Sciweavers

796 search results - page 32 / 160
» Spoofing prevention method
Sort
View
CCS
2000
ACM
14 years 2 months ago
Timing attacks on Web privacy
We describe a class of attacks that can compromise the privacy of users’ Web-browsing histories. The attacks allow a malicious Web site to determine whether or not the user has ...
Edward W. Felten, Michael A. Schneider
AAMAS
2008
Springer
13 years 10 months ago
Anticipation based on constraint processing in a multi-agent context
Anticipation is a general concept used and applied in various domains. Many studies in the field of artificial intelligence have investigated the capacity for anticipation. In thi...
Arnaud Doniec, René Mandiau, Sylvain Piecho...
ICIP
2005
IEEE
14 years 11 months ago
An improved eye feature extraction algorithm based on deformable templates
In this paper, an improved method for eye extraction using deformable templates is proposed. This new method overcomes the shortcomings of traditional deformable template techniqu...
Paul Kuo, John Hannah
ICIP
2000
IEEE
14 years 11 months ago
Securing Images Online: A Protection Mechanism That Does Not Involve Watermarking
The paper covers a method of allowing a client to browse an image to examine it in detail, while making it difficult to steal. It differs from invisible watermarking methods in th...
Cormac Herley
IH
2004
Springer
14 years 3 months ago
Exploiting Preserved Statistics for Steganalysis
We introduce a steganalytic method which takes advantage of statistics that were preserved to prevent the chi-square attack. We show that preserving statistics by skipping certain ...
Rainer Böhme, Andreas Westfeld