Sciweavers

104 search results - page 18 / 21
» Biometric Based Cryptographic Key Generation from Faces
Sort
View
CCS
2010
ACM
13 years 8 months ago
TASTY: tool for automating secure two-party computations
Secure two-party computation allows two untrusting parties to jointly compute an arbitrary function on their respective private inputs while revealing no information beyond the ou...
Wilko Henecka, Stefan Kögl, Ahmad-Reza Sadegh...
IFIP
2005
Springer
14 years 2 months ago
Content-Based Image Retrieval for Digital Forensics
Digital forensic investigators are often faced with the task of manually examining a large number of (photographic) images in order to identify potential evidence. The task can be...
Yixin Chen, Vassil Roussev, Golden G. Richard III,...
AMFG
2005
IEEE
155views Biometrics» more  AMFG 2005»
14 years 2 months ago
Linear Programming for Matching in Human Body Gesture Recognition
We present a novel human body gesture recognition method using a linear programming based matching scheme. Instead of attempting to segment an object from the background, we develo...
Hao Jiang, Ze-Nian Li, Mark S. Drew
HOST
2009
IEEE
14 years 11 days ago
Reconfigurable Physical Unclonable Functions -- Enabling Technology for Tamper-Resistant Storage
A PUF or Physical Unclonable Function is a function that is embodied in a physical structure that consists of many random uncontrollable components which originate from process var...
Klaus Kursawe, Ahmad-Reza Sadeghi, Dries Schelleke...
GW
2007
Springer
241views Biometrics» more  GW 2007»
14 years 2 months ago
Representation of Human Postures for Vision-Based Gesture Recognition in Real-Time
In this paper, we present a Vision-Based Interface guided by the user gestures. The advantage of our system is that it is built over a motion capture system that recovers the body ...
Antoni Jaume-i-Capó, Javier Varona, Francis...