Sciweavers

255 search results - page 28 / 51
» Principles for Entity Authentication
Sort
View
ICB
2009
Springer
173views Biometrics» more  ICB 2009»
13 years 8 months ago
Bayesian Networks to Combine Intensity and Color Information in Face Recognition
We present generative models dedicated to face recognition. Our models consider data extracted from color face images and use Bayesian Networks to model relationships between diffe...
Guillaume Heusch, Sébastien Marcel
CORR
2010
Springer
110views Education» more  CORR 2010»
13 years 11 months ago
(Unconditional) Secure Multiparty Computation with Man-in-the-middle Attacks
In secure multi-party computation n parties jointly evaluate an n-variate function f in the presence of an adversary which can corrupt up till t parties. All honest parties are req...
Shailesh Vaya
HICSS
2008
IEEE
137views Biometrics» more  HICSS 2008»
14 years 5 months ago
Marketing Using Web 2.0
The increasing popularity of Web 2.0 tools, such as blogs, wikis, and virtual worlds, is fundamentally changing how consumers use the Web. The basic core of Web 2.0, that users ca...
Salvatore Parise, Patricia J. Guinan
WMCSA
2008
IEEE
14 years 5 months ago
Location-based trust for mobile user-generated content: applications, challenges and implementations
The recent explosion in shared media content and sensed data produced by mobile end-users is challenging well-established principles and assumptions in data trust models. A fundam...
Vincent Lenders, Emmanouil Koukoumidis, Pei Zhang,...
ICMCS
2005
IEEE
126views Multimedia» more  ICMCS 2005»
14 years 4 months ago
A Reversible Watermarking Scheme for JPEG-2000 Compressed Images
In this paper, we present a novel reversible watermarking scheme for image authentication for JPEG/JPEG-2000 coded images. Since the watermarking scheme is reversible, the exact o...
Sabu Emmanuel, Chee Kiang Heng, Amitabha Das