Sciweavers

4413 search results - page 639 / 883
» Security for biometric data
Sort
View
ICMCS
2006
IEEE
187views Multimedia» more  ICMCS 2006»
15 years 10 months ago
A Nonnegative Matrix Factorization Scheme for Digital Image Watermarking
We present a new scheme for digital watermarking and secure copyright protection of digital images using nonnegative matrix factorization and singular value decomposition approach...
Mohammadreza Ghaderpanah, A. Ben Hamza
IROS
2006
IEEE
84views Robotics» more  IROS 2006»
15 years 10 months ago
Vehicle Trajectory from an Uncalibrated Stereo-Rig with Super-Homography
— We present in this article an original manner to estimate the trajectory of a vehicle running in urban-like areas. The method consists in extracting then tracking features (poi...
Nicolas Simond, Claude Laurgeau
ISCAS
2006
IEEE
155views Hardware» more  ISCAS 2006»
15 years 10 months ago
Design and evaluation of steganography for voice-over-IP
—According to former results from [1] in this paper we summarize the design principles from the general approach and introduce extended experimental test results of a Voice-over-...
Christian Krätzer, Jana Dittmann, Thomas Voge...
ISCAS
2006
IEEE
92views Hardware» more  ISCAS 2006»
15 years 10 months ago
Model of a true random number generator aimed at cryptographic applications
— The paper presents a simple stochastic model of a True Random Number Generator, which extracts randomness from the tracking jitter of a phase-locked loop. The existence of such...
Martin Simka, Milos Drutarovský, Viktor Fis...
CANS
2005
Springer
105views Cryptology» more  CANS 2005»
15 years 10 months ago
A Novel Method to Maintain Privacy in Mobile Agent Applications
Abstract. Two methods to implement privacy in network communication, anonymity and DCSC (data confidentiality and secure computation) are analysed and compared in regard to privac...
Kun Peng, Ed Dawson, Juanma González Nieto,...