-
2
-
-
41949091158
-
Image understanding for iris biometrics: A survey
-
K. Bowyer, K. Hollingsworth, and P. Flynn, "Image understanding for iris biometrics: A survey," Comput. Vision Image Understand., vol.110, no.2, pp. 281-307, 2008.
-
(2008)
Comput. Vision Image Understand.
, vol.110
, Issue.2
, pp. 281-307
-
-
Bowyer, K.1
Hollingsworth, K.2
Flynn, P.3
-
3
-
-
35148835074
-
New methods in iris recognition
-
J. Daugman, "New methods in iris recognition," IEEE Trans. Syst., Man, Cybern., vol.37, no.5, pt. B, pp. 1167-1175, 2007.
-
(2007)
IEEE Trans. Syst., Man, Cybern.
, vol.37
, Issue.5 PART. B
, pp. 1167-1175
-
-
Daugman, J.1
-
4
-
-
0027700869
-
High confidence visual recognition of persons by a test of statistical independence
-
Nov.
-
J. G. Daugman, "High confidence visual recognition of persons by a test of statistical independence," IEEE Trans. Pattern Anal. Mach. Intell., vol.15, no.11, pp. 1148-1160, Nov. 1993.
-
(1993)
IEEE Trans. Pattern Anal. Mach. Intell.
, vol.15
, Issue.11
, pp. 1148-1160
-
-
Daugman, J.G.1
-
5
-
-
0242640012
-
Demodulation by complex-valued wavelets for stochastic pattern recognition
-
Jan.
-
J. G. Daugman, "Demodulation by complex-valued wavelets for stochastic pattern recognition," Int. J. Wavelets, MultiResol. Inf. Process., vol.1, no.1, pp. 1-17, Jan. 2003.
-
(2003)
Int. J. Wavelets, MultiResol. Inf. Process.
, vol.1
, Issue.1
, pp. 1-17
-
-
Daugman, J.G.1
-
6
-
-
0031236835
-
Iris recognition: An emerging biometric technology
-
Sep.
-
R. P. Wildes, "Iris recognition: An emerging biometric technology," Proc. IEEE, vol.85, no.9, pp. 1348-1363, Sep. 1997.
-
(1997)
Proc. IEEE
, vol.85
, Issue.9
, pp. 1348-1363
-
-
Wildes, R.P.1
-
7
-
-
26444499977
-
-
B.S. dissertation, The School of Computer Science and Software Engineering, The University ofWestern Australia, CrawleyWA, Perth, Australia
-
L. Masek, "Recognition of human iris patterns for biometric identification," B.S. dissertation, The School of Computer Science and Software Engineering, The University ofWestern Australia, CrawleyWA, Perth, Australia, 2003.
-
(2003)
Recognition of Human Iris Patterns for Biometric Identification
-
-
Masek, L.1
-
8
-
-
0347895307
-
Iris recognition using circular symmetric filters
-
Quebec City, Canada, Aug.
-
L. Ma, Y.Wang, and T. Tan, "Iris recognition using circular symmetric filters," in Proc. 16th Int. Conf. Pattern Recogn. (ICPR), Quebec City, Canada, Aug. 2002, vol.2, pp. 805-808.
-
(2002)
Proc. 16th Int. Conf. Pattern Recogn. (ICPR)
, vol.2
, pp. 805-808
-
-
Ma, L.1
Wang, Y.2
Tan, T.3
-
9
-
-
0035363107
-
Efficient iris recognition through improvement of feature vector and classifier
-
Jun.
-
S. Lim, K. Lee, O. Byeon, and T. Kim, "Efficient iris recognition through improvement of feature vector and classifier," J. Electron. Telecommun. Res. Inst., vol.33, no.2, pp. 61-70, Jun. 2001.
-
(2001)
J. Electron. Telecommun. Res. Inst.
, vol.33
, Issue.2
, pp. 61-70
-
-
Lim, S.1
Lee, K.2
Byeon, O.3
Kim, T.4
-
10
-
-
2942628075
-
Efficient iris recognition by characterizing key local variations
-
Jun.
