Sciweavers

272 search results - page 13 / 55
» Detecting Altered Fingerprints
Sort
View
HICSS
2012
IEEE
296views Biometrics» more  HICSS 2012»
13 years 7 months ago
Topology Perturbation for Detecting Malicious Data Injection
Bad measurement data exists in power systems for a number of reasons. Malicious data injection attacks, which alter the values of measurements without being detected, are one pote...
K. L. Morrow, Erich Heine, Katherine M. Rogers, Ra...
ICIP
2004
IEEE
16 years 1 months ago
A public-key authentication watermarking for binary images
Authentication watermarking is the process that inserts hidden data into an object (image) in order to detect any fraudulent alteration perpetrated by a malicious hacker. In the l...
Hae Yong Kim, Ricardo L. de Queiroz
ICASSP
2008
IEEE
15 years 6 months ago
Robust video fingerprinting based on affine covariant regions
This paper proposes a robust video fingerprinting method based on affine covariant regions. In video fingerprinting, a video clip is identified using short feature vectors ref...
Sunil Lee, Chang Dong Yoo
DIMVA
2009
15 years 24 days ago
Browser Fingerprinting from Coarse Traffic Summaries: Techniques and Implications
We demonstrate that the browser implementation used at a host can be passively identified with significant precision and recall, using only coarse summaries of web traffic to and f...
Ting-Fang Yen, Xin Huang, Fabian Monrose, Michael ...
BMCBI
2006
174views more  BMCBI 2006»
14 years 11 months ago
CARAT: A novel method for allelic detection of DNA copy number changes using high density oligonucleotide arrays
Background: DNA copy number alterations are one of the main characteristics of the cancer cell karyotype and can contribute to the complex phenotype of these cells. These alterati...
Jing Huang, Wen Wei, Joyce Chen, Jane Zhang, Guoyi...