Sciweavers

240 search results - page 14 / 48
» From fingerprint to writeprint
Sort
View
VIROLOGY
2010
165views more  VIROLOGY 2010»
13 years 4 months ago
IpMorph: fingerprinting spoofing unification
Abstract. There is nowadays a wide range of TCP/IP stack identification tools that allow to easily recognize the operating system of foreseen targets. The object of this article is...
Guillaume Prigent, Florian Vichot, Fabrice Harroue...
CVPR
2012
IEEE
12 years 8 days ago
Manifold-based fingerprinting for target identification
In this paper, we propose a fingerprint analysis algorithm based on using product manifolds to create robust signatures for individual targets in motion imagery. The purpose of ta...
Kang-Yu Ni, Terrell N. Mundhenk, Kyungnam Kim, Yur...
ICVGIP
2004
13 years 11 months ago
Fingerprint Classification Using Orientation Field Flow Curves
Manual fingerprint classification proceeds by carefully inspecting the geometric characteristics of major ridge curves in a fingerprint image. We propose an automatic approach of ...
Sarat C. Dass, Anil K. Jain
TEC
2008
127views more  TEC 2008»
13 years 9 months ago
Fingerprinting: Visualization and Automatic Analysis of Prisoner's Dilemma Strategies
Fingerprinting is a technique for generating a representation-independent functional signature for a game playing agent. Fingerprints can be used to compare agents across represent...
Daniel A. Ashlock, Eun-Youn Kim
ICIP
2005
IEEE
14 years 11 months ago
Risk minimization in traitors within traitors in multimedia forensics
In digital fingerprinting and multimedia forensic systems, it is possible that multiple adversaries mount attacks collectively and effectively to undermine the forensic system...
H. Vicky Zhao, K. J. Ray Liu