Sciweavers

272 search results - page 14 / 55
» Detecting Altered Fingerprints
Sort
View
ICIP
2006
IEEE
16 years 1 months ago
Selfish Colluder Detection and Identification in Traitors within Traitors
During collusion attacks against multimedia forensics, an important issue that colluders need to address is the fairness of the attack, i.e., whether all colluders take the same r...
H. Vicky Zhao, K. J. Ray Liu
92
Voted
HICSS
2003
IEEE
184views Biometrics» more  HICSS 2003»
15 years 5 months ago
Content Based File Type Detection Algorithms
Identifying the true type of a computer file can be a difficult problem. Previous methods of file type recognition include fixed file extensions, fixed “magic numbers” stored ...
Mason McDaniel, Mohammad Hossain Heydari
DEXAW
2005
IEEE
164views Database» more  DEXAW 2005»
15 years 5 months ago
Mobile Digital Rights Management: Security Requirements and Copy Detection Mechanisms
This paper addresses the specification of security modules in a Mobile Digital Rights Management (DRM) approach with a focus on copy detection mechanisms. The presented DRM approa...
Miguel Soriano, Stephan Flake, Jürgen Tacken,...
MMSEC
2005
ACM
210views Multimedia» more  MMSEC 2005»
15 years 5 months ago
Composite signature based watermarking for fingerprint authentication
Digital watermarking is a technology to hide information in digital media. We extend the digital watermarking technique Phasemark™, originally developed solely for image authent...
Farid Ahmed, Ira S. Moskowitz

Source Code
7589views
16 years 7 months ago
MATLAB and Octave Functions for Computer Vision and Image Processing
Great Matlab and Octave function implementation for hot computer vision algorithms such as Feature detection via Phase Congruency, Spatial feature detection, Non-maxima suppression...
P. D. Kovesi