Sciweavers

105 search results - page 13 / 21
» A Secure and Localizing Watermarking Technique for Image Aut...
Sort
View
IEEEIAS
2007
IEEE
14 years 1 months ago
Protection of Mammograms Using Blind Steganography and Watermarking
As medical image databases are connected together through PACS, those medical images may suffer from security breaches if not protected. If a medical image is illegally obtained o...
Yue Li, Chang-Tsun Li, Chia-Hung Wei
ESORICS
2007
Springer
14 years 1 months ago
Graphical Password Authentication Using Cued Click Points
We propose and examine the usability and security of Cued Click Points (CCP), a cued-recall graphical password technique. Users click on one point per image for a sequence of image...
Sonia Chiasson, Paul C. van Oorschot, Robert Biddl...
ICMCS
2005
IEEE
95views Multimedia» more  ICMCS 2005»
14 years 1 months ago
On The Security of Mesh-Based Media Hash-Dependent Watermarking Against Protocol Attacks
A common way of resisting protocol attacks is to employ cryptographic techniques so that provable security can be retained. However, some desired requirements of watermarking such...
Chun-Shien Lu, Chia-Mu Yu
FGR
2004
IEEE
220views Biometrics» more  FGR 2004»
13 years 11 months ago
Integration of 2D and 3D Images for Enhanced Face Authentication
This paper presents a complete face authentication system integrating 2D intensity and 3D range data, based on a low-cost, real-time structured light sensor. Novel algorithms are ...
Filareti Tsalakanidou, Sotiris Malassiotis, Michae...
ICIP
2006
IEEE
14 years 9 months ago
A Model for the Electronic Representation of Bank Checks
The substitution of physical bank check exchange by electronic check image transfer brings agility, security and cost reduction to the clearing system. In this paper, we propose a...
Danilo Dias, Ricardo L. de Queiroz