-
1
-
-
79959563199
-
A proposal for comprehensive solution to the problems of passport's authentication
-
Al-Hamami, A.H. and S.A. Al-Anni, 2005. A proposal for comprehensive solution to the problems of passport's authentication. Inform. Technol. J., 4: 146-150.
-
(2005)
Inform. Technol. J.
, vol.4
, pp. 146-150
-
-
Al-Hamami, A.H.1
Al-Anni, S.A.2
-
2
-
-
33646345831
-
Analysis and enhancement of authentication algorithms in mobile networks
-
DOI 10.3923/jas.2006.872.877
-
Al-Saraireh, J., S. Yousef and M. Al-Nabhan, 2006. Analysis and enhancement of authentication algorithms in mobile networks. J. Applied Sci., 6: 872-877. (Pubitemid 43664369)
-
(2006)
Journal of Applied Sciences
, vol.6
, Issue.4
, pp. 872-877
-
-
Al-Saraireh, J.1
Yousef, S.2
Al Nabhan, M.3
-
3
-
-
34248567082
-
Watermarking technologies for security-enhanced printed documents
-
Safety and Security
-
Anan, T., K. Kuraki and S. Nakagata, 2007. Watermarking technologies for security-enhanced printed documents. Fujitsu Sci. Tech. J., 43: 197-203. (Pubitemid 46750363)
-
(2007)
Fujitsu Scientific and Technical Journal
, vol.43
, Issue.2
, pp. 197-203
-
-
Anan, T.1
Kuraki, K.2
Nakagata, S.3
-
4
-
-
33845455702
-
A new multi-set modulation technique for increasing hiding capacity of binary watermark for print and scan processes
-
Digital Watermarking - 5th International Workshop, IWDW 2006, Proceedings
-
Culnane, C, H. Treharne and A.T.S. Ho, 2006. A new multi-set modulation technique for increasing hiding capacity of binary watermark for print and scan processes. Proceedings of the Digital Watermarking 5th International Workshop. Nov. 8-10, Jeju Island, South Korea, Springer-Verlag, pp: 96-110. (Pubitemid 44891629)
-
(2006)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.4283
, pp. 96-110
-
-
Culnane, C.1
Treharne, H.2
Ho, A.T.S.3
-
6
-
-
0032650557
-
Content based digital signature for motion picture authentication and content-fragile watermarking
-
June 7-11, Florence, Italy, IEEE
-
DittmanJ., A. Steinmetz and R. Steinmetz, 1999. Content based digital signature for motion picture authentication and content-fragile watermarking. Proceedings of the IEEE Int. Conf. Multimedia Comput. and Systems. June 7-11, Florence, Italy, IEEE, pp: 209-213.
-
(1999)
Proceedings of the IEEE Int. Conf. Multimedia Comput. and Systems
, pp. 209-213
-
-
Dittman, J.1
Steinmetz, A.2
Steinmetz, R.3
-
8
-
-
84962762130
-
Robust hash functions for digital watermarking
-
Mar. 27-29, Las Vegas, NV, USA.
-
Fridrich, J. and M. Goljan, 2000. Robust hash functions for digital watermarking. Proceedings of the International Conference on Information Technology: Coding and Computing, Mar. 27-29, Las Vegas, NV, USA., pp: 178-183.
-
(2000)
Proceedings of the International Conference on Information Technology: Coding and Computing
, pp. 178-183
-
-
Fridrich, J.1
Goljan, M.2
-
9
-
-
79959539260
-
Password-based key authentication model-anew approach
-
Ibrahim, Y.K., 2007. Password-based key authentication model-anew approach. Trends Applied Sci. Res., 2: 456-459.
-
(2007)
Trends Applied Sci. Res.
, vol.2
, pp. 456-459
-
-
Ibrahim, Y.K.1
-
10
-
-
20444500587
-
Robust perceptual image hashing via matrix invariants
-
2004 International Conference on Image Processing, ICIP 2004
-
Kozat, S.S., R. Venkatesan and M.K. Mihcak, 2004. Robust perceptual image hashing via matrix invariants. Proceedings of the International Conference on Image Processing (TOP). Singapore, Oct. 24-27, IEEE, pp: 3443-3446. (Pubitemid 40820815)
-
(2004)
Proceedings - International Conference on Image Processing, ICIP
, vol.2
, pp. 3443-3446
-
-
Kozat, S.S.1
Venkatesan, R.2
Mihcak, M.K.3
-
11
-
-
0035248504
-
A robust image authentication method distinguishing JPEG compression from malicious manipulation
-
Lin, C.Y. and S.F. Chang, 2001. A robust image authentication method distinguishing JPEG compression from malicious manipulation. IEEE Trans. Circuits Syst. Video Technol., 11: 153-168.
