We present and evaluate various methods for purely automated attacks against click-based graphical passwords. Our purely automated methods combine click-order heuristics with focu...
Amirali Salehi-Abari, Julie Thorpe, Paul C. van Oo...
In this paper, we study the security of an image scrambling algorithm based on Space-Filling Curves (SFC). A random SFC is a pixel permutation that changes the scanning order with...
Two-factor authentication has been introduced in order to enhance security in authentication systems. Different factors have been introduced, which are combined for means of contr...
For post incident investigation a complete reconstruction of an event is needed based on surveillance footage of the crime scene and surrounding areas. Reconstruction of the wherea...
Michael J. Metternich, Marcel Worring, Arnold W. M...
This paper presents a novel Mod-4 steganographic method in discrete cosine transform (DCT) domain. A group of 2?2 quantized DCT coefficients (GQC) is selected as the valid embeddi...