-
L. Ma, T. Tan, and Y. Wang, "Efficient iris recognition by characterizing key local variations," IEEE Trans. Image Process., vol.13, no.6, pp. 739-750, Jun. 2004.
-
(2004)
IEEE Trans. Image Process.
, vol.13
, Issue.6
, pp. 739-750
-
-
Ma, L.1
Tan, T.2
Wang, Y.3
-
11
-
-
8844255086
-
Iris model based on local orientation description
-
Korea, Apr.
-
J. Huang, L. Ma, Y. Wang, and T. Tan, "Iris model based on local orientation description," in Proc. Asian Conf. Comput. Vision, Korea, Apr. 2004, pp. 954-959.
-
(2004)
Proc. Asian Conf. Comput. Vision
, pp. 954-959
-
-
Huang, J.1
Ma, L.2
Wang, Y.3
Tan, T.4
-
12
-
-
33646775014
-
Iris feature extraction using 2-D phase congruency
-
Sydney, Australia, Jul.
-
X. Yuan and P. Shi, "Iris feature extraction using 2-D phase congruency," in Proc. Third Int. Conf. Inf. Technol. Appl. (ICITA), Sydney, Australia, Jul. 2005, vol.33, pp. 437-441.
-
(2005)
Proc. Third Int. Conf. Inf. Technol. Appl. (ICITA)
, vol.33
, pp. 437-441
-
-
Yuan, X.1
Shi, P.2
-
13
-
-
26444519901
-
Performance evaluation of iris based recognition system implementing PCA and ICA encoding techniques
-
DOI 10.1117/12.604201, 07, Biometric Technology for Human Identification II
-
V. Dorairaj and N. Schmid, "Performance evaluation of iris based recognition system implementing PCA and ICA techniques," in Proc. SPIE Conf. Biometric Technol. Human Identif., Mar. 2005, pp. 51-58. (Pubitemid 41432813)
-
(2005)
Proceedings of SPIE - The International Society for Optical Engineering
, vol.5779
, pp. 51-58
-
-
Dorairaj, V.1
Schmid, N.A.2
Fahmy, G.3
-
14
-
-
33645997372
-
Robust iris recognition using advanced correlation techniques
-
Toronto, Canada, Sep. Springer Berlin/Heidelberg
-
J. Thornton, M. Savvides, and B. V. Kumar, "Robust iris recognition using advanced correlation techniques," in Proc. Second Int. Conf. Image Anal. Recogn. (ICIAR), Toronto, Canada, Sep. 2005, vol.3656, pp. 1098-1105, Springer Berlin/Heidelberg.
-
(2005)
Proc. Second Int. Conf. Image Anal. Recogn. (ICIAR)
, vol.3656
, pp. 1098-1105
-
-
Thornton, J.1
Savvides, M.2
Kumar, B.V.3
-
15
-
-
10044236589
-
A new iris segmentation method for recognition
-
Cambridge, U.K., Aug.
-
J. Huang, Y. Wang, T. Tan, and J. Cui, "A new iris segmentation method for recognition," in Proc. 17th Int. Conf. Pattern Recogn. (ICPR), Cambridge, U.K., Aug. 2004, vol.3, pp. 23-26.
-
(2004)
Proc. 17th Int. Conf. Pattern Recogn. (ICPR)
, vol.3
, pp. 23-26
-
-
Huang, J.1
Wang, Y.2
Tan, T.3
Cui, J.4
-
16
-
-
33747654545
-
Active shape models for effective iris segmentation
-
Orlando, FL, Apr.
-
A. Abhyankar and S. Schuckers, "Active shape models for effective iris segmentation," in Proc. SPIE Conf. Biometric Technol. Human Identif. III, Orlando, FL, Apr. 2006, pp. 62020H.1-62020H.10.
