Sciweavers

104 search results - page 20 / 21
» Biometric Based Cryptographic Key Generation from Faces
Sort
View
LATINCRYPT
2010
13 years 4 months ago
Generic Attacks on Misty Schemes
Abstract. Misty schemes are classic cryptographic schemes used to construct pseudo-random permutations from 2n bits to 2n bits by using d pseudo-random permutations from n bits to ...
Valérie Nachef, Jacques Patarin, Joana Treg...
FGR
2004
IEEE
126views Biometrics» more  FGR 2004»
13 years 9 months ago
Trainable Videorealistic Speech Animation
We describe how to create with machine learning techniques a generative, videorealistic, speech animation module. A human subject is first recorded using a videocamera as he/she u...
Tony Ezzat, Gadi Geiger, Tomaso Poggio
HPDC
2010
IEEE
13 years 7 months ago
Mendel: efficiently verifying the lineage of data modified in multiple trust domains
Data is routinely created, disseminated, and processed in distributed systems that span multiple administrative domains. To maintain accountability while the data is transformed b...
Ashish Gehani, Minyoung Kim
DAGSTUHL
2006
13 years 7 months ago
Model Transformation Technologies in the Context of Modelling Software Systems
Programming technologies have improved continuously during the last decades, but from an Information Systems perspective, some well-known problems associated to the design and impl...
Oscar Pastor
TIP
2008
287views more  TIP 2008»
13 years 6 months ago
3-D Object Recognition Using 2-D Views
We consider the problem of recognizing 3-D objects from 2-D images using geometric models and assuming different viewing angles and positions. Our goal is to recognize and localize...
Wenjing Li, George Bebis, Nikolaos G. Bourbakis