Sciweavers

859 search results - page 10 / 172
» The Changing Face of Cryptography
Sort
View
CVPR
2004
IEEE
14 years 8 months ago
How Features of the Human Face Affect Recognition: A Statistical Comparison of Three Face Recognition Algorithms
Recognition difficulty is statistically linked to ??? subject covariate factors such as age and gender for three face recognition algorithms: principle components analysis, an int...
Geof H. Givens, J. Ross Beveridge, Bruce A. Draper...
ICIP
2000
IEEE
14 years 8 months ago
Low-Complexity Face-Assisted Video Coding
This paper presents a novel face-assisted video coding scheme to enhance the visual quality of the face regions in video telephony applications. A skin-color based face detection ...
Chia-Wen Lin, Yao-Jen Chang, Yung-Chang Chen
MOBICOM
2006
ACM
14 years 20 days ago
On delivery guarantees of face and combined greedy-face routing in ad hoc and sensor networks
It was recently reported that all known face and combined greedy-face routing variants cannot guarantee message delivery in arbitrary undirected planar graphs. The purpose of this...
Hannes Frey, Ivan Stojmenovic
HIP
2005
Springer
173views Cryptology» more  HIP 2005»
14 years 7 days ago
Characters or Faces: A User Study on Ease of Use for HIPs
Web-based services designed for human users are being abused by computer programs (bots). This real-world issue has recently generated a new research area called Human Interactive...
Yong Rui, Zicheng Liu, Shannon Kallin, Gavin Janke...
DICTA
2007
13 years 8 months ago
Biometric Based Cryptographic Key Generation from Faces
Existing asymmetric encryption algorithms require the storage of the secret private key. Stored keys are often protected by poorly selected user passwords that can either be guess...
B. Chen, V. Chandran