UM

Browse/Search Results:  1-7 of 7 Help

Filters    
Selected(0)Clear Items/Page:    Sort:
Combining two strategies to optimize biometric decisions against spoofing attacks Conference paper
Proceedings of SPIE - The International Society for Optical Engineering, San Diego, CA, AUG 18-20, 2014
Authors:  Li W.;  Poh N.;  Zhou Y.
Favorite  |  View/Download:6/0  |  Submit date:2018/12/21
Biometric Authorization  Biometric Verification  Spoof Attack  
A SIFT and local features based integrated method for copy-move attack detection in digital image Conference paper
2013 IEEE International Conference on Information and Automation, ICIA 2013, Yinchuan, CHINA, AUG 26-28, 2013
Authors:  Liu B.;  Pun C.-M.
Favorite  |  View/Download:6/0  |  Submit date:2019/02/14
Authenticity Verification  Copy-move Attack  Digital Image Forensics  Gabor Filter  Sift  
Analysis of general opinions about Sina Weibo micro-blog real-name verification system Conference paper
1st International Conference on Future Generation Communication Technologies, FGCT 2012
Authors:  Fong S.;  Zhuang Y.;  Lu L.;  Tang R.
Favorite  |  View/Download:3/0  |  Submit date:2019/02/13
data mining  Real-name verification  Sina Weibo micro blog  Social network  Statistics  
Analyzing and verifying Petri net model of security protocol based on Maria Conference paper
ICCASM 2010 - 2010 International Conference on Computer Application and System Modeling, Proceedings
Authors:  Wang Y.;  Zhou J.;  Li H.;  Hao Y.
Favorite  |  View/Download:1/0  |  Submit date:2018/12/22
Analysis and verification  Maria  Petri net  Security protocol  
Digital image watermarking with blind detection for copyright verification Conference paper
Proceedings - 1st International Congress on Image and Signal Processing, CISP 2008, Sanya, PEOPLES R CHINA, MAY 27-30, 2008
Authors:  Kong I.-K.;  Pun C.-M.
Favorite  |  View/Download:4/0  |  Submit date:2019/02/14
Copyright Verification  Digital Watermarking  Wavelet Packet  
Unifying proof methodologies of duration calculus and timed linear temporal logic Conference paper
Formal Aspects of Computing
Authors:  Liu Z.;  Ravn A.P.;  Li X.
Favorite  |  View/Download:2/0  |  Submit date:2019/02/14
Design  Real-time  Refinement  Specification  Verification  
Modelling and verification of a network player system with DCValid Conference paper
Proceedings - 1st Asia-Pacific Conference on Quality Software, APAQS 2000
Authors:  Wang J.;  Xu Q.;  Ma H.
Favorite  |  View/Download:1/0  |  Submit date:2019/04/04
Multimedia Systems  Real-Time  Specification and Verification  Temporal Logic