Sciweavers

2399 search results - page 175 / 480
» On Authentication between Human and Computer
Sort
View
IVC
2002
137views more  IVC 2002»
15 years 4 months ago
A color coding method for radiographic images
A color scale was designed with an approach that combined both human visual response to color and physical properties of color. The design was initiated with a subjective evaluati...
Xie-Qi Shi, Pehr Sällström, Ulf Welander
ICASSP
2011
IEEE
14 years 8 months ago
Experiments in context-independent recognition of non-lexical 'yes' or 'no' responses
We present our experiments in context-free recognition of non-lexical responses. Non-lexical verbal responses such as mmm-hmm or uh-huh are used by listeners to signal confirmati...
Shiva Sundaram, Robert Schleicher, Nathalie Diehl
CSFW
2007
IEEE
15 years 10 months ago
Security Analysis of Voice-over-IP Protocols
The transmission of voice communications as datagram packets over IP networks, commonly known as Voice-overIP (VoIP) telephony, is rapidly gaining wide acceptance. With private ph...
Prateek Gupta, Vitaly Shmatikov
ICDAR
2011
IEEE
14 years 4 months ago
Writer Retrieval - Exploration of a Novel Biometric Scenario Using Perceptual Features Derived from Script Orientation
—We propose a novel scenario called “writer retrieval” consisting in the retrieval from a set of documents all those produced by the same writer. The retrieval is based on a ...
Vlad Atanasiu, Laurence Likforman-Sulem, Nicole Vi...
HIP
2005
Springer
173views Cryptology» more  HIP 2005»
15 years 10 months ago
Characters or Faces: A User Study on Ease of Use for HIPs
Web-based services designed for human users are being abused by computer programs (bots). This real-world issue has recently generated a new research area called Human Interactive...
Yong Rui, Zicheng Liu, Shannon Kallin, Gavin Janke...