Sciweavers

240 search results - page 30 / 48
» From fingerprint to writeprint
Sort
View
ICIP
2006
IEEE
15 years 18 days ago
Selfish Colluder Detection and Identification in Traitors within Traitors
During collusion attacks against multimedia forensics, an important issue that colluders need to address is the fairness of the attack, i.e., whether all colluders take the same r...
H. Vicky Zhao, K. J. Ray Liu
WWW
2009
ACM
14 years 11 months ago
Less talk, more rock: automated organization of community-contributed collections of concert videos
We describe a system for synchronization and organization of user-contributed content from live music events. We start with a set of short video clips taken at a single event by m...
Lyndon S. Kennedy, Mor Naaman
HICSS
2003
IEEE
184views Biometrics» more  HICSS 2003»
14 years 4 months ago
Content Based File Type Detection Algorithms
Identifying the true type of a computer file can be a difficult problem. Previous methods of file type recognition include fixed file extensions, fixed “magic numbers” stored ...
Mason McDaniel, Mohammad Hossain Heydari
CORR
2010
Springer
169views Education» more  CORR 2010»
13 years 7 months ago
Multimodal Biometric Systems - Study to Improve Accuracy and Performance
Biometrics is the science and technology of measuring and analyzing biological data of human body, extracting a feature set from the acquired data, and comparing this set against ...
K. Sasidhar, Vijaya L. Kakulapati, Kolikipogu Rama...
IJNSEC
2008
209views more  IJNSEC 2008»
13 years 11 months ago
Application-Specific Key Release Scheme from Biometrics
This paper outlines a novel biometric key release scheme to bind application-specific key from biometric data such that the key can be retrieved effectively by using DiscreteHashi...
Thian Song Ong, Andrew Teoh Beng Jin, David Chek L...