Sciweavers

130 search results - page 13 / 26
» New approaches for deniable authentication
Sort
View
ICIAR
2004
Springer
14 years 1 months ago
A Secure and Localizing Watermarking Technique for Image Authentication
In this paper, a new block-based image-dependent watermarking technique is proposed. The proposed technique utilizes the correlation coefficient statistic to produce a short and un...
Abdelkader H. Ouda, Mahmoud R. El-Sakka
HCI
2009
13 years 6 months ago
Social Practice: Becoming Enculturated in Human-Computer Interaction
Abstract. We present a new approach to the design, development and evaluation of embodied conversational agents (ECAs) that allows them to index identity through culturally and soc...
Justine Cassell
SCN
2010
Springer
143views Communications» more  SCN 2010»
13 years 6 months ago
History-Free Aggregate Message Authentication Codes
Aggregate message authentication codes, as introduced by Katz and Lindell (CT-RSA 2008), combine several MACs into a single value, which has roughly the same size as an ordinary MA...
Oliver Eikemeier, Marc Fischlin, Jens-Fabian G&oum...
ASIAMS
2008
IEEE
13 years 10 months ago
A Blended Text Mining Method for Authorship Authentication Analysis
The paper elaborates upon the interim results achieved in resolving a few newly discovered 16th century letters now alleged to be written by Queen Mary of Scots (QMS). Despite the...
Philip Sallis, Subana Shanmuganathan
PR
2010
179views more  PR 2010»
13 years 6 months ago
Robust palmprint verification using 2D and 3D features
This paper presents a new personal authentication system that simultaneously exploits 2D and 3D palmprint features. The objective of our work is to improve accuracy and robustness...
David Zhang, Vivek Kanhangad, Nan Luo, Ajay Kumar