Sciweavers

1652 search results - page 159 / 331
» Matching Vector Codes
Sort
View
AVBPA
2005
Springer
275views Biometrics» more  AVBPA 2005»
15 years 5 months ago
Vulnerabilities in Biometric Encryption Systems
Abstract. The goal of a biometric encryption system is to embed a secret into a biometric template in a way that can only be decrypted with a biometric image from the enroled perso...
Andy Adler
CSMR
2000
IEEE
15 years 4 months ago
Architectural Design Recovery using Data Mining Techniques
This paper presents a technique for recovering the high level design of legacy software systems according to user defined architectural plans. Architectural plans are represented...
Kamran Sartipi, Kostas Kontogiannis, Farhad Mavadd...
ICDAR
1995
IEEE
15 years 3 months ago
Handwritten word recognition for real-time applications
—A fast method of handwritten word recognition suitable for real time applications is presented in this paper. Preprocessing, segmentation and feature extraction are implemented ...
Gyeonghwan Kim, Venu Govindaraju
ICIP
2006
IEEE
16 years 1 months ago
Selective Encryption of Human Skin in JPEG Images
In this study we propose a new approach for selective encryption in the Huffman coding of the Discrete Cosine Transform (DCT) coefficients using the Advanced Encryption Standard (...
Adrian G. Bors, José M. Rodrigues, William ...
FGR
2006
IEEE
175views Biometrics» more  FGR 2006»
15 years 5 months ago
Fully Automatic Facial Action Recognition in Spontaneous Behavior
We present results on a user independent fully automatic system for real time recognition of facial actions from the Facial Action Coding System (FACS). The system automatically d...
Marian Stewart Bartlett, Gwen Littlewort, Mark G. ...