Sciweavers

105 search results - page 19 / 21
» A Secure and Localizing Watermarking Technique for Image Aut...
Sort
View
ICNP
2006
IEEE
14 years 1 months ago
Vault: A Secure Binding Service
— Binding services are crucial building blocks in networks and networked applications. A binding service (e.g., the Domain Name System (DNS)) maps certain information, namely, bi...
Guor-Huar Lu, Changho Choi, Zhi-Li Zhang
TMC
2012
11 years 10 months ago
Protecting Location Privacy in Sensor Networks against a Global Eavesdropper
— While many protocols for sensor network security provide confidentiality for the content of messages, contextual information usually remains exposed. Such information can be c...
Kiran Mehta, Donggang Liu, Matthew Wright
ICIP
2006
IEEE
14 years 9 months ago
Fingerprint Indexing Based on LAS Registration
Fingerprint indexing is an efficient technique that greatly improves the performance of fingerprint based person authentication systems by reducing the number of comparison. In th...
Tong Liu, Chao Zhang, Pengwei Hao
SOUPS
2010
ACM
13 years 11 months ago
A closer look at recognition-based graphical passwords on mobile devices
Graphical password systems based on the recognition of photographs are candidates to alleviate current over-reliance on alphanumeric passwords and PINs. However, despite being bas...
Paul Dunphy, Andreas P. Heiner, N. Asokan
MMSEC
2006
ACM
216views Multimedia» more  MMSEC 2006»
14 years 1 months ago
Exposing digital forgeries in video by detecting double MPEG compression
With the advent of sophisticated and low-cost video editing software, it is becoming increasingly easier to tamper with digital video. In addition, an ever-growing number of video...
Weihong Wang, Hany Farid