Sciweavers

11 search results - page 2 / 3
» Biometric Hash based on Statistical Features of Online Signa...
Sort
View
HICSS
2009
IEEE
101views Biometrics» more  HICSS 2009»
14 years 4 days ago
Building a Better Similarity Trap with Statistically Improbable Features
One of the persistent topics in digital forensic research in recent years has been the problem of finding all things similar. Developed tools usually take on the form of similarit...
Vassil Roussev
ICIP
2010
IEEE
13 years 3 months ago
Multimedia forensic hash based on visual words
In recent years, digital images and videos have become increasingly popular over the internet and bring great social impact to a wide audience. In the meanwhile, technology advanc...
Wenjun Lu, Min Wu
ICB
2007
Springer
148views Biometrics» more  ICB 2007»
13 years 11 months ago
Walker Recognition Without Gait Cycle Estimation
Abstract. Most of gait recognition algorithms involve walking cycle estimation to accomplish signature matching. However, we may be plagued by two cycle-related issues when develop...
Daoliang Tan, Shiqi Yu, Kaiqi Huang, Tieniu Tan
ETRA
2010
ACM
176views Biometrics» more  ETRA 2010»
14 years 5 days ago
Learning relevant eye movement feature spaces across users
In this paper we predict the relevance of images based on a lowdimensional feature space found using several users’ eye movements. Each user is given an image-based search task,...
Zakria Hussain, Kitsuchart Pasupa, John Shawe-Tayl...
HICSS
2009
IEEE
209views Biometrics» more  HICSS 2009»
14 years 4 days ago
SIDD: A Framework for Detecting Sensitive Data Exfiltration by an Insider Attack
Detecting and mitigating insider threat is a critical element in the overall information protection strategy. By successfully implementing tactics to detect this threat, organizat...
Yali Liu, Cherita L. Corbett, Ken Chiang, Rennie A...