Sciweavers

2327 search results - page 436 / 466
» Secure Image Filtering
Sort
View
FGCN
2008
IEEE
173views Communications» more  FGCN 2008»
15 years 6 months ago
Performance Analysis of Hybrid Fingerprint Matching Methods
The fingerprint verification methods include minutiae-based and image-based methods. The minutiae-based method has been frequently used, but it has limitations in performance. Thes...
Jong Ku Kim, Seung-Hoon Chae, Sung Jin Lim, Sung B...
ICPR
2008
IEEE
15 years 6 months ago
Remote multimodal biometric authentication using bit priority-based fragile watermarking
We propose a new remote multimodal biometric authentication framework based on fragile watermarking for transferring multi-biometrics over networks to server for authentication. A...
Tuan Hoang, Dat Tran, Dharmendra Sharma
AVSS
2006
IEEE
15 years 5 months ago
Real-Time Detection of Camera Tampering
This paper presents a novel technique for camera tampering detection. It is implemented in real-time and was developed for use in surveillance and security applications. This meth...
Evan Ribnick, Stefan Atev, Osama Masoud, Nikolaos ...
MMSEC
2006
ACM
216views Multimedia» more  MMSEC 2006»
15 years 5 months ago
Exposing digital forgeries in video by detecting double MPEG compression
With the advent of sophisticated and low-cost video editing software, it is becoming increasingly easier to tamper with digital video. In addition, an ever-growing number of video...
Weihong Wang, Hany Farid
CRV
2005
IEEE
305views Robotics» more  CRV 2005»
15 years 5 months ago
3D Model-Assisted Face Recognition in Video
Face recognition in video has gained wide attention as a covert method for surveillance to enhance security in a variety of application domains (e.g., airports). A video contains ...
Unsang Park, Hong Chen, Anil K. Jain