Sciweavers

105 search results - page 17 / 21
» A Secure and Localizing Watermarking Technique for Image Aut...
Sort
View
MM
2010
ACM
146views Multimedia» more  MM 2010»
13 years 7 months ago
Understanding the security and robustness of SIFT
Many content-based retrieval systems (CBIRS) describe images using the SIFT local features because of their very robust recognition capabilities. While SIFT features proved to cop...
Thanh-Toan Do, Ewa Kijak, Teddy Furon, Laurent Ams...
CORR
2008
Springer
112views Education» more  CORR 2008»
13 years 7 months ago
SecMon: End-to-End Quality and Security Monitoring System
The Voice over Internet Protocol (VoIP) is becoming a more available and popular way of communicating for Internet users. This also applies to Peer-to-Peer (P2P) systems and mergi...
Tomasz Ciszkowski, Charlott Eliasson, Markus Fiedl...
ICMCS
2007
IEEE
211views Multimedia» more  ICMCS 2007»
14 years 1 months ago
Context-Based Scalable Coding and Representation of High Resolution Art Pictures for Remote Data Access
EROS is the largest database in the world of high resolution art pictures. The TSAR project is designed to open it in a secure, efficient and user-friendly way that involves cryp...
Marie Babel, Olivier Déforges, Laurent B&ea...
APN
2008
Springer
13 years 9 months ago
Modeling and Analysis of Security Protocols Using Role Based Specifications and Petri Nets
Abstract. In this paper, we introduce a framework composed of a syntax and its compositional Petri net semantics, for the specification and verification of properties (like authent...
Roland Bouroulet, Raymond R. Devillers, Hanna Klau...
TPDS
2008
121views more  TPDS 2008»
13 years 7 months ago
Secure Collaboration in a Mediator-Free Distributed Environment
The internet and related technologies have made multidomain collaborations a reality. Collaboration enables domains to effectively share resources; however, it introduces several s...
Mohamed Shehab, Arif Ghafoor, Elisa Bertino