Sciweavers

221 search results - page 7 / 45
» Advantages of User Authentication Using Unclear Images
Sort
View
SEUS
2007
IEEE
14 years 2 months ago
Effective Appliance Selection by Complementary Context Feeding in Smart Home System
Smart Home System (SHS) is one of popular applications in ubiquitous computing, which provides convenient services for a user with userfriendly intelligent system interfaces. Among...
Taek Lee, Jiyong Park, Hoh Peter In
ICVGIP
2008
13 years 9 months ago
Audio-Visual Person Authentication with Multiple Visualized-Speech Features and Multiple Face Profiles
We present an Audio-visual person authentication system which extracts several novel "VisualizedSpeech-Features" (VSF) from the spoken-password and multiple face profile...
Amitava Das, Ohil K. Manyam, Makarand Tapaswi
DIM
2007
ACM
14 years 10 days ago
Implementing identity provider on mobile phone
We have implemented an identity provider (IdP), which is defined by the Liberty Alliance on a mobile phone. We propose an authentication method, which uses this personal IdP as a ...
Tsuyoshi Abe, Hiroki Itoh, Kenji Takahashi
CORR
2006
Springer
120views Education» more  CORR 2006»
13 years 8 months ago
Watermarking Using Decimal Sequences
: This paper introduces the use of decimal sequences in a code division multiple access (CDMA) based watermarking system to hide information for authentication in black and white i...
Navneet Mandhani, Subhash Kak
SIGIR
2004
ACM
14 years 1 months ago
Evaluating content-based filters for image and video retrieval
This paper investigates the level of metadata accuracy required for image filters to be valuable to users. Access to large digital image and video collections is hampered by ambig...
Michael G. Christel, Neema Moraveji, Chang Huang