Sciweavers

272 search results - page 17 / 55
» Detecting Altered Fingerprints
Sort
View
ICIP
2005
IEEE
16 years 3 months ago
Risk minimization in traitors within traitors in multimedia forensics
In digital fingerprinting and multimedia forensic systems, it is possible that multiple adversaries mount attacks collectively and effectively to undermine the forensic system...
H. Vicky Zhao, K. J. Ray Liu
RSKT
2009
Springer
15 years 8 months ago
A Prototype Biometric Security Authentication System Based upon Fingerprint Recognition
Abstract. In this paper, we have proposed a prototype biometrics authentication system based upon fingerprint recognition. The major functional blocks of the proposed authenticati...
Wei Xiang, Bhavin Desai, Paul Wen, Yafeng Wang, Ti...
125
Voted
P2P
2006
IEEE
15 years 8 months ago
Route Fingerprinting in Anonymous Communications
Peer discovery and route set-up are an integral part of the processes by which anonymizing peer-to-peer systems are made secure. When systems are large, and individual nodes only ...
George Danezis, Richard Clayton
120
Voted
HT
2010
ACM
14 years 11 months ago
Citation based plagiarism detection: a new approach to identify plagiarized work language independently
This paper describes a new approach towards detecting plagiarism and scientific documents that have been read but not cited. In contrast to existing approaches, which analyze docu...
Bela Gipp, Jöran Beel
159
Voted
TIP
2010
107views more  TIP 2010»
14 years 8 months ago
Risk-Distortion Analysis for Video Collusion Attacks: A Mouse-and-Cat Game
Copyright protection is a key issue for video sharing over public networks. To protect the video content from unauthorized redistribution, digital fingerprinting is commonly used. ...
Yan Chen, W. Sabrina Lin, K. J. Ray Liu