Blar i NTNU Open på forfatter "Yang, Bian"
-
Collecting fingerprints for recognition using mobile phone cameras
Yang, Bian; Li, Xue; Busch, Christoph (Journal article; Peer reviewed, 2012)We present in this paper a sample quality control approach for the case using a mobile phone’s camera as a fingerprint sensor for fingerprint recognition. Our approach directly estimates the maximum ridge frequency ... -
Comparative Analysis of Threat Modeling Methods for Cloud Computing towards Healthcare Security Practice
Yeng, Prosper; Wolthusen, Stephen D.; Yang, Bian (Peer reviewed; Journal article, 2020)Healthcare organizations consist of unique activities including collaborating on patients care and emergency care. The sector also accumulates high sensitive multifaceted patients’ data such as text reports, radiology ... -
Data-Driven and Artificial Intelligence (AI) Approach for Modelling and Analyzing Healthcare Security Practice: A Systematic Review
Yeng, Prosper; Nweke, Livinus Obiora; Woldaregay, Ashenafi Zebene; Yang, Bian; Snekkenes, Einar Arthur (Peer reviewed; Journal article, 2020)Data breaches in healthcare continue to grow exponentially, calling for a rethinking into better approaches of security measures towards mitigating the menace. Traditional approaches including technological measures, have ... -
Halftone modulations for data hiding in color printed images
Kitanovski, Vlado (Doctoral theses at NTNU;2019:8, Doctoral thesis, 2019)Techniques for embedding imperceptible data in printed images have been studied for the past few decades. The hidden data in printed images can be used to bridge the gap between printed media and the digital world in ... -
Healthcare Staffs' Information Security Practices Towards Mitigating Data Breaches: A Literature Survey
Yeng, Prosper; Yang, Bian; Snekkenes, Einar Arthur (Journal article; Peer reviewed, 2019)The purpose of this study was to understand healthcare staffs' information security (IS) practices towards mitigating data breaches. A literature survey was conducted to understand the state-of-the-art methods, tools, ... -
ID-fraud mitigation - A proposal of an EoI evaluation system operationalizing common objectives in ID proofing
Toftegaard, Øyvind Anders Arntzen (Master thesis, 2017)ID fraud is a serious problem around the world which can result in crimes like economic fraud, human trafficking and terrorism. Many Norwegian organizations has pointed out challenges in performing ID control. This work ... -
Innovative methods for large-scale fingerprint identification systems - Facilitating searching in a large-scale database
Li, Guoqiang (Doctoral theses at NTNU;296, Doctoral thesis, 2016)Fingerprint recognition has gained wide acceptance and great popularity after the fingerprint recognition based applications have been adopted in diverse scenarios, such as forensics area (mainly by law enforcement agencies), ... -
Managing private credentials by privacy-preserving biometrics
Yang, Bian; Li, Guoqiang (Journal article; Peer reviewed, 2018)We investigate in this paper the need to managing a user’s private credentials using privacy-preserving biometrics, define several private credential management work models under different trust models between a user and ... -
Performance Evaluation of Fusing Protected Fingerprint Minutiae Templates on the Decision Level
Yang, Bian; Busch, Christoph; Groot, Koen de; Xu, Haiyun; Veldhuis, Raymond N.J. (Journal article; Peer reviewed, 2012)In a biometric authentication system using protected templates, a pseudonymous identifier is the part of a protected template that can be directly compared. Each compared pair of pseudonymous identifiers results in a ... -
Qualifying Fingerprint Samples Captured by Smartphone Cameras in Real-Life Scenarios
Li, Guoqiang; Yang, Bian; Busch, Christoph (Others, 2016-05-03)While biometrics has been extensively adopted by industry and governments for identification and forensics purposes relying on dedicated biometric sensors and systems, the consumer market driven by innovations in consumer ... -
Trust Management for a Smart Card Based Private eID Manager
Chen, Shi (Master thesis, 2016)Humans are smart when facing solely technical attacks; they invented technical strategies to defend against technical attacks. However, when facing a social engineering attack, a socio-technical attack, humans become the ... -
Understanding Attribute-based Access Control for Modelling and Analysing Healthcare Professionals’ Security Practices
Nweke, Livinus Obiora; Yeng, Prosper; Wolthusen, Stephen; Yang, Bian (Journal article; Peer reviewed, 2020)Abstract: In recent years, there has been an increase in the application of attribute-based access control (ABAC) in electronic health (e-health) systems. E-health systems are used to store a patient’s electronic version ... -
Web Vulnerability Measures for SMEs
Yeng, Prosper; Yang, Bian; Solvoll, Terje; Nimbe, Peter; Weyori, Benjamin Asubam (Journal article; Peer reviewed, 2019)An investigation was conducted into web vulnerabilities in commonly used web application templates and frameworks (WAFs) systems such as Joomla, WordPress, Moodle and C #.Net framework. A web vulnerability scoring scheme ...