Sciweavers

272 search results - page 38 / 55
» Detecting Altered Fingerprints
Sort
View
FUNGAMES
2008
15 years 3 months ago
Building RFID-Based Augmented Dice with Perfect Recognition Rates
We report on the construction of real-world dice equipped with radio frequency identification (RFID) technology that support the automated readout and processing of rolled results....
Steve Hinske, Marc Langheinrich, Yves Alter
CGF
2002
123views more  CGF 2002»
15 years 1 months ago
A Frequency-Domain Approach to Watermarking 3D Shapes
This paper presents a robust watermarking algorithm with informed detection for 3D polygonal meshes. The algorithm is based on our previous algorithm [22] that employs mesh-spectr...
Ryutarou Ohbuchi, Akio Mukaiyama, Shigeo Takahashi
ICIP
2008
IEEE
16 years 3 months ago
Game-theoretic analysis of maximum-payoff multiuser collusion
Multiuser collusion is an effective attack against traitor-tracing multimedia fingerprinting, where a group of attackers collectively mount attacks to reduce their risk of being d...
H. Vicky Zhao, Wan-Yi Sabrina Lin, K. J. Ray Liu
FC
2005
Springer
149views Cryptology» more  FC 2005»
15 years 7 months ago
Ciphire Mail Email Encryption and Authentication
Abstract. Ciphire Mail is cryptographic software that provides email encryption and digital signatures. The Ciphire Mail client resides on the user's computer between the emai...
Lars Eilebrecht
SSWMC
2004
15 years 3 months ago
Towards fraud-proof ID documents using multiple data hiding technologies and biometrics
Identity documents, such as ID cards, passports, and driver's licenses, contain textual information, a portrait of the legitimate holder, and eventually some other biometric ...
Justin Picard, Claus Vielhauer, Niels J. Thorwirth