نتایج جستجو برای: wise foundations authentication

تعداد نتایج: 90938  

Journal: :Entropy 2013
Abdullah M. Iliyasu

Exploiting the promise of security and efficiency that quantum computing offers, the basic foundations leading to commercial applications for quantum image processing are proposed. Two mathematical frameworks and algorithms to accomplish the watermarking of quantum images, authentication of ownership of already watermarked images and recovery of their unmarked versions on quantum computers are ...

Journal: :TIIS 2009
Aziz Mohaisen Jeong Woon Choi Dowon Hong

In this article, we demonstrate that the asymmetric key-based architecture for securing wireless sensor networks recently introduced by Haque et al. is insecure under impersonation attack, since it does not provide authentication semantics. In addition, we show that, for the scheme to work correctly, the resulting key distribution construction should be symmetric and group-wise.

2008
Romualdas Baušys Artūras Kriukovas

The paper proposes a digital signature-based approach for image authentication, pixel-wise tamper localization and iterative restoration. Usage cases for semi-fragile watermarking and proposed digital signature are analyzed, the advantages of the digital signature method are presented. Integration with Public Key Infrastructure (PKI) is outlined and discussed.

1999
Vladik Kreinovich

In traditional mechanics, most interactions are pair-wise; if we omit one of the particles from our description, then the original pair-wise interaction can sometimes only be represented as interaction between triples, etc. It turns out that, vice versa, every possible interaction between N particles can be represented as pair-wise interaction if we represent each of the original N particles as...

2016
Ashutosh Pandey

This paper proposes a novel pixel wise fragile watermarking scheme in spatial domain by which one can effectively locate the tamper in every pixel of the images accurately and scheme is also protected by user defined secret key which is given explicitly. Proposed watermarking algorithms has good PSNR value and have less complexity of algorithms. Proposed algorithms can also work on color images...

2013
P. M. Kakade V. V. Kimbahune

The Wireless Sensor Network (WSN) is one of the core technologies to form the future networks. As WSN consisting of several sink nodes and sensor nodes, while it have many advantages, such as the compact size and the low cost, corresponding constraints on resources can result. The greatest challenge among all is that distinguishing and revoking compromised sensors. Traditional techniques are us...

Journal: :Journal of Multimedia 2011
Chin-Feng Lee Kuo-Nan Chen Chin-Chen Chang Meng-Cheng Tsai

This paper proposes a hierarchical fragile watermarking scheme for image authentication with localization and recovery. Two phases are exploited for pixel-wise and block-wise authenticity. By applying the singular value decomposition (SVD), only a few pixels need to be modified to carry these watermark bits so we can produce high quality of the watermarked image and achieve the integrity verifi...

2016
A. Senthil Kumar E. Logashanmugam

The Three Tier Security Scheme for Wireless Sensor Networks (WSNs) was introduced basically to improve the cost efficiency of the system. This is because the incorporation of asymmetric keys increases the computational and memory costs. But, the cost of key pre distribution schemes is low and they provide secure communication between Sensor Nodes (SNs) and mobile sinks. However, Pair wise key e...

Journal: :Journal of Computer Security 2010
Long Hoang Nguyen A. W. Roscoe

One of the main challenges in pervasive computing is how we can establish secure communication over an untrusted high-bandwidth network without any initial knowledge or a Public Key Infrastructure. An approach studied by a number of researchers is building security though human work creating a low-bandwidth empirical (or authentication) channel where the transmitted information is authentic and...

Journal: :Computer systems science and engineering 2023

Palmprint identification has been conducted over the last two decades in many biometric systems. High-dimensional data with uncorrelated and duplicated features remains difficult due to several computational complexity issues. This paper presents an interactive authentication approach based on deep learning feature selection that supports authentication. The proposed model stages of learning; f...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید