Sciweavers

24529 search results - page 156 / 4906
» Computing on Authenticated Data
Sort
View
ICIP
2000
IEEE
16 years 4 months ago
Compression Tolerant Watermarking for Image Verification
Digital Watermarking is seen as a viable solution to authentication of multimedia data and hence its security, especially in a networked environment. In this paper we present a ne...
Harpal S. Bassali, Jatin Chhugani, Saurabh Agarwal...
CAIP
2009
Springer
325views Image Analysis» more  CAIP 2009»
15 years 9 months ago
Finger-Knuckle-Print Verification Based on Band-Limited Phase-Only Correlation
This paper investigates a new automated personal authentication technique using finger-knuckle-print (FKP) imaging. First, a specific data acquisition device is developed to captur...
Lin Zhang, Lei Zhang, David Zhang
IEEEARES
2006
IEEE
15 years 9 months ago
Censorship-Resistant and Anonymous P2P Filesharing
We present a P2P filesharing system that allows redundant storage of shared files in a way that no participating server ever stores data that could compromise its operator. Inst...
Regine Endsuleit, Thilo Mie
ICDAR
2003
IEEE
15 years 8 months ago
SAGENT: A Novel Technique for Document Modeling for Secure Access and Distribution
A novel strategy for the representation and manipulation of distributed documents, potentially complex and heterogeneous, is presented in this paper. The document under the propos...
Sanaul Hoque, Hossam Selim, Gareth Howells, Michae...
SIGCOMM
2010
ACM
15 years 3 months ago
Encrypting the internet
End-to-end communication encryption is considered necessary for protecting the privacy of user data in the Internet. Only a small fraction of all Internet traffic, however, is pro...
Michael E. Kounavis, Xiaozhu Kang, Ken Grewal, Mat...