-
(2006)
Proc. SPIE Conf. Biometric Technol. Human Identif. III
-
-
Abhyankar, A.1
Schuckers, S.2
-
17
-
-
70450283690
-
Sources of error in iris biometrics
-
Univ. Notre Dame, Notre Dame, IN
-
K. P. Hollingsworth, "Sources of error in iris biometrics," Master's thesis, Graduate School of Comput. Sci. Eng., Univ. Notre Dame, Notre Dame, IN, 2008.
-
(2008)
Master's Thesis, Graduate School of Comput. Sci. Eng.
-
-
Hollingsworth, K.P.1
-
18
-
-
33746224769
-
A Human Identification Technique Using Images of the Iris and Wavelet Transform
-
PII S1053587X98029262
-
W. Boles and B. Boashash, "A human identification technique using images of the iris and wavelet transform," IEEE Trans. Signal Process., vol.46, no.4, pp. 1185-1188, Apr. 1998. (Pubitemid 128743857)
-
(1998)
IEEE Transactions on Signal Processing
, vol.46
, Issue.4
, pp. 1185-1188
-
-
Boles, W.W.1
Boashash, B.2
-
19
-
-
35248835190
-
Iris feature extraction using independent component analysis
-
Guildford, U.K.
-
K. Bae, S. Noh, and J. Kim, "Iris feature extraction using independent component analysis," in Proc. 4th Int. Conf. Audio and Video Based Biometric Person Authentic. (AVBPA), Guildford, U.K., 2003, pp. 838-844.
-
(2003)
Proc. 4th Int. Conf. Audio and Video Based Biometric Person Authentic. (AVBPA)
, pp. 838-844
-
-
Bae, K.1
Noh, S.2
Kim, J.3
-
20
-
-
26444519901
-
Performance evaluation of iris based recognition system implementing PCA and ICA encoding techniques
-
Orlando, FL, Apr.
-
V. Dorairaj, N. A. Schmid, and G. Fahmy, "Performance evaluation of iris based recognition system implementing PCA and ICA encoding techniques," in Proc. SPIE Conf. Biometric Technol. Human Identif. III, Orlando, FL, Apr. 2005.
-
(2005)
Proc. SPIE Conf. Biometric Technol. Human Identif. III
-
-
Dorairaj, V.1
Schmid, N.A.2
Fahmy, G.3
-
21
-
-
51949118164
-
Boosting ordinal features for accurate and fast iris recognition
-
Workshop Biometrics at the Computer Vision Pattern Recogn. Conf.
-
Z. He, Z. Sun, T. Tan, X. Qiu, C. Zhong, and W. Dong, "Boosting ordinal features for accurate and fast iris recognition," in Proc. IEEE Comput. Soc. Workshop Biometrics at the Computer Vision Pattern Recogn. Conf., 2008.
-
(2008)
Proc. IEEE Comput. Soc.
-
-
He, Z.1
Sun, Z.2
Tan, T.3
Qiu, X.4
Zhong, C.5
Dong, W.6
-
22
-
-
67651002245
-
Toward accurate and fast iris segmentation for iris biometrics
-
Jul.
-
Z. He, T. Tan, Z. Sun, and X. Qiu, "Toward accurate and fast iris segmentation for iris biometrics," IEEE Trans. Pattern Anal. Mach. Intell., vol.31, no.9, pp. 1670-1684, Jul. 2009.
-
(2009)
IEEE Trans. Pattern Anal. Mach. Intell.
, vol.31
, Issue.9
, pp. 1670-1684
-
-
He, Z.1
Tan, T.2
Sun, Z.3
Qiu, X.4
-
23
-
-
0037286207
-
Level set modeling and segmentation of DT-MRI brain data
-
Jan.
-
L. Zhukov, K. Museth, D. Breen, R. Whitaker, and A. Barr, "Level set modeling and segmentation of DT-MRI brain data," J. Electron. Imag., vol.12, no.1, pp. 125-133, Jan. 2003.
