Sciweavers

88 search results - page 7 / 18
» Altered Fingerprints: Analysis and Detection
Sort
View
AVBPA
2003
Springer
140views Biometrics» more  AVBPA 2003»
14 years 1 months ago
Feature Extraction Using a Chaincoded Contour Representation of Fingerprint Images
A feature extraction method using the chaincode representation of fingerprint ridge contours is presented for use by Automatic Fingerprint Identification Systems. The representa...
Venu Govindaraju, Zhixin Shi, John Schneider
INFSOF
2010
113views more  INFSOF 2010»
13 years 7 months ago
Package Fingerprints: A visual summary of package interface usage
Context: Object-oriented languages such as Java, Smalltalk, and C++ structure their programs using packages. Maintainers of large systems need to understand how packages relate to...
Hani Abdeen, Stéphane Ducasse, Damien Polle...
DFT
2008
IEEE
182views VLSI» more  DFT 2008»
13 years 10 months ago
Hardware Trojan Detection and Isolation Using Current Integration and Localized Current Analysis
This paper addresses a new threat to the security of integrated circuits (ICs). The migration of IC fabrication to untrusted foundries has made ICs vulnerable to malicious alterat...
Xiaoxiao Wang, Hassan Salmani, Mohammad Tehranipoo...
ICMCS
2007
IEEE
131views Multimedia» more  ICMCS 2007»
14 years 3 months ago
Image Source Coding Forensics via Intrinsic Fingerprints
In this digital era, digital multimedia contents are often transmitted over networks without any protection. This raises serious security concerns since the receivers/subscribers ...
Wan-Yi Sabrina Lin, Steven Tjoa, H. Vicky Zhao, K....
SIGCOMM
2012
ACM
11 years 11 months ago
Measuring and fingerprinting click-spam in ad networks
Advertising plays a vital role in supporting free websites and smartphone apps. Click-spam, i.e., fraudulent or invalid clicks on online ads where the user has no actual interest ...
Vacha Dave, Saikat Guha, Yin Zhang