Sciweavers

137 search results - page 10 / 28
» Hybrid Traitor Tracing
Sort
View
TOG
2002
112views more  TOG 2002»
13 years 7 months ago
Ray tracing on programmable graphics hardware
Recently a breakthrough has occurred in graphics hardware: fixed function pipelines have been replaced with programmable vertex and fragment processors. In the near future, the gr...
Timothy J. Purcell, Ian Buck, William R. Mark, Pat...
JEI
2008
135views more  JEI 2008»
13 years 7 months ago
Face authentication using a hybrid approach
This paper presents a hybrid approach to face-feature extraction based on the trace transform and the novel kernel partial-least-squares discriminant analysis (KPA). The hybrid app...
Vitomir Struc, France Mihelic, Nikola Pavesic
ICMCS
2005
IEEE
126views Multimedia» more  ICMCS 2005»
14 years 1 months ago
IP Multicast Video Broadcasting System with User Authentication
This report describes a pay broadcasting system for the Internet. This system would enable tens of thousands of people to access an identical video stream simultaneously. In this ...
Hiroki Onishi, Takashi Satoh, Tetsutaro Uehara, Ka...
SEC
2003
13 years 8 months ago
Secure Audit Logging with Tamper-Resistant Hardware
Secure perimeter schemes (e.g. DRM) and tracing traitor schemes (e.g. watermarking, audit logging) strive to mitigate the problems of content escaping the control of the rights ho...
Cheun Ngen Chong, Zhonghong Peng, Pieter H. Hartel
CORR
2010
Springer
110views Education» more  CORR 2010»
13 years 7 months ago
Advanced Software Protection Now
We introduce a novel software-protection method, which can be fully implemented with today's technologies, that provides traitor tracing and license-enforcement functionalitie...
Diego Bendersky, Ariel Futoransky, Luciano Notarfr...