Sciweavers

375 search results - page 63 / 75
» On the security of an image encryption method
Sort
View
USS
2008
13 years 9 months ago
Digital Objects as Passwords
Security proponents heavily emphasize the importance of choosing a strong password (one with high entropy). Unfortunately, by design, most humans are apparently incapable of gener...
Mohammad Mannan, Paul C. van Oorschot
CVPR
2007
IEEE
13 years 7 months ago
PrivacyCam: a Privacy Preserving Camera Using uCLinux on the Blackfin DSP
Considerable research work has been done in the area of surveillance and biometrics, where the goals have always been high performance, robustness in security and cost optimizatio...
Ankur Chattopadhyay, Terrance E. Boult
AUSAI
2003
Springer
14 years 19 days ago
Towards Automated Creation of Image Interpretation Systems
Abstract. Automated image interpretation is an important task in numerous applications ranging from security systems to natural resource inventorization based on remote-sensing. Re...
Ilya Levner, Vadim Bulitko, Lihong Li, Greg Lee, R...
ICIP
2006
IEEE
14 years 9 months ago
Phase Distortion Correction for See-Through-The-Wall Imaging Radar
See Through The Wall (STTW) applications have become of high importance to law enforcement, homeland security and defense needs. In this work surface penetrating radar is simulate...
Jay A. Marble, Alfred O. Hero
ICMCS
2006
IEEE
112views Multimedia» more  ICMCS 2006»
14 years 1 months ago
Where was the Picture Taken: Image Localization in Route Panoramas Using Epipolar Geometry
Finding the location where a picture was taken is an important problem for a variety of applications including surveying, interactive traveling and homeland security among others....
Saad M. Khan, Fahd Rafi, Mubarak Shah