Sciweavers

53 search results - page 6 / 11
» Have We Witnessed a Real-Life Turing Test
Sort
View
MST
2010
101views more  MST 2010»
13 years 5 months ago
Non-Uniform Reductions
Reductions and completeness notions form the heart of computational complexity theory. Recently non-uniform reductions have been naturally introduced in a variety of settings conc...
Harry Buhrman, Benjamin J. Hescott, Steven Homer, ...
ASPDAC
2000
ACM
95views Hardware» more  ASPDAC 2000»
13 years 12 months ago
Fair watermarking techniques
Many intellectual property protection (IPP) techniques have been proposed. Their primary objectives are providing convincible proof of authorship with least degradation of the qua...
Gang Qu, Jennifer L. Wong, Miodrag Potkonjak
JMM2
2006
151views more  JMM2 2006»
13 years 7 months ago
On the Use of External Face Features for Identity Verification
Abstract-- In general automatic face classification applications images are captured in natural environments. In these cases, the performance is affected by variations in facial im...
Àgata Lapedriza, David Masip, Jordi Vitri&a...
CVPR
2003
IEEE
14 years 9 months ago
Recognizing Objects in Adversarial Clutter: Breaking a Visual CAPTCHA
In this paper we explore object recognition in clutter. We test our object recognition techniques on Gimpy and EZGimpy, examples of visual CAPTCHAs. A CAPTCHA ("Completely Au...
Greg Mori, Jitendra Malik
AINA
2010
IEEE
14 years 17 days ago
Against Spyware Using CAPTCHA in Graphical Password Scheme
—Text-based password schemes have inherent security and usability problems, leading to the development of graphical password schemes. However, most of these alternate schemes are...
Liming Wang, Xiuling Chang, Zhongjie Ren, Haichang...