Sciweavers

977 search results - page 58 / 196
» Secret image sharing
Sort
View
SOUPS
2009
ACM
15 years 10 months ago
Usability and security of out-of-band channels in secure device pairing protocols
Initiating and bootstrapping secure, yet low-cost, ad-hoc transactions is an important challenge that needs to be overcome if the promise of mobile and pervasive computing is to b...
Ronald Kainda, Ivan Flechais, A. W. Roscoe
ICBA
2004
Springer
187views Biometrics» more  ICBA 2004»
15 years 9 months ago
A Palmprint Acquisition Device with Time-Sharing Light Source Used in Personal Verification
This paper proposes a hardware-based line feature enhancement approach that uses a palmprint acquisition device fitted with a time-sharing light source. When capturing images, two ...
Weinan Zhao, Wenxin Li, Tao Wang, Zhuoqun Xu
ICNP
2003
IEEE
15 years 9 months ago
Establishing Pairwise Keys for Secure Communication in Ad Hoc Networks: A Probabilistic Approach
A prerequisite for secure communication between two nodes in an ad hoc network is that the nodes share a key to bootstrap their trust relationship. In this paper, we present a sca...
Sencun Zhu, Shouhuai Xu, Sanjeev Setia, Sushil Jaj...
170
Voted

Publication
270views
14 years 2 months ago
A Data Hiding Scheme Based on LBPROT Pattern
Texture classification is mainly used for segmentation of texture regions and content-based access to image databases. Lately these texture classification patterns have been appl...
E. E. Varsaki, V. Fotopoulos, A. N. Skodras
SSWMC
2004
15 years 5 months ago
New attacks on SARI image authentication system
The image authentication system SARI proposed by Lin and Chang passes JPEG compression and rejects other malicious manipulations. Some vulnerabilities of the system have been repo...
Jinhai Wu, Bin B. Zhu, Shipeng Li, Fuzong Lin