-
(2001)
IEEE Trans. Circuits Syst. Video Technol.
, vol.11
, pp. 153-168
-
-
Lin, C.Y.1
Chang, S.F.2
-
12
-
-
0037818310
-
Structural digital signature for image authentication: An incidental distortion resistant scheme
-
Lu, C. S. and H. Y.M. Liao, 2003. Structural digital signature for image authentication: An incidental distortion resistant scheme. IEEE Trans. Multimedia, 5: 161-173.
-
(2003)
IEEE Trans. Multimedia
, vol.5
, pp. 161-173
-
-
Lu, C.S.1
Liao, H.Y.M.2
-
13
-
-
0141850639
-
New iterative geometric techniques for robust image hashing
-
Nov. 5, Springer- Verlag, Philadelphia, PA, USA
-
Mihcak, M.K. and R. Venkatesan, 2001. New iterative geometric techniques for robust image hashing. Proceedings of the ACM Workshop on Security and Privacy in Digital Rights Management. Nov. 5, Springer-Verlag, Philadelphia, PA, USA, pp: 13-21.
-
(2001)
Proceedings of the ACM Workshop on Security and Privacy in Digital Rights Management
, pp. 13-21
-
-
Mihcak, M.K.1
Venkatesan, R.2
-
14
-
-
33644995471
-
Secure implementation of message digest, authentication and digital signature
-
Rabah, K., 2005. Secure implementation of message digest, authentication and digital signature. Inform. Technol. J., 4: 204-221.
-
(2005)
Inform. Technol. J.
, vol.4
, pp. 204-221
-
-
Rabah, K.1
-
15
-
-
0030409375
-
A robust content based digital signature for image authentication
-
Sep. 16-19, IEEE, Lausanne, Switzerland
-
Schneider, M. and S.F. Chang, 1996. A robust content based digital signature for image authentication. Proceedings of the IEEE Conf. Image Process. Sep. 16-19, IEEE, Lausanne, Switzerland, pp: 227-230.
-
(1996)
Proceedings of the IEEE Conf. Image Process
, pp. 227-230
-
-
Schneider, M.1
Chang, S.F.2
-
16
-
-
33751048334
-
Avoidance of intruder attack with changed Bluetooth authentication procedure
-
Suri, P.R. and S. Rani, 2006. Avoidance of intruder attack with changed bluetooth authentication procedure. Inform. Technol. J., 5: 1033-1037. (Pubitemid 44759704)
-
(2006)
Information Technology Journal
, vol.5
, Issue.6
, pp. 1033-1037
-
-
Suri, P.R.1
Rani, S.2
-
17
-
-
70349202199
-
Data hiding in hard-copy text documents robust to print, scan and photocopy operations
-
Apr. 19-24, Taipei, Taiwan, IEEE
-
Varna, A.L., S. Rane and A. Vetro, 2009. Data hiding in hard-copy text documents robust to print, scan and photocopy operations. Proceedings of the ICASSP. Apr. 19-24, Taipei, Taiwan, IEEE, pp: 1397-1400.
-
(2009)
Proceedings of the ICASSP
, pp. 1397-1400
-
-
Varna, A.L.1
Rane, S.2
Vetro, A.3
-
18
-
-
0034444578
-
Robust image hashing
-
Sep. 10-13, Vancouver, BC, Canada, IEEE
-
Venkatesan, R., S.M. Koon, M.H. Jakubowski and P. Moulin, 2000. Robust image hashing. Proceedings of the IEEE Conf. Image Processing. Sep. 10-13, Vancouver, BC, Canada, IEEE, pp: 664-666.
-
(2000)
Proceedings of the IEEE Conf. Image Processing
, pp. 664-666
-
-
Venkatesan, R.1
Koon, S.M.2
Jakubowski, M.H.3
Moulin, P.4
-
19
-
-
77954507696
-
Survey of anonymity and authentication in P2P networks
-
Wang, X., L. Yang, X. Sun, J. Han, W. Liang and L. Huang, 2010. Survey of anonymity and authentication in P2P networks. Inform. Technol. J., 9: 1165-1171.
-
(2010)
Inform. Technol. J.
, vol.9
, pp. 1165-1171
-
-
Wang, X.1
Yang, L.2
Sun, X.3
Han, J.4
Liang, W.5
Huang, L.6
|