Sciweavers

1050 search results - page 15 / 210
» Two methods of authenticated positioning
Sort
View
FSE
2009
Springer
123views Cryptology» more  FSE 2009»
15 years 4 months ago
Fast and Secure CBC-Type MAC Algorithms
Abstract. The CBC-MAC or cipher block chaining message authentication code, is a well-known method to generate message authentication codes. Unfortunately, it is not forgery-secure...
Mridul Nandi
MVA
2007
110views Computer Vision» more  MVA 2007»
15 years 1 months ago
Synthesis Arbitrary Views from Two Images Based on Improved View Morphing Technique
In this paper we propose a method which can morph a high free virtual viewpoint image keeping the epipolar geometry relations based on View Morphing technique. It is works just by...
Huagang Liang, Shogo Tokai, Hiroyuki Hase
TIFS
2008
183views more  TIFS 2008»
14 years 11 months ago
Blind Authentication Using Periodic Properties of Interpolation
In this paper we analyze and analytically describe the specific statistical changes brought into the covariance structure of signal by the interpolation process. We show that inter...
Babak Mahdian, Stanislav Saic
ECCV
2004
Springer
16 years 1 months ago
Camera Calibration with Two Arbitrary Coplanar Circles
Abstract. In this paper, we describe a novel camera calibration method to estimate the extrinsic parameters and the focal length of a camera by using only one single image of two c...
Qian Chen, Haiyuan Wu, Toshikazu Wada
CRV
2006
IEEE
242views Robotics» more  CRV 2006»
15 years 5 months ago
User Authentication based on Face Recognition with Support Vector Machines
The present paper proposes an authentication scheme which relies on face biometrics and one-class Support Vector Machines. The proposed recognition procedures are based on both a ...
Paolo Abeni, Madalina Baltatu, Rosalia D'Alessandr...