-
(2003)
J. Electron. Imag.
, vol.12
, Issue.1
, pp. 125-133
-
-
Zhukov, L.1
Museth, K.2
Breen, D.3
Whitaker, R.4
Barr, A.5
-
24
-
-
27144466983
-
Level set methods for the 3-D segmentation of CT images of abdominal aortic aneurysms
-
D. Magee, A. Buliptt, and E. Berry, "Level set methods for the 3-D segmentation of CT images of abdominal aortic aneurysms," in Proc. Med. Image Understand. Anal., 2001, pp. 141-144.
-
(2001)
Proc. Med. Image Understand. Anal.
, pp. 141-144
-
-
Magee, D.1
Buliptt, A.2
Berry, E.3
-
25
-
-
0029255247
-
Shape modeling with front propagation: A level set approach
-
Feb.
-
R. Malladi, J. A. Sethian, and B. C.Vemuri, "Shape modeling with front propagation: A level set approach," IEEE Trans. Pattern Anal. Mach. Intell., vol.17, no.2, pp. 125-133, Feb. 1995.
-
(1995)
IEEE Trans. Pattern Anal. Mach. Intell.
, vol.17
, Issue.2
, pp. 125-133
-
-
Malladi, R.1
Sethian, J.A.2
Vemuri, B.C.3
-
27
-
-
0034446966
-
Image inpainting
-
New York
-
M. Bertalmio, G. Sapiro, V. Caselles, and C. Ballester, "Image inpainting," in Proc. 27th Ann. Conf. Comput. Graphics Interact. Tech. (SIGGRAPH 2000), New York, 2000, pp. 417-424.
-
(2000)
Proc. 27th Ann. Conf. Comput. Graphics Interact. Tech. (SIGGRAPH 2000)
, pp. 417-424
-
-
Bertalmio, M.1
Sapiro, G.2
Caselles, V.3
Ballester, C.4
-
29
-
-
0001335838
-
A review of recent numerical algorithms for hypersurfaces moving with curvature dependent speed
-
J. A. Sethian, "A review of recent numerical algorithms for hypersurfaces moving with curvature dependent speed," J. Different. Geometry, vol.31, pp. 131-161, 1989.
-
(1989)
J. Different. Geometry
, vol.31
, pp. 131-161
-
-
Sethian, J.A.1
-
30
-
-
0031071476
-
Geodesic active contours
-
Feb./Mar.
-
V. Caselles, R. Kimmel, and G. Sapiro, "Geodesic active contours," Int. J. Comput. Vision, vol.22, no.1, pp. 61-79, Feb./Mar. 1997.
-
(1997)
Int. J. Comput. Vision
, vol.22
, Issue.1
, pp. 61-79
-
-
Caselles, V.1
Kimmel, R.2
Sapiro, G.3
-
31
-
-
0005196882
-
On active contour models and balloons
-
Image Process.: Image Understand
-
L. D. Cohen, "On active contour models and balloons," Comput. Vision, Graph., Image Process.: Image Understand., vol.53, no.2, pp. 211-218, 1991.
-
(1991)
Comput. Vision, Graph.
, vol.53
, Issue.2
, pp. 211-218
-
-
Cohen, L.D.1
-
32
-
-
0000655661
-
Crystal growth and dendritic solidification
-
J. Sethian and J. Strain, "Crystal growth and dendritic solidification," J. Computat. Phys., vol.98, pp. 231-253, 1992.
-
(1992)
J. Computat. Phys.
, vol.98
, pp. 231-253
-
-
Sethian, J.1
Strain, J.2
-
33
-
-
34250830971
-
Principal warps: Thin-plate splines and the decomposition of deformations
-
Jun.
-
F. L. Bookstein, "Principal warps: Thin-plate splines and the decomposition of deformations," IEEE Trans. Pattern Anal. Mach. Intell., vol.11, no.6, pp. 567-585, Jun. 1989.
-
(1989)
IEEE Trans. Pattern Anal. Mach. Intell.
