Sciweavers

24529 search results - page 257 / 4906
» Computing on Authenticated Data
Sort
View
ICIP
2003
IEEE
16 years 5 months ago
Joint security & robustness enhancement for quantization embedding
This paper studies joint security and robustness enhancement of quantization based data embedding for multimedia authentication applications. We present analysis showing that thro...
M. Wu
125
Voted
FC
2009
Springer
121views Cryptology» more  FC 2009»
15 years 10 months ago
Achieving Privacy in a Federated Identity Management System
Federated identity management allows a user to efficiently authenticate and use identity information from data distributed across multiple domains. The sharing of data across domai...
Susan Landau, Hubert Lê Van Gông, Robi...
72
Voted
ICMCS
2007
IEEE
100views Multimedia» more  ICMCS 2007»
15 years 10 months ago
Sensor Forensics: Printers, Cameras and Scanners, They Never Lie
Forensic characterization of devices is important in many situations such as establishing the trust and verifying authenticity of data and the device that created it. Current fore...
Nitin Khanna, Aravind K. Mikkilineni, Pei-Ju Chian...
130
Voted
MMSEC
2006
ACM
216views Multimedia» more  MMSEC 2006»
15 years 9 months ago
Exposing digital forgeries in video by detecting double MPEG compression
With the advent of sophisticated and low-cost video editing software, it is becoming increasingly easier to tamper with digital video. In addition, an ever-growing number of video...
Weihong Wang, Hany Farid
153
Voted
ICDAR
2003
IEEE
15 years 9 months ago
A Hybrid On/Off Line Handwritten Signature Verification System
This paper proposes a new hybrid handwritten signature verification system where the on-line reference data acquired through a digitizing tablet serves as the basis for the segmen...
Alessandro Zimmer, Luan Ling Lee