Sciweavers

853 search results - page 22 / 171
» Flexible authentication of images
Sort
View
AINA
2008
IEEE
14 years 2 months ago
Improvement of User Authentication Using Schema of Visual Memory: Exploitation of "Schema of Story"
A user authentication system using "unclear images" as pass-images has been proposed, in which only legitimate users can understand their meaning by viewing the original...
Takumi Yamamoto, Atsushi Harada, Takeo Isarida, Ma...
ICDAR
2003
IEEE
14 years 26 days ago
SAGENT: A Novel Technique for Document Modeling for Secure Access and Distribution
A novel strategy for the representation and manipulation of distributed documents, potentially complex and heterogeneous, is presented in this paper. The document under the propos...
Sanaul Hoque, Hossam Selim, Gareth Howells, Michae...
PR
2010
220views more  PR 2010»
13 years 6 months ago
Online finger-knuckle-print verification for personal authentication
Biometric based personal authentication is an effective method for automatically recognizing, with a high confidence, a person’s identity. By observing that the texture pattern p...
Lin Zhang, Lei Zhang 0006, David Zhang, Hailong Zh...
GRID
2006
Springer
13 years 7 months ago
Flexible and Secure Logging of Grid Data Access
-- In Grid collaborations, scientists use middleware to execute computational experiments, visualize results, and securely share data on resources ranging from desktop machines to ...
Weide Zhang, David Del Vecchio, Glenn S. Wasson, M...
IJCV
2006
117views more  IJCV 2006»
13 years 7 months ago
Programmable Imaging: Towards a Flexible Camera
In this paper, we introduce the notion of a programmable imaging system. Such an imaging system provides a human user or a vision system significant control over the radiometric an...
Shree K. Nayar, Vlad Branzoi, Terrance E. Boult