Sciweavers

7084 search results - page 1136 / 1417
» Hiding Information in Images
Sort
View
SP
2010
IEEE
181views Security Privacy» more  SP 2010»
14 years 11 months ago
SCiFI - A System for Secure Face Identification
Abstract--We introduce SCiFI, a system for Secure Computation of Face Identification. The system performs face identification which compares faces of subjects with a database of re...
Margarita Osadchy, Benny Pinkas, Ayman Jarrous, Bo...
WISEC
2010
ACM
14 years 11 months ago
Efficient code diversification for network reprogramming in sensor networks
As sensors in a network are mostly homogeneous in software and hardware, a captured sensor can easily expose its code and data to attackers and further threaten the whole network....
Qijun Gu
ACIVS
2009
Springer
14 years 11 months ago
Concealed Object Perception and Recognition Using a Photometric Stereo Strategy
Abstract. Following a review of current hidden objects detection techniques in a range of security applications, a strategy based on an innovative, low-cost photometric stereo tech...
Jiuai Sun, Melvyn L. Smith, Abdul R. Farooq, Lyndo...
DPHOTO
2009
129views Hardware» more  DPHOTO 2009»
14 years 11 months ago
Extended depth-of-field using sharpness transport across color channels
In this paper we present an approach to extend the Depth-of-Field (DoF) for cell phone miniature camera by concurrently optimizing optical system and post-capture digital processi...
Frederic Guichard, Hoang-Phi Nguyen, Régis ...
HCI
2009
14 years 11 months ago
Computer-Assisted Lip Reading Recognition for Hearing Impaired
Within the communication process of human beings, the speaker's facial expression and lip-shape movement contains extremely rich language information. The hearing impaired, a...
Yun-Long Lay, Hui-Jen Yang, Chern-Sheng Lin
« Prev « First page 1136 / 1417 Last » Next »