Sciweavers

53302 search results - page 10515 / 10661
» On the design of a
Sort
View
TIFS
2010
173views more  TIFS 2010»
13 years 7 months ago
A hybrid approach for generating secure and discriminating face template
Abstract—Biometric template protection is one of the most important issues in deploying a practical biometric system. To tackle this problem, many algorithms, that do not store t...
Yi C. Feng, Pong C. Yuen, Anil K. Jain
TIFS
2010
144views more  TIFS 2010»
13 years 7 months ago
Forensic detection of image manipulation using statistical intrinsic fingerprints
—As the use of digital images has increased, so has the means and the incentive to create digital image forgeries. Accordingly, there is a great need for digital image forensic t...
Matthew C. Stamm, K. J. Ray Liu
TIFS
2010
186views more  TIFS 2010»
13 years 7 months ago
An abuse-free fair contract-signing protocol based on the RSA signature
A fair contract signing protocol allows two potentially mistrusted parities to exchange their commitments (i.e., digital signatures) to an agreed contract over the Internet in a f...
Guilin Wang
TIP
2010
153views more  TIP 2010»
13 years 7 months ago
A Versatile Model for Packet Loss Visibility and its Application to Packet Prioritization
In this paper, we propose a generalized linear model for video packet loss visibility that is applicable to different group-of-picture structures. We develop the model using three...
Ting-Lan Lin, Sandeep Kanumuri, Yuan Zhi, David Po...
TKDE
2010
184views more  TKDE 2010»
13 years 7 months ago
The Dynamic Bloom Filters
—A Bloom filter is an effective, space-efficient data structure for concisely representing a set, and supporting approximate membership queries. Traditionally, the Bloom filter a...
Deke Guo, Jie Wu, Honghui Chen, Ye Yuan, Xueshan L...
« Prev « First page 10515 / 10661 Last » Next »