The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Joint fingerprinting and decryption (JFD) is useful in securing media transmission and distribution in a multicasting environment. Common drawbacks of the existing JFD methods are the transmitted data may leak the content of data, and a subscriber cannot determine if a received image is modified such that tampering attack can be mounted successfully. Here we focus on security and privacy of image...
Image authentication is an important technology to protect image content integrity. This paper proposes an image authentication method, which regards the stable singular values as significant authentication data and represents them in the form of QR codes. With the help of QR codes, the authentication data will be complete and correct even though the codes were slightly dirty or damaged. Experimental...
In this paper, a new robust image hashing scheme for image authentication via dictionary-based sparse representation of images is proposed. For image hash extraction, we create an over-complete dictionary containing the prototype image atoms to build the hash for an image, where each image patch can be represented by sparse linear combinations of these atoms. The major contribution is to formulate...
Information fusion in biometric systems, either multimodal or intramodal fusion, usually provides an improvement in recognition performance. This paper presents a novel score-level fusion scheme called boosted score fusion. The proposed framework is a two-stage design where an existing fusion algorithm is adopted at the first stage. At the second stage, the weights obtained by the AdaBoost algorithm...
Security has become an important aspect for Web Service technology. Along with the deep research of security technologies, a set of measureable and quantifiable indexes for evaluating security quality are strongly required. As a new research topic of Web Services security, Quality of Protection (QoP for short), which provides several security levels of security mechanisms for different components...
With the popularity of the Internet, image transmission has become easier than before, but the digitization of the image has also become highly vulnerable to tampering attacks over the public network. In this paper, we propose a chaos-based image authentication algorithm which generates an authentication code for each image block. Furthermore, the applications of image integrity are also investigated...
The proposed system aims at providing a novel framework of speaker authentication using lip-motion data. The system is divided into three steps: feature extraction and modeling, model synthesis, and probabilistic model matching. First, the visual features are obtained by locating a region-of-interest and extracting geometric and textural features from the region. The extracted feature vectors are...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.