Sciweavers

45 search results - page 5 / 9
» tifs 2008
Sort
View
TIFS
2008
133views more  TIFS 2008»
14 years 9 months ago
Kerckhoffs-Based Embedding Security Classes for WOA Data Hiding
Abstract-- It has recently been discovered that using pseudorandom sequences as carriers in spread-spectrum techniques for data-hiding is not at all a sufficient condition for ensu...
François Cayre, Patrick Bas
TIFS
2008
121views more  TIFS 2008»
14 years 9 months ago
Effect of Severe Image Compression on Iris Recognition Performance
We investigate three schemes for severe compression of iris images in order to assess what their impact would be on recognition performance of the algorithms deployed today for ide...
John Daugman, Cathryn Downing
TIFS
2008
120views more  TIFS 2008»
14 years 9 months ago
Determining Image Origin and Integrity Using Sensor Noise
In this paper, we provide a unified framework for identifying the source digital camera from its images and for revealing digitally altered images using photo-response nonuniformit...
Mo Chen, Jessica J. Fridrich, Miroslav Goljan, Jan...
TIFS
2008
183views more  TIFS 2008»
14 years 9 months ago
Blind Authentication Using Periodic Properties of Interpolation
In this paper we analyze and analytically describe the specific statistical changes brought into the covariance structure of signal by the interpolation process. We show that inter...
Babak Mahdian, Stanislav Saic
TIFS
2008
145views more  TIFS 2008»
14 years 9 months ago
Physical-Layer Authentication
Authentication is the process where claims of identity are verified. Most mechanisms of authentication (e.g., digital signatures and certificates) exist above the physical layer, t...
Paul L. Yu, John S. Baras, Brian M. Sadler