Sciweavers

221 search results - page 12 / 45
» Advantages of User Authentication Using Unclear Images
Sort
View
WSCG
2004
232views more  WSCG 2004»
13 years 9 months ago
3D Shape Extraction Using Photographic Tomography with Its Applications
Tomographic imaging is a technique for exploration of a cross-section of an inspected object without destruction. Normally, the input data, known as the projections, are gathered ...
S. Reruang, Withawat Withayachumnankul, Chuchart P...
CTRSA
2007
Springer
93views Cryptology» more  CTRSA 2007»
14 years 11 days ago
Human Identification Through Image Evaluation Using Secret Predicates
Abstract. The task of developing protocols for humans to securely authenticate themselves to a remote server has been an interesting topic in cryptography as a replacement for the ...
Hassan Jameel, Riaz Ahmed Shaikh, Heejo Lee, Sungy...
CHI
2008
ACM
14 years 8 months ago
CueFlik: interactive concept learning in image search
Web image search is difficult in part because a handful of keywords are generally insufficient for characterizing the visual properties of an image. Popular engines have begun to ...
James Fogarty, Desney S. Tan, Ashish Kapoor, Simon...
ICIP
1998
IEEE
14 years 10 months ago
A Web-based Secure System for the Distributed Printing of Documents and Images
We propose and consider a secure printing system for the distributed printing of documents and images over the World Wide Web. This system enables secure sharing, commerce, and co...
Ping Wah Wong, Daniel Tretter, Thomas Kite, Qian L...
ICCV
2011
IEEE
12 years 8 months ago
Segmentation from a Box
Drawing a box around an intended segmentation target has become both a popular user interface and a common output for learning-driven detection algorithms. Despite the ubiquity of...
Leo Grady, Marie-Pierre Jolly, Aaron Seitz