Sciweavers

221 search results - page 14 / 45
» Advantages of User Authentication Using Unclear Images
Sort
View
SSWMC
2004
13 years 9 months ago
Lossless data embedding with file size preservation
In lossless watermarking, it is possible to completely remove the embedding distortion from the watermarked image and recover an exact copy of the original unwatermarked image. Lo...
Jessica J. Fridrich, Miroslav Goljan, Qing Chen, V...
ICMCS
2006
IEEE
144views Multimedia» more  ICMCS 2006»
14 years 2 months ago
Using Implicit Relevane Feedback to Advance Web Image Search
Although relevance feedback has been extensively studied in content-based image retrieval in the academic area, no commercial web image search engine has employed the idea. There ...
En Cheng, Feng Jing, Mingjing Li, Wei-Ying Ma, Hai...
ACSAC
2008
IEEE
13 years 8 months ago
YAGP: Yet Another Graphical Password Strategy
Alphanumeric passwords are widely used in computer and network authentication to protect users' privacy. However, it is well known that long, textbased passwords are hard for...
Haichang Gao, Xuewu Guo, Xiaoping Chen, Liming Wan...
HIP
2005
Springer
208views Cryptology» more  HIP 2005»
14 years 1 months ago
Phish and HIPs: Human Interactive Proofs to Detect Phishing Attacks
In this paper, we propose a new class of Human Interactive Proofs (HIPs) that allow a human to distinguish one computer from another. Unlike traditional HIPs, where the computer is...
Rachna Dhamija, J. D. Tygar
SOUPS
2009
ACM
14 years 2 months ago
Graphical passwords as browser extension: implementation and usability study
Abstract: Today, most Internet applications still establish user authentication with traditional text based passwords. Designing a secure as well as a user-friendly password-based ...
Kemal Bicakci, Mustafa Yuceel, Burak Erdeniz, Haka...