Sciweavers

2327 search results - page 263 / 466
» Secure Image Filtering
Sort
View
VEE
2012
ACM
200views Virtualization» more  VEE 2012»
13 years 9 months ago
Block storage virtualization with commodity secure digital cards
Smartphones, tablets and other mobile platforms typically accommodate bulk data storage with low-cost, FAT-formatted Secure Digital cards. When one uses a mobile device to run a f...
Harvey Tuch, Cyprien Laplace, Kenneth C. Barr, Bi ...
ICPR
2006
IEEE
16 years 2 months ago
Boosted Gabor Features Applied to Vehicle Detection
Robust vehicle detection is a challenging task given vehicles with different types, and sizes, and at different distances. This paper proposes a Boosted Gabor Features (BGF) appro...
Chong Sun, Hong Cheng, Nanning Zheng
ICDAR
2009
IEEE
15 years 8 months ago
Machine Authentication of Security Documents
This paper presents a pioneering effort towards machine authentication of security documents like bank cheques, legal deeds, certificates, etc. that fall under the same class as f...
Utpal Garain, Biswajit Halder
145
Voted
TIFS
2008
152views more  TIFS 2008»
15 years 1 months ago
Security of Lattice-Based Data Hiding Against the Watermarked-Only Attack
This paper presents a security analysis for data hiding methods based on nested lattice codes, extending the analysis provided by previous works to a more general scenario. The se...
Luis Pérez-Freire, Fernando Pérez-Go...
CVPR
2007
IEEE
15 years 8 months ago
Secure Biometric Templates from Fingerprint-Face Features
Since biometric data cannot be easily replaced or revoked, it is important that biometric templates used in biometric applications should be constructed and stored in a secure way...
Yagiz Sutcu, Qiming Li, Nasir D. Memon