2,599 research outputs found

    Security of an ill-posed operator based scheme for image authentication

    Get PDF

    Robust image hashing using ring partition-PGNMF and local features

    Get PDF

    Risky business: managing electronic payments in the 21st Century

    Get PDF
    On June 20 and 21, 2005, the Payment Cards Center of the Federal Reserve Bank of Philadelphia, in conjunction with the Electronic Funds Transfer Association (EFTA), hosted a day-and-a-half forum, “Risky Business: Managing Electronic Payments in the 21st Century.” The Center and EFTA invited participants from the financial services and processing sectors, law enforcement, academia, and policymakers to explore key topics associated with the challenge of effectively managing risk in a payments environment that is increasingly electronic. The meeting’s goal was to identify areas of potential risk and explore interindustry solutions. This paper provides highlights from the forum presentations and ensuing conversations.

    The Value of User-Visible Internet Cryptography

    Full text link
    Cryptographic mechanisms are used in a wide range of applications, including email clients, web browsers, document and asset management systems, where typical users are not cryptography experts. A number of empirical studies have demonstrated that explicit, user-visible cryptographic mechanisms are not widely used by non-expert users, and as a result arguments have been made that cryptographic mechanisms need to be better hidden or embedded in end-user processes and tools. Other mechanisms, such as HTTPS, have cryptography built-in and only become visible to the user when a dialogue appears due to a (potential) problem. This paper surveys deployed and potential technologies in use, examines the social and legal context of broad classes of users, and from there, assesses the value and issues for those users

    A HIGH SPEED VLSI ARCHITECTURE FOR DIGITAL SPEECH WATERMARKING WITH COMPRESSION

    Get PDF
    The need to provide a copy right protection on digital watermarking to multimedia data like speech, image or video is rapidly increasing with an intensification in the application in these areas. Digital watermarking has received a lot of attention in the past few years. A hardware system based solely on DSP processors are fast but may require more area, cost or power if the target application requires a large amount of parallel processing. An FPGA co-processor can provide as many as 550 parallel multiply and accumulate operations on a single device, but FPGAs excel at processing large amounts of data in parallel, as they are not optimized as processors for tasks such as periodic coefficient updates, decision- making control tasks. Combination of both the FPGA and DSP processor delivers an attractive solution for a wide range of applications. A hardware implementation of digital speech watermarking combined with speech compression, encryption on heterogeneous platform is made in this paper. It is observed that the proposed architecture is able to attain high speed while utilizing optimal resources in terms of area

    Single-shot compressed ultrafast photography: a review

    Get PDF
    Compressed ultrafast photography (CUP) is a burgeoning single-shot computational imaging technique that provides an imaging speed as high as 10 trillion frames per second and a sequence depth of up to a few hundred frames. This technique synergizes compressed sensing and the streak camera technique to capture nonrepeatable ultrafast transient events with a single shot. With recent unprecedented technical developments and extensions of this methodology, it has been widely used in ultrafast optical imaging and metrology, ultrafast electron diffraction and microscopy, and information security protection. We review the basic principles of CUP, its recent advances in data acquisition and image reconstruction, its fusions with other modalities, and its unique applications in multiple research fields

    Robust pre-processing techniques for non-ideal iris images

    Get PDF
    The human iris has been demonstrated to be a very accurate, non-invasive and easy-to-use biometric for personal identification. Most of the current state-of-the-art iris recognition systems require the iris acquisition to be ideal. A lot of constraints are hence put on the user and the acquisition process.;Our aim in this research is to relax these conditions and to develop a pre-processing algorithm, which can be used in conjunction with any matching algorithm to handle the so-called non-ideal iris images. In this thesis we present a few robust techniques to process the non-ideal iris images so as to give a segmented iris image to the matching algorithm. The motivation behind this work is to reduce the false reject rates of the current recognition systems and to reduce the intra-class variability. A new technique for estimating and compensating the angle in non-frontal iris images is presented. We have also developed a novel segmentation algorithm, which uses an ellipse-fitting approach for localizing the pupil. A fast and simple limbus boundary segmentation algorithm is also presented

    Washington\u27s Electronic Signature Act: An Anachronism in the New Millennium

    Get PDF
    Today, electronic contracting is at the forefront of how consumers, governments, and businesses conduct their affairs. Over the last several decades, electronic contracting has taken on new forms that have raised doubts about contract formation and enforceability. In order to facilitate commerce, the federal government and forty-nine states have responded by passing legislation that gives broad legal recognition to electronic signatures. Washington State is currently the only state that has not updated its electronic signature statute to comport with modern technology and ways of doing business. As a result, Washington’s Electronic Authentication Act is likely preempted by federal law, and it presents an uncertain environment for electronic contracting. This Comment argues that Washington should join the overwhelming majority of states in adopting the Uniform Electronic Transactions Act to optimize its statutory framework for facilitating electronic contracting
    • …
    corecore