Sciweavers

275 search results - page 44 / 55
» The double CFTP method
Sort
View
ICIP
2010
IEEE
13 years 8 months ago
Undetectable image tampering through JPEG compression anti-forensics
Recently, a number of digital image forensic techniques have been developed which are capable of identifying an image's origin, tracing its processing history, and detecting ...
Matthew C. Stamm, Steven K. Tjoa, W. Sabrina Lin, ...
IEEEIAS
2009
IEEE
13 years 7 months ago
An Improved Scheme of Single Sign-on Protocol
In order to avoid security threats caused by password attack and replay attack in single sign-on protocal, the most methods on sovling these issues are making use of complicated te...
Yang Jian
AAAI
2012
12 years 14 days ago
Security Games for Controlling Contagion
Many strategic actions carry a ‘contagious’ component beyond the immediate locale of the effort itself. Viral marketing and peacekeeping operations have both been observed to ...
Jason Tsai, Thanh H. Nguyen, Milind Tambe
GMP
2008
IEEE
161views Solid Modeling» more  GMP 2008»
14 years 4 months ago
Slit Map: Conformal Parameterization for Multiply Connected Surfaces
Surface parameterization is a fundamental tool in geometric modeling and processing. Most existing methods deal with simply connected disks. This work introduces a novel method to ...
Xiaotian Yin, Junfei Dai, Shing-Tung Yau, Xianfeng...
ICCV
2001
IEEE
14 years 12 months ago
Beyond Lambert: Reconstructing Surfaces with Arbitrary BRDFs
W e address an open and hitherto neglected problem in computer vision, how to reconstruct the geometry of objects with arbitrary and possibly anisotropic bidirectional reflectance...
Sebastian Magda, David J. Kriegman, Todd Zickler, ...