, vol.11
, Issue.6
, pp. 567-585
-
-
Bookstein, F.L.1
-
34
-
-
34250090755
-
Snakes: Active contour models
-
M. Kass, A. Witkin, and D. Terzopoulos, "Snakes: Active contour models," Int. J. Comput. Vision, vol.1, no.4, pp. 321-331, 1987.
-
(1987)
Int. J. Comput. Vision
, vol.1
, Issue.4
, pp. 321-331
-
-
Kass, M.1
Witkin, A.2
Terzopoulos, D.3
-
35
-
-
0025465145
-
Scale-space and edge detection using anisotropic diffusion
-
Jul.
-
P. Perona and J. Malik, "Scale-space and edge detection using anisotropic diffusion," IEEE Trans. Pattern Anal. Mach. Intell., vol.12, no.7, pp. 629-639, Jul. 1990.
-
(1990)
IEEE Trans. Pattern Anal. Mach. Intell.
, vol.12
, Issue.7
, pp. 629-639
-
-
Perona, P.1
Malik, J.2
-
38
-
-
69949139991
-
Robust eyelid, eyelash and shadow localization for iris recognition
-
Z. He, T. Tan, Z. Sun, and X. Qiu, "Robust eyelid, eyelash and shadow localization for iris recognition," in Proc. ICIP, 2008, pp. 265-268.
-
(2008)
Proc. ICIP
, pp. 265-268
-
-
He, Z.1
Tan, T.2
Sun, Z.3
Qiu, X.4
-
41
-
-
50249182897
-
Segmenting nonideal irises using Geodesic Active Contours
-
Baltimore, MD, Sep.
-
A. Ross and S. Shah, "Segmenting nonideal irises using Geodesic Active Contours," in Proc. Biometrics Symp. (BSYM), Baltimore, MD, Sep. 2006. 758-767
-
(2006)
Proc. Biometrics Symp. (BSYM)
, pp. 758-767
-
-
Ross, A.1
Shah, S.2
-
43
-
-
23044435711
-
Short signatures from the weil pairing
-
D. Boneh, H. Shacham, and B. Lynn, "Short signatures from the weil pairing," J. Cryptol., vol.17, no.4, pp. 297-319, 2004.
-
(2004)
J. Cryptol.
, vol.17
, Issue.4
, pp. 297-319
-
-
Boneh, D.1
Shacham, H.2
Lynn, B.3
-
44
-
-
49549083913
-
Lookup-table-based secure client-side embedding for spread-spectrum watermarks
-
Sep.
-
M. U. Celik, A. N. Lemma, S. Katzenbeisser, and M. van der Veen, "Lookup-table-based secure client-side embedding for spread-spectrum watermarks," IEEE Trans. Inf. Forensics Security, vol.3, no.3, pp. 475-487, Sep. 2008.
-
(2008)
IEEE Trans. Inf. Forensics Security
, vol.3
, Issue.3
, pp. 475-487
-
-
Celik, M.U.1
Lemma, A.N.2
Katzenbeisser, S.3
Veen Der M.Van4
-
45
-
-
0024715386
-
Secure broadcasting using the secure lock
-
Aug.
-
G.-H. Chiou and W.-T. Chen, "Secure broadcasting using the secure lock," IEEE Trans. Softw. Eng., vol.15, no.8, pp. 929-934, Aug. 1989.
-
(1989)
IEEE Trans. Softw. Eng.
, vol.15
, Issue.8
, pp. 929-934
-
-
Chiou, G.-H.1
Chen, W.-T.2
-
46
-
-
0031362116
-
Secure spread spectrum watermarking for multimedia
-
Dec.
-
I. J. Cox, J. Kilian, T. Leighton, and T. Shamoon, "Secure spread spectrum watermarking for multimedia," IEEE Trans. Image Process., vol.6, no.12, pp. 1673-1687, Dec. 1997.
-
(1997)
IEEE Trans. Image Process.
