Search results for "Data_MISCELLANEOUS"
showing 10 items of 31 documents
Fingerprint Traits and RSA Algorithm Fusion Technique
2012
The present work deals with modern computing systems security issues, focusing on biometric based asymmetric keys generation process. Conventional PKI systems are based on private/public keys generated through RSA or similar algorithms. The present solution embeds biometric information on the private/public keys generation process. In addition the corresponding private key depends on physical or behavioural biometric features and it can be generated when it is needed. Starting from fingerprint acquisition, the biometric identifier is extracted, cyphered, and stored in tamper-resistant smart card to overcome the security problems of centralized databases. Biometric information is then used f…
Introducing Pseudo-Singularity Points for Efficient Fingerprints Classification and Recognition
2010
Fingerprint classification and matching are two key issues in automatic fingerprint recognition. Generally, fingerprint recognition is based on a set of relevant local characteristics, such as ridge ending and bifurcation (minutiae). Fingerprint classification is based on fingerprint global features, such as core and delta singularity points. Unfortunately, singularity points are not always present in a fingerprint image: the acquisition process is not ideal, so that the fingerprint is broken, or the fingerprint belongs to the arch class. In the above cases, pseudo-singularity-points will be detected and extracted to make possible fingerprint classification and matching. As result, fingerpr…
Sentence Induced Transformations in Conceptual Spaces
2008
The proposed work illustrates how "primitive concepts" can be automatically induced from a text corpus. The primitive concepts are identified by the orthonormal axis of a "conceptual" space induced by a methodology inspired to the latent semantic analysis approach. The methodology represents a natural language sentence by means of a set of rotations of an orthonormal basis in the "conceptual"space. The rotations, triggered by the sequence of words composing the sentence and realized by means of geometric algebra rotors, allow to highlight "conceptual" relations that can arise among the primitive concepts.
Right-arm rotation distance between binary trees
2003
We consider a transformation on binary trees, named right-arm rotation, which is a special instance of the well-known rotation transformation. Only rotations at nodes of the right arm of the trees are allowed. Using ordinal tools, we give an efficient algorithm for computing the right-arm rotation distance between two binary trees, i.e., the minimum number of rightarm rotations necessary to transform one tree into the other.
Redibujar la educación artística o rediseñar el papel educativo del dibujo.
2017
Ana Mae Barbosa, figura clave del panorama internacional de la educación en artes, fue presidenta de InSEA y mantiene una lucha constante por unificar esfuerzos promoviendo las artes en las políticas educativas. Su último libro se organiza mediante etapas históricas, ubicando personajes brasileños de inicios del siglo XX (Theodoro Braga, Cecília Meireles, Edgar Sussekind de Mendonça) imbricados con autores anglosajones (John Dewey, Viktor Lowenfeld, Marion Richardson, Herbert Read). A pesar del supuesto engranaje historicista, sus reflexiones nos acercan constantemente la actualidad. Consigue emocionar, y se ha equilibrado un ejercicio de memoria histórica con la necesaria reflexión crítica…
Biometric sensors rapid prototyping on field-programmable gate arrays
2015
AbstractBiometric user authentication in large-scale distributed systems involves passive scanners and networked workstations and databases for user data acquisition, processing, and encryption. Unfortunately, traditional biometric authentication systems are prone to several attacks, such as Replay Attacks, Communication Attacks, and Database Attacks. Embedded biometric sensors overcome security limits of conventional software recognition systems, hiding its common attack points. The availability of mature reconfigurable hardware technology, such as field-programmable gate arrays, allows the developers to design and prototype the whole embedded biometric sensors. In this work, two strong an…
Geographical Database Watermarking by Polygon Elongation (Technical Report)
2007
Due to the ease of digital copy, watermarking is crucial to protect the intellectual property of rights owners. We propose an effective watermarking method for vectorial geographical databases, with the focus on the buildings layer. Embedded watermarks survive common geographical filters, including the essential squaring and simplification transformations, as well as deliberate removal attempts, e.g. by noise addition, cropping or over-watermarking. The impact on the quality of the datasets, defined as a composition of point accuracy and angular quality, is assessed through an extensive series of experiments. Our method is based on a quantization of the distance between the centroid of the …
Blind Robust 3-D Mesh Watermarking Based on Mesh Saliency and QIM Quantization for Copyright Protection
2019
International audience; Due to the recent demand of 3-D models in several applications like medical imaging, video games, among others, the necessity of implementing 3-D mesh watermarking schemes aiming to protect copyright has increased considerably. The majority of robust 3-D watermark-ing techniques have essentially focused on the robustness against attacks while the imperceptibility of these techniques is still a real issue. In this context, a blind robust 3-D mesh watermarking method based on mesh saliency and Quantization Index Modulation (QIM) for Copyright protection is proposed. The watermark is embedded by quantifying the vertex norms of the 3-D mesh using QIM scheme since it offe…
Plenoptic image watermarking to preserve copyright
2017
Common camera loses a huge amount of information obtainable from scene as it does not record the value of individual rays passing a point and it merely keeps the summation of intensities of all the rays passing a point. Plenoptic images can be exploited to provide a 3D representation of the scene and watermarking such images can be helpful to protect the ownership of these images. In this paper we propose a method for watermarking the plenoptic images to achieve this aim. The performance of the proposed method is validated by experimental results and a compromise is held between imperceptibility and robustness.
Advantages of Public Cloud Infrastructure in Different Technology Adoption Lifecycle Stages
2012
Independent software vendors (ISV) utilize cloud infrastructure for different reasons. We hypothesize that the motivation to adopt cloud infrastructure-as-a-service (IaaS) changes as the ISV’s product is getting adopted by the market. In this paper we consider how the infrastructure needs of ISVs change along the stages of ISV product’s adoption lifecycle, and analyze the potential benefits of utilizing IaaS in different stages. The analysis is illustrated with the cases of ISV firms with documented use of IaaS. These cases support the hypothesis that different benefits of IaaS are gaining importance along the adoption lifecycle. peerReviewed