Sciweavers

65 search results - page 10 / 13
» Methods for Protecting Password Transmission
Sort
View
CRV
2008
IEEE
125views Robotics» more  CRV 2008»
14 years 11 months ago
Enhancing Steganography in Digital Images
The recent digital revolution has facilitated communication, data portability and on-the-fly manipulation. Unfortunately, this has brought along some critical security vulnerabili...
Abbas Cheddad, Joan Condell, Kevin Curran, Paul Mc...
DICTA
2007
14 years 11 months ago
Biometric Based Cryptographic Key Generation from Faces
Existing asymmetric encryption algorithms require the storage of the secret private key. Stored keys are often protected by poorly selected user passwords that can either be guess...
B. Chen, V. Chandran
APNOMS
2006
Springer
15 years 1 months ago
Path Hopping Based on Reverse AODV for Security
In Ad hoc networks, malicious nodes can enter in radio transmission range on the routing path and disrupt network activity. Therefore, protecting from intrusion of malicious node a...
Elmurod Talipov, Donxue Jin, JaeYoun Jung, Ilkhyu ...
IJIT
2004
14 years 11 months ago
Enhance Performance of Secure Image Using Wavelet Compression
The increase popularity of multimedia application especially in image processing places a great demand on efficient data storage and transmission techniques. Network communication ...
Goh Han Keat, Azman Samsudin, Zurinahni Zainol
ICC
2008
IEEE
161views Communications» more  ICC 2008»
15 years 4 months ago
Multidimensional Layered Forward Error Correction Using Rateless Codes
Abstract— Modern layered or scalable video coding technologies generate a video bit stream with various inter layer dependencies due to references between the layers. This work p...
Cornelius Hellge, Thomas Schierl, Thomas Wiegand