Sciweavers

105 search results - page 12 / 21
» A Secure and Localizing Watermarking Technique for Image Aut...
Sort
View
JSAC
2006
121views more  JSAC 2006»
13 years 7 months ago
Secure localization and authentication in ultra-wideband sensor networks
The recent Federal Communications Commission regulations for ultra-wideband (UWB) transmission systems have sparked a surge of research interests in the UWB technology. One of the ...
Yanchao Zhang, Wei Liu, Yuguang Fang, Dapeng Wu
JDCTA
2008
535views more  JDCTA 2008»
13 years 7 months ago
Steganography: DCT Coefficients Reparation Technique in JPEG Image
Due to the ever-growing usage of the computer, it has led to a rapid increment in the data that is being exchanged, published and stored in an assortment of digital form. This phe...
Chiew Kang Leng, Jane Labadin, Sarah Flora Samson ...
SSWMC
2004
13 years 9 months ago
A hybrid scheme for encryption and watermarking
Encryption and watermarking are complementary lines of defense in protecting multimedia content. Recent watermarking techniques have therefore been developed independent from encr...
Xiaowei Xu, Scott D. Dexter, Ahmet M. Eskicioglu
FGR
2006
IEEE
134views Biometrics» more  FGR 2006»
14 years 1 months ago
Local Binary Patterns as an Image Preprocessing for Face Authentication
One of the major problem in face authentication systems is to deal with variations in illumination. In a realistic scenario, it is very likely that the lighting conditions of the ...
Guillaume Heusch, Yann Rodriguez, Sébastien...
IFIPTM
2010
139views Management» more  IFIPTM 2010»
13 years 6 months ago
Metric Strand Spaces for Locale Authentication Protocols
Abstract. Location-dependent services are services that adapt their behavior based on the locations of mobile devices. For many applications, it is critical that location-dependent...
F. Javier Thayer, Vipin Swarup, Joshua D. Guttman