Sciweavers

763 search results - page 79 / 153
» Digital Signatures Today
Sort
View
ICIP
2005
IEEE
14 years 11 months ago
Localization and security enhancement of block-based image authentication
Most block-based image authentication techniques that are presented in the literature sacrifice localization accuracy in order to resist vector quantization (VQ) counterfeiting att...
Abdelkader H. Ouda, Mahmoud R. El-Sakka
ICIP
2005
IEEE
14 years 11 months ago
Pedestrian classification from moving platforms using cyclic motion pattern
This paper describes an efficient pedestrian detection system for videos acquired from moving platforms. Given a detected and tracked object as a sequence of images within a bound...
Yang Ran, Qinfen Zheng, Isaac Weiss, Larry S. Davi...
FC
2005
Springer
98views Cryptology» more  FC 2005»
14 years 3 months ago
Secure Biometric Authentication for Weak Computational Devices
This paper presents computationally “lightweight” schemes for performing biometric authentication that carry out the comparison stage without revealing any information that can...
Mikhail J. Atallah, Keith B. Frikken, Michael T. G...
CSREASAM
2008
13 years 11 months ago
Implementing Cryptography for Packet Level Authentication
Abstract--Packet Level Authentication (PLA) is a novel countermeasure against distributed denial-of-service attacks. Each packet sent across a network has a digital signature and p...
Billy Bob Brumley
ISCAS
2003
IEEE
107views Hardware» more  ISCAS 2003»
14 years 2 months ago
Automatic synchronization of speech transcript and slides in presentation
An increasing number of university lectures and a vast majority of company presentations are being digitally archived for redistribution today. Most of these presentations take th...
Yu Chen, Wei Jyh Heng