system, the location of discriminant characteristics along iris templates is identified. It appears that the most discriminant iris characteristics are located in inner regions of the iris (close to the pupil boundary) and that the discriminant capabilities of these characteristics decreases as outer regions of the iris are considered. The developed segmentation and normalization methods are tested and compared to a reference iris identification system over a database of 2639 iris images. Improvement in recognition performance validates the effectiveness of the proposed system
Poisson, Olivier. "Nouvelles techniques du traitement du signal et d'identification pour l'analyse des perturbations de la tension". Paris 6, 1998. http://www.theses.fr/1998PA066595.
Testo completoGrivel, Éric. "Contribution au rehaussement du signal de parole par filtrage de Kalman : reformulation de techniques d'identification et modèles harmoniques". Bordeaux 1, 2000. http://www.theses.fr/2000BOR10510.
Testo completoLampron, Cinthia. "La métaphore comme outil d'identification et de suivi des perceptions subjectives face à une démarche de changement". Sherbrooke : Université de Sherbrooke, 2002.
Cerca il testo completoSudarno, Wiharjo. "Amélioration des méthodes d'identification de type moindres carrés appliquées à la commande adaptative et à la reconnaissance de formes". Toulouse 3, 1996. http://www.theses.fr/1996TOU30048.
Testo completoMouhadjer, Hassan. "Étude et réalisation d'un système automatique d'identification et de comptage de colonies cancéreuses dans des boîtes de Petri". Nancy 1, 1990. http://www.theses.fr/1990NAN10533.
Testo completoGoulet, Sylvain. "Techniques d'identification d'entités nommées et de classification non-supervisée pour des requêtes de recherche web à l'aide d'informations contenues dans les pages web visitées". Mémoire, Université de Sherbrooke, 2014. http://hdl.handle.net/11143/5387.
Testo completoAhmed, Mosabbah Mushir. "Authentification de puces électroniques par des approches RF et THz non intrusives". Thesis, Université Grenoble Alpes (ComUE), 2019. http://www.theses.fr/2019GREAT005.
Testo completoThe advent of nano-scale device or shrinking of integrated circuits (IC) has become a blessing for the human civilization. Nowadays it has become very much common to find piece of electronic devices in different applications and instruments of various sectors. ICs now are not only confined to computers and mobiles but they are integral part of our everyday life. They can be found in our kitchens (in microwaves, oven), in hospitals (instruments such as ECG, MRI etc.),banks, space, telecom, defense etc. It has of course made our lives easier. However everything comes with a price.The change in economy due to the integration of electronics in different domains have put an extra pressure on companies and manufacturers to produce their product in tighter constraints in terms of cost and time. This has led to companies of shoring their manufacturing units to foundries beyond their direct control. Due to this advent of small and untrusted foundries have been on rise. The rise in various manufacturing units or foundries has given rise to the phenomenon of counterfeiting of electronic components especially ICs. For smaller foundries who do not meet all the specification, if they get hand to the design of the circuit layout, they can produce the IC similar to the one developed by original component manufacturers (OCMs) and sell them into market without consent of OCM and without performing standardized tests. Also, the malicious or untrusted foundries can copy and clone the netlist of devices and sell under the name of OCM. Various types of counterfeit ICs – recycled, remarked, overproduced, out-of-spec/defective, cloned, forged documentation, and tampered – have made the supply chain vulnerable to various attacks. However, due to the lack of efficient detection and avoidance techniques, many more instances of counterfeit ICs evade detection than those that are actually detected. Over last few years the rise in the incidents of IC counterfeit has propelled the designer and researchers to develop various testing and standardization methods in place. However, many of these methods can be cumbersome and have huge implications and costs for their implementations. This can be discouraging for the users and OCMs to implement these methods in their product.In this dissertation, we have worked on the implementation of methodology that can be used to generate fingerprints or signatures form the ICs which can be used for the purpose of their authentication. The method adopted in this work is based on the idea of exploiting the manufacturing induced process variations by implementing the electromagnetic (EM) waves. The manufacturing variability of various devices under test have been exploited through use of EM waves. The use of EM waves have been studied in detail along with the various implications of using and generating them in the IC. This dissertation uses two methodologies to utilize EM wave for the exploitation of the process variation effects. The exploited process variation effects have been subjected to mathematical treatments to quantify the response statistically.The following tasks have been implemented in this work:• State of the art study of IC counterfeiting and IC cloning (on both risk and mitigation techniques).• Measurement set-up: Component choices, board measurement development.• Circuit configuration to maximize the measurement sensitivity.• Measurement campaigns using different approaches (RF).• Measurement Exploitation in order to extract authentication information from the measurement.This work has focused on using two different semiconductor devices i.e. FPGA and microcontrollers. These are highly used devices and find their application in various domains. The statistical computation after mathematical treatment of responses, gives the error rate which determines the efficiency of the methodologies adopted
Mozef, Eril. "Conception et étude d'une architecture parallèle à réseau linéaire de processeurs et mémoires CAM pour le traitement d'image". Nancy 1, 1997. http://www.theses.fr/1997NAN10116.
