Sciweavers

169 search results - page 30 / 34
» Secure image retrieval through feature protection
Sort
View
ICIAP
2007
ACM
14 years 2 months ago
k-dimensional Size Functions for Shape Description and Comparison
This paper advises the use of k-dimensional size functions for comparison and retrieval in the context of multidimensional shapes, where by shape we mean something in two or highe...
Andrea Cerri, Silvia Biasotti, Daniela Giorgi
CCS
2011
ACM
12 years 8 months ago
PaperSpeckle: microscopic fingerprinting of paper
Paper forgery is among the leading causes of corruption in many developing regions [2]. In this paper, we introduce PaperSpeckle, a robust system that leverages the natural random...
Ashlesh Sharma, Lakshminarayanan Subramanian, Eric...
CACM
2000
225views more  CACM 2000»
13 years 8 months ago
Complementary Video and Audio Analysis for Broadcast News Archives
The Informedia Digital Video Library system extracts information from digitized video sources and allows full content search and retrieval over all extracted data. This extracted ...
Howard D. Wactlar, Alexander G. Hauptmann, Michael...
ICC
2007
IEEE
354views Communications» more  ICC 2007»
14 years 2 months ago
Enhanced Intrusion Detection System for Discovering Malicious Nodes in Mobile Ad Hoc Networks
– As mobile wireless ad hoc networks have different characteristics from wired networks and even from standard wireless networks, there are new challenges related to security iss...
Nidal Nasser, Yunfeng Chen
CCS
2011
ACM
12 years 8 months ago
SURF: detecting and measuring search poisoning
Search engine optimization (SEO) techniques are often abused to promote websites among search results. This is a practice known as blackhat SEO. In this paper we tackle a newly em...
Long Lu, Roberto Perdisci, Wenke Lee