, vol.6
, Issue.12
, pp. 1673-1687
-
-
Cox, I.J.1
Kilian, J.2
Leighton, T.3
Shamoon, T.4
-
49
-
-
57849116994
-
Buyer-sellerwatermarking protocols with off-line trusted third parties
-
C.-I. Fan, M.-T. Chen, and W.-Z. Sun, "Buyer-sellerwatermarking protocols with off-line trusted third parties," Int. J. Ad Hoc Ubiquitous Comput., vol.4, no.1, pp. 36-43, 2009.
-
(2009)
Int. J. Ad Hoc Ubiquitous Comput.
, vol.4
, Issue.1
, pp. 36-43
-
-
Fan, C.-I.1
Chen, M.-T.2
Sun, W.-Z.3
-
50
-
-
0032072064
-
Watermarking of uncompressed and compressed video
-
F. Hartung and B. Girod, "Watermarking of uncompressed and compressed video," Signal Process., vol.66, no.3, pp. 283-301, 1998.
-
(1998)
Signal Process.
, vol.66
, Issue.3
, pp. 283-301
-
-
Hartung, F.1
Girod, B.2
-
51
-
-
0032634857
-
Multimedia watermarking techniques
-
Jul.
-
F. Hartung and M. Kutter, "Multimedia watermarking techniques," in Proc. IEEE, Jul. 1999, vol. 87, no. 7, pp. 1079-1107.
-
(1999)
Proc. IEEE
, vol.87
, Issue.7
, pp. 1079-1107
-
-
Hartung, F.1
Kutter, M.2
-
52
-
-
33750960705
-
Key distribution scheme based on two cryptosystems for hierarchical access control
-
Feb. 20-22
-
B. Hu, W. Ye, S.-L. Feng, X.-L. Wang, and X. Xie, "Key distribution scheme based on two cryptosystems for hierarchical access control," in ICACT 2006, Feb. 20-22, 2006, pp. 1723-1728.
-
(2006)
ICACT 2006
, pp. 1723-1728
-
-
Hu, B.1
Ye, W.2
Feng, S.-L.3
Wang, X.-L.4
Xie, X.5
-
53
-
-
4444247533
-
Modeling and implementation of digital rights
-
S. O. Hwang, K. S. Yoon, K. P. Jun, and K. H. Lee, "Modeling and implementation of digital rights," J. Syst. Softw., vol.73, no.3, pp. 533-549, 2004.
-
(2004)
J. Syst. Softw.
, vol.73
, Issue.3
, pp. 533-549
-
-
Hwang, S.O.1
Yoon, K.S.2
Jun, K.P.3
Lee, K.H.4
-
54
-
-
33750560169
-
Attacks and forensic analysis for multimedia content protection
-
Amsterdam
-
H. Jin and J. Lotspiech, "Attacks and forensic analysis for multimedia content protection," in Proc. Int. Conf. Multimedia Expo (ICME 2005), Amsterdam, 2005, pp. 1392-1395.
-
(2005)
Proc. Int. Conf. Multimedia Expo (ICME 2005)
, pp. 1392-1395
-
-
Jin, H.1
Lotspiech, J.2
-
56
-
-
35248849802
-
An anonymous buyerseller watermarking protocol with anonymity control
-
Seoul, Korea, 2002
-
H. S. Ju, H. J. Kim, D. H. Lee, and J. I. Lim, "An anonymous buyerseller watermarking protocol with anonymity control," in Information Security Cryptology (ICISC), Seoul, Korea, 2002, vol.2587/2003, pp. 421-432.
-
(2003)
Information Security Cryptology (ICISC)
, vol.2587
, pp. 421-432
-
-
Ju, H.S.1
Kim, H.J.2
Lee, D.H.3
Lim, J.I.4
-
58
-
-
56749170420
-
A buyer-seller watermarking protocol based on secure embedding
-
Dec.
