Sciweavers

48 search results - page 9 / 10
» Image based steganography and cryptography
Sort
View
JCP
2007
88views more  JCP 2007»
13 years 7 months ago
Watermarks and Text Transformations in Visual Document Authentication
— Integrity of digital documents is a very important issue if they are to be legally binding. Common solutions, like digital signatures or message authentication codes, are based...
Igor Fischer, Thorsten Herfet
ICMLA
2007
13 years 9 months ago
Understanding Challenges in Preserving and Reconstructing Computer-Assisted Medical Decision Processes
— This paper addresses the problem of understanding preservation and reconstruction requirements for computeraided medical decision-making. With an increasing number of computer-...
Sang-Chul Lee, Peter Bajcsy
CTRSA
2007
Springer
93views Cryptology» more  CTRSA 2007»
13 years 11 months ago
Human Identification Through Image Evaluation Using Secret Predicates
Abstract. The task of developing protocols for humans to securely authenticate themselves to a remote server has been an interesting topic in cryptography as a replacement for the ...
Hassan Jameel, Riaz Ahmed Shaikh, Heejo Lee, Sungy...
HIP
2005
Springer
174views Cryptology» more  HIP 2005»
14 years 1 months ago
Collaborative Filtering CAPTCHAs
Abstract. Current CAPTCHAs require users to solve objective questions such as text recognition or image recognition. We propose a class of CAPTCHAs based on collaborative filterin...
Monica Chew, J. D. Tygar
ICC
2009
IEEE
174views Communications» more  ICC 2009»
14 years 2 months ago
Biometric Mobile Template Protection: A Composite Feature Based Fingerprint Fuzzy Vault
—Biometric authentication is emerging as the promising solution to conventional cryptography based authentication technologies. However, protecting users’ biometric templates s...
Kai Xi, Jiankun Hu