Testo completoThe works on characterization of objects in an image incited the design of a dedicated architecture for connected-component labeling. Due to both local and global properties, this operation is extremely time costly when a sequential approach is applied. In the case of a parallel approach, it has been demonstrated that the labeling complexity is inversely proportional to the number of processors. In order to reduce the complexity, many of the existing solutions require a large number of processors. However, the "Processor-Time" product has to be considered to obtain an optimal architecture particularly if VLSI implementation is envisaged. The primary objective of this work was to design a parallel dedicated architecture for labeling with both weak product and good tradeoff of "Processor-Time". For this, a Maresca algorithm, implemented in a 2-D array of processors, Polymorphic-Torus was adapted. The structure obtained has a 1-D array of processors with CAM memories. [. . . ]
Renvoisé, Aurélie. "Applicabilité de la PCR "universelle" 16S comme outil d'identification et de détection bactérienne en laboratoire hospitalier de bactériologie". Thesis, Aix-Marseille, 2012. http://www.theses.fr/2012AIXM5016/document.
Testo completoBroad-range 16S rDNA PCR using universal primers was first developed for phylogenetic purpose since 16S rRNA gene is found in every bacterial species with a conserved function; consequently 16S rRNA gene can be used as a molecular clock for assessing bacterial phylogeny. Broad-range PCR was then applied to medical microbiological diagnosis in two distinct fields: molecular detection and bacteria identification. In the present work, we evaluated the applicability of broad-range PCR as a diagnostic tool in a teaching hospital (Timone Hospital, Marseilles, France). First, we showed that broad-range PCR allows identification of bacteria obtained in culture but misidentified by conventional phenotypic methods. Second, we showed that universal PCR permits bacterial detection in culture-negative infection. Third, we exemplified that using broad-range PCR is a valuable tool to identify new bacterial species and/or genera. Consequently, universal PCR is applicable in routine laboratories in the three above fields; it allows a more accurate identification of bacterial strains and permits to diagnose culture-negative bacterial infections, thus improving patient's management. It also improves our knowledge of infectious diseases together with bacterial diversity and phylogeny. Although universal PCR presents certain limitations (discussed in this work), it remains today the gold-standard for molecular identification and detection in routine laboratories
PEKPE, Komi Midzodzi. "Identification par les techniques des sous-espaces - application au diagnostic". Phd thesis, Institut National Polytechnique de Lorraine - INPL, 2004. http://tel.archives-ouvertes.fr/tel-00008649.
Testo completoHopkins, Jestlan. "Les identifiants uniques dans le monde physique : Les enjeux sociaux, techniques et politiques de l’identification par radiofréquence (RFID) dans les arènes citoyens et consommateurs". Thesis, Paris 2, 2011. http://www.theses.fr/2011PA020056.
Testo completoRadio Frequency Identification, or RFID, is a technology that is transforming the way governments identify citizens, companies track products and monitor the behavior of consumers, and the way individuals carry out identification processes and commercial and social transactions. RFID tags come in a host of form factors : they can be as small as a grain of rice and as flat as a sheet of paper. When read by an RFID interrogator (or reader), the asset to which the tag is assigned can be identified. Unlike barcode systems, the communication process between RFID tags and readers do not require a direct line-of-sight; as a result, RFID tags can be embedded in clothing, signage, identification credentials, and virtually all consumer goods in existence. In this thesis, we speak of environments in which RFID technology will be ubiquitous, akin to the state of the printed barcode today. We argue that in this period of ubiquitous RFID (or uRFID), human monitoring in consumer and citizen arenas will flourish. If not properly integrated, several risks could affect both the end-user and the RFID operator. Herein, we propose a conceptual model consisting of four theoretical constructs that we believe could favorably influence end-users to accept uRFID environments. We refer to these constructs as PACT; that is, privacy, awareness, control and trust. We hold that if RFID operators, system designers, government and industry make a conscious, ethical, and active effort to integrate these constructs in RFID systems, public acceptance will follow
Dousteyssier-Buvat, Hélène. "Sur des techniques déterministes et stochastiques appliquées aux problèmes d'identification". Phd thesis, 1995. http://tel.archives-ouvertes.fr/tel-00346058.
Testo completo