Sciweavers

5076 search results - page 55 / 1016
» Image manipulation detection
Sort
View
DEPCOS
2008
IEEE
156views Hardware» more  DEPCOS 2008»
15 years 11 months ago
A True Random Number Generator with Built-in Attack Detection
True random number generators (TRNGs) are extensively used in cryptography, simulations and statistics. Metastability is a way to generate true random numbers. By using electromag...
Bernhard Fechner, Andre Osterloh
ICCNMC
2005
Springer
15 years 10 months ago
Improved Thumbprint and Its Application for Intrusion Detection
This paper proposes RTT-thumbprint to traceback intruders, and to detect stepping-stone intrusion; RTT-thumbprint is a sequence of timestamp pairs of a send packet and its correspo...
Jianhua Yang, Shou-Hsuan Stephen Huang
INFOVIS
2000
IEEE
15 years 9 months ago
Using Visualization to Detect Plagiarism in Computer Science Classes
This paper introduces a number of general methods for visualizing commonality in sets of text files. Each visualization simultaneously compares one file in the set to all other ...
Randy L. Ribler, Marc Abrams
PCM
2005
Springer
272views Multimedia» more  PCM 2005»
15 years 10 months ago
Fast Adaptive Skin Detection in JPEG Images
Skin region detection plays an important role in a variety of applications such as face detection, adult image filtering and gesture recognition. To improve the accuracy and speed...
Qing-Fang Zheng, Wen Gao
ICIP
2005
IEEE
16 years 6 months ago
Italic detection and rectification
Kuo-Chin Fan, Chien Hsiang Huang, Thomas C. Chuang