Sciweavers

985 search results - page 110 / 197
» On the validity of digital signatures
Sort
View
SSWMC
2004
13 years 11 months ago
Towards fraud-proof ID documents using multiple data hiding technologies and biometrics
Identity documents, such as ID cards, passports, and driver's licenses, contain textual information, a portrait of the legitimate holder, and eventually some other biometric ...
Justin Picard, Claus Vielhauer, Niels J. Thorwirth
TIFS
2008
179views more  TIFS 2008»
13 years 10 months ago
Blind Identification of Source Cell-Phone Model
The various image-processing stages in a digital camera pipeline leave telltale footprints, which can be exploited as forensic signatures. These footprints consist of pixel defects...
Oya Çeliktutan, Bülent Sankur, Ismail ...
ICIP
2010
IEEE
13 years 8 months ago
Multimedia forensic hash based on visual words
In recent years, digital images and videos have become increasingly popular over the internet and bring great social impact to a wide audience. In the meanwhile, technology advanc...
Wenjun Lu, Min Wu
VTS
1999
IEEE
68views Hardware» more  VTS 1999»
14 years 2 months ago
A Test Point Insertion Algorithm for Mixed-Signal Circuits
This paper presents an algorithm based on testability measurement for test point insertion of mixed-signal circuits. Two transfer function models compatible with analog models are...
Jinyan Zhang, Sam D. Huynh, Mani Soma
INDOCRYPT
2001
Springer
14 years 2 months ago
Mobile Agent Route Protection through Hash-Based Mechanisms
Abstract. One approach to secure mobile agent execution is restricting the agent route to trusted environments. A necessary condition for this approach to be practical is that the ...
Josep Domingo-Ferrer