Sciweavers

375 search results - page 67 / 75
» On the security of an image encryption method
Sort
View
KDD
2005
ACM
146views Data Mining» more  KDD 2005»
14 years 7 months ago
Anonymity-preserving data collection
Protection of privacy has become an important problem in data mining. In particular, individuals have become increasingly unwilling to share their data, frequently resulting in in...
Zhiqiang Yang, Sheng Zhong, Rebecca N. Wright
ICASSP
2008
IEEE
14 years 1 months ago
Air-coupled ultrasound time-of-flight estimation for shipping container cargo verification
The falling cost of embedded sensor systems has opened up the possibility of in-transit air-coupled ultrasound interior imaging of shipping container cargo. This new technology co...
Patrick McVittie, Les E. Atlas
ICPR
2008
IEEE
14 years 1 months ago
Remote multimodal biometric authentication using bit priority-based fragile watermarking
We propose a new remote multimodal biometric authentication framework based on fragile watermarking for transferring multi-biometrics over networks to server for authentication. A...
Tuan Hoang, Dat Tran, Dharmendra Sharma
AVSS
2006
IEEE
14 years 1 months ago
Real-Time Detection of Camera Tampering
This paper presents a novel technique for camera tampering detection. It is implemented in real-time and was developed for use in surveillance and security applications. This meth...
Evan Ribnick, Stefan Atev, Osama Masoud, Nikolaos ...
IMAMS
2003
212views Mathematics» more  IMAMS 2003»
13 years 8 months ago
Watermarking 3D Polygonal Meshes Using the Singular Spectrum Analysis
Watermarking is to embed a structure called a watermark into the target data such as images. The watermark can be used, for example, in order to secure the copyright and detect tam...
Kohei Muratani, Kokichi Sugihara