We present generative models dedicated to face recognition. Our models consider data extracted from color face images and use Bayesian Networks to model relationships between diffe...
In secure multi-party computation n parties jointly evaluate an n-variate function f in the presence of an adversary which can corrupt up till t parties. All honest parties are req...
The increasing popularity of Web 2.0 tools, such as blogs, wikis, and virtual worlds, is fundamentally changing how consumers use the Web. The basic core of Web 2.0, that users ca...
The recent explosion in shared media content and sensed data produced by mobile end-users is challenging well-established principles and assumptions in data trust models. A fundam...
Vincent Lenders, Emmanouil Koukoumidis, Pei Zhang,...
In this paper, we present a novel reversible watermarking scheme for image authentication for JPEG/JPEG-2000 coded images. Since the watermarking scheme is reversible, the exact o...