Sciweavers

485 search results - page 53 / 97
» Continuous Spatial Authentication
Sort
View
IH
2007
Springer
14 years 1 months ago
Three-Dimensional Meshes Watermarking: Review and Attack-Centric Investigation
The recent decade has seen the emergence of 3D meshes in industrial, medical and entertainment applications. Therefore, their intellectual property protection problem has attracted...
Kai Wang, Guillaume Lavoué, Florence Denis,...
INFOCOM
2006
IEEE
14 years 1 months ago
Leveraging Channel Diversity for Key Establishment in Wireless Sensor Networks
— As the use of sensor networks increases, security in this domain becomes a very real concern. One fundamental aspect of providing confidentiality and authentication is key dis...
Matthew J. Miller, Nitin H. Vaidya
TOG
2008
128views more  TOG 2008»
13 years 7 months ago
VirtualStudio2Go: digital video composition for real environments
We synchronize film cameras and LED lighting with off-the-shelf video projectors. Radiometric compensation allows displaying keying patterns and other spatial codes on arbitrary r...
Anselm Grundhöfer, Oliver Bimber
TWC
2011
417views more  TWC 2011»
13 years 2 months ago
A Spatiotemporal Approach for Secure Range Queries in Tiered Sensor Networks
Abstract—We target a two-tier sensor network with resourcerich master nodes at the upper tier and resource-poor sensor nodes at the lower tier. Master nodes collect data from sen...
Jing Shi, Rui Zhang, Yanchao Zhang

Publication
270views
12 years 6 months ago
A Data Hiding Scheme Based on LBPROT Pattern
Texture classification is mainly used for segmentation of texture regions and content-based access to image databases. Lately these texture classification patterns have been appl...
E. E. Varsaki, V. Fotopoulos, A. N. Skodras