Sciweavers

868 search results - page 148 / 174
» On Analog Signature Analysis
Sort
View
TIFS
2008
145views more  TIFS 2008»
14 years 9 months ago
Physical-Layer Authentication
Authentication is the process where claims of identity are verified. Most mechanisms of authentication (e.g., digital signatures and certificates) exist above the physical layer, t...
Paul L. Yu, John S. Baras, Brian M. Sadler
TIFS
2008
179views more  TIFS 2008»
14 years 9 months ago
Blind Identification of Source Cell-Phone Model
The various image-processing stages in a digital camera pipeline leave telltale footprints, which can be exploited as forensic signatures. These footprints consist of pixel defects...
Oya Çeliktutan, Bülent Sankur, Ismail ...
CORR
2004
Springer
107views Education» more  CORR 2004»
14 years 9 months ago
Security of public key cryptosystems based on Chebyshev Polynomials
Chebyshev polynomials have been recently proposed for designing public-key systems. Indeed, they enjoy some nice chaotic properties, which seem to be suitable for use in Cryptogra...
Pina Bergamo, Paolo D'Arco, Alfredo De Santis, Lju...
BMCBI
2002
81views more  BMCBI 2002»
14 years 9 months ago
Species-specific protein sequence and fold optimizations
Background: An organism's ability to adapt to its particular environmental niche is of fundamental importance to its survival and proliferation. In the largest study of its k...
Michel Dumontier, Katerina Michalickova, Christoph...
PAMI
2010
127views more  PAMI 2010»
14 years 8 months ago
The Structure of Multiplicative Motions in Natural Imagery
—A theoretical investigation of the frequency structure of multiplicative image motion signals is presented, e.g., as associated with translucency phenomena. Previous work has cl...
Konstantinos G. Derpanis, Richard P. Wildes