-
S. Katzenbeisser, A. Lemma, M. U. Celik, M. van der Veen, and M. Maas, "A buyer-seller watermarking protocol based on secure embedding," IEEE Trans. Inf. Forensics Security, vol.3, no.4, pp. 783-786, Dec. 2008.
-
(2008)
IEEE Trans. Inf. Forensics Security
, vol.3
, Issue.4
, pp. 783-786
-
-
Katzenbeisser, S.1
Lemma, A.2
Celik, M.U.3
Veen Der M.Van4
Maas, M.5
-
59
-
-
11144253373
-
Video fingerprinting and encryption principles for digital rights management
-
Jun.
-
D. Kundur and K. Karthik, "Video fingerprinting and encryption principles for digital rights management," in Proc. IEEE, Jun. 2004, vol.92, pp. 918-932.
-
(2004)
Proc. IEEE
, vol.92
, pp. 918-932
-
-
Kundur, D.1
Karthik, K.2
-
60
-
-
0035307977
-
A buyer seller watermarking protocol
-
Apr.
-
N. Memon and P. W. Wong, "A buyer seller watermarking protocol," IEEE Trans. Image Process., vol.10, no.4, pp. 643-649, Apr. 2001.
-
(2001)
IEEE Trans. Image Process.
, vol.10
, Issue.4
, pp. 643-649
-
-
Memon, N.1
Wong, P.W.2
-
61
-
-
84944878354
-
-
Boca Raton, FL: CRC Press
-
A. Menezes, P. van Oorschot, and S. Vanstone, Handbook of Applied Cryptography. Boca Raton, FL: CRC Press, 1996, pp. 610-612.
-
(1996)
Handbook of Applied Cryptography
, pp. 610-612
-
-
Menezes, A.1
Van Oorschot, P.2
Vanstone, S.3
-
62
-
-
33744721541
-
Optimization and evaluation of randomized c-secure CRT code defined on polynomial ring
-
Canada, May 23-25
-
H. Muratani, "Optimization and evaluation of randomized c-secure CRT code defined on polynomial ring," in Proc. IH 2004, Canada, May 23-25, 2004, pp. 282-292.
-
(2004)
Proc. IH 2004
, pp. 282-292
-
-
Muratani, H.1
-
63
-
-
63749101051
-
Privacy preserving multiparty multilevel DRM architecture
-
Las Vegas, NV
-
A. Sachan, S. Emmanuel, A. Das, and M. Kankanhalli, "Privacy preserving multiparty multilevel DRM architecture," in Proc. Consumer Communications and Networking Conf., Las Vegas, NV, 2009, pp. 1-5.
-
(2009)
Proc. Consumer Communications and Networking Conf.
, pp. 1-5
-
-
Sachan, A.1
Emmanuel, S.2
Das, A.3
Kankanhalli, M.4
-
64
-
-
70450228510
-
Secure multimedia content delivery with multiparty multilevelDRMarchitecture
-
Williamsburg, VA
-
T. Thomas, S. Emmanuel, A. Das, and M. S. Kankanhalli, "Secure multimedia content delivery with multiparty multilevelDRMarchitecture," in Proc. 18th Int. Workshop Network and Operating Systems Support for Digital Audio and Video, Williamsburg, VA, 2009, pp. 85-90.
-
(2009)
Proc. 18th Int. Workshop Network and Operating Systems Support for Digital Audio and Video
, pp. 85-90
-
-
Thomas, T.1
Emmanuel, S.2
Das, A.3
Kankanhalli, M.S.4
-
65
-
-
85032751127
-
Mean squared error: Lot it or leave it? A new look at signal fidelity measures
-
Jan.
-
Z. Wang and A. C. Bovik, "Mean squared error: Lot it or leave it? A new look at signal fidelity measures," IEEE Signal Process. Mag., vol.26, no.1, pp. 98-117, Jan. 2009.
-
(2009)
IEEE Signal Process. Mag.
, vol.26
, Issue.1
, pp. 98-117
-
-
Wang, Z.1
Bovik, A.C.2
|