Sciweavers

40 search results - page 4 / 8
» Using Visual Challenges to Verify the Integrity of Security ...
Sort
View
MMSEC
2006
ACM
216views Multimedia» more  MMSEC 2006»
15 years 5 months ago
Exposing digital forgeries in video by detecting double MPEG compression
With the advent of sophisticated and low-cost video editing software, it is becoming increasingly easier to tamper with digital video. In addition, an ever-growing number of video...
Weihong Wang, Hany Farid
WETICE
2006
IEEE
15 years 5 months ago
Security Verification Techniques Applied to PatchLink COTS Software
Verification of the security of software artifacts is a challenging task. An integrated approach that combines verification techniques can increase the confidence in the security ...
David P. Gilliam, John D. Powell, Matt Bishop, Chr...
IROS
2009
IEEE
131views Robotics» more  IROS 2009»
15 years 6 months ago
Visual Place Categorization: Problem, dataset, and algorithm
Abstract— In this paper we describe the problem of Visual Place Categorization (VPC) for mobile robotics, which involves predicting the semantic category of a place from image me...
Jianxin Wu, Henrik I. Christensen, James M. Rehg
BROADNETS
2006
IEEE
15 years 3 months ago
Efficient Integration of Web Services in Ambient-aware Sensor Network Applications
Sensor webs are heterogeneous collections of sensor devices that collect information and interact with the environment. They consist of wireless sensor networks that are ensembles ...
Isaac Amundson, Manish Kushwaha, Xenofon D. Koutso...
HIP
2005
Springer
208views Cryptology» more  HIP 2005»
15 years 5 months ago
Phish and HIPs: Human Interactive Proofs to Detect Phishing Attacks
In this paper, we propose a new class of Human Interactive Proofs (HIPs) that allow a human to distinguish one computer from another. Unlike traditional HIPs, where the computer is...
Rachna Dhamija, J. D. Tygar