Sciweavers

763 search results - page 79 / 153
» Digital Signatures Today
Sort
View
ICIP
2005
IEEE
16 years 2 months ago
Localization and security enhancement of block-based image authentication
Most block-based image authentication techniques that are presented in the literature sacrifice localization accuracy in order to resist vector quantization (VQ) counterfeiting att...
Abdelkader H. Ouda, Mahmoud R. El-Sakka
115
Voted
ICIP
2005
IEEE
16 years 2 months ago
Pedestrian classification from moving platforms using cyclic motion pattern
This paper describes an efficient pedestrian detection system for videos acquired from moving platforms. Given a detected and tracked object as a sequence of images within a bound...
Yang Ran, Qinfen Zheng, Isaac Weiss, Larry S. Davi...
96
Voted
FC
2005
Springer
98views Cryptology» more  FC 2005»
15 years 6 months ago
Secure Biometric Authentication for Weak Computational Devices
This paper presents computationally “lightweight” schemes for performing biometric authentication that carry out the comparison stage without revealing any information that can...
Mikhail J. Atallah, Keith B. Frikken, Michael T. G...
105
Voted
CSREASAM
2008
15 years 2 months ago
Implementing Cryptography for Packet Level Authentication
Abstract--Packet Level Authentication (PLA) is a novel countermeasure against distributed denial-of-service attacks. Each packet sent across a network has a digital signature and p...
Billy Bob Brumley
98
Voted
ISCAS
2003
IEEE
107views Hardware» more  ISCAS 2003»
15 years 5 months ago
Automatic synchronization of speech transcript and slides in presentation
An increasing number of university lectures and a vast majority of company presentations are being digitally archived for redistribution today. Most of these presentations take th...
Yu Chen, Wei Jyh Heng