Filters








32,314 Hits in 5.2 sec

Verifiable Distribution of Material Goods Based on Cryptology

Radomír Palovský
2015 Acta Informatica Pragensia  
Extension consisting of adding digital signatures to revenue stamps used for state-controlled goods is also presented.  ...  This distribution is based on printing such a QR code on goods, which would contain digitally signed serial number of the product, and validity of this digital signature could be verifiable by a customer  ...  Goods digitally signed in accordance with this architecture would be much more complicated to counterfeit, and it would be much more difficult to create cryptographically valid fake item.  ... 
doi:10.18267/j.aip.76 fatcat:fi5xoif6nbb73gnbznfjhl33lu

Narrative of Digital Signature Technology and Moving Forward

Galoh Rashidah Haron, Nor Izyani Daud, Moesfa Soeheila Mohamad
2019 International Journal of Intelligent Computing Research  
In the final, a digital signature ecosystem which is based on a client and server technology is successfully released, which includes a web signature script to simplify the digital signature as a service  ...  The paper presents the technology curves in developing a digital signature solution for the web environment.  ...  The development of the digital signature solution for web environment is completed.  ... 
doi:10.20533/ijicr.2042.4655.2019.0123 fatcat:h5bei4bekfgbndvnxiz46rrt2e

Breathing Life into Models: The Next Generation of Enterprise Modeling [article]

Peter Fettke, Wolfgang Reisig
2022 arXiv   pre-print
It allows to "breath life" into (static) models, and it implies a new understanding of the "pleasantness" of computer-integrated systems, which is well-needed in the age of "digital first".  ...  This keynote shows that a seamless transition between both sides can be achieved by a framework with architecture, statics, and dynamics as the three pillars of modeling computer-integrated systems.  ...  Fig. 1 depicts one exemplar of a digital stamp; each digital stamp carries a unique matrix code for individual identification. Architecture The basic concept of architecture is modules.  ... 
arXiv:2205.09591v1 fatcat:wpr7wszwazhydhq5leefdvgnmq

A novel method for identifying the deep neural network model with the Serial Number [article]

XiangRui Xu, YaQin Li, Cao Yuan
2019 arXiv   pre-print
Recently, trigger-set watermarking, breaking the white-box restriction, relying on adversarial training pre-defined (incorrect) labels for crafted inputs, and subsequently using them to verify the model  ...  In this paper, we put forth a new framework of the trigger-set watermark by embedding a unique Serial Number (relatedness less original labels) to the deep neural network for model ownership identification  ...  the signature algorithm and gets the digital signature S.  ... 
arXiv:1911.08053v1 fatcat:othkd6t63jfzjgzogjxntbqiau

Digital identity security architecture in Ethos

W. Michael Petullo, Jon A. Solworth
2011 Proceedings of the 7th ACM workshop on Digital identity management - DIM '11  
These protections are essential to protect digital identity systems from attack.  ...  A certificate is a signed statement; the user's private key must have been used to create the certificate's signature and the resulting certificate is tamper evident.  ...  The certificate's digital signature Size Ver.  ... 
doi:10.1145/2046642.2046648 dblp:conf/dim/PetulloS11 fatcat:7kxmilrodva4tcul4qrmgvkw7y

Methods and Technologies for Protecting Pharmaceutical Products in Polymer Packaging from Counterfeiting

Chistyakova T. B, Makaruk R. V, Sadykov I. A, Kohlert C
2021 Information Technology in Industry  
, mobile apps, digital signatures, luminophores, and PVC film.  ...  The authors suggest methods and technologies for protecting pharmaceutical products' polymer packaging based on modern ideas from IT and manufacturing such as image recognition, client-server software architecture  ...  identifiable package with the legitimate digital signature in the database.  ... 
doi:10.17762/itii.v7i3.72 fatcat:e4i5p2hurbb5nkckmkfcorvghq

Zero-Shot Learning Based Approach For Medieval Word Recognition using Deep-Learned Features

Sukalpa Chanda, Jochem Baas, Daniel Haitink, Sebastien Hamel, Dominique Stutzmann, Lambert Schomaker
2018 2018 16th International Conference on Frontiers in Handwriting Recognition (ICFHR)  
Word recognition based systems require enough labelled data per class to train the system. Moreover, all word classes need to be taught beforehand.  ...  Recently digitization of large quantities of historical handwritten documents is taking place in every corner of the world, and are being archived.  ...  To facilitate this process, historical documents are digitized and preserved in digital archives.  ... 
doi:10.1109/icfhr-2018.2018.00067 dblp:conf/icfhr/ChandaBHHSS18 fatcat:eq3rroric5bvtnpqcomep2b5pu

Device-based Image Matching with Similarity Learning by Convolutional Neural Networks that Exploit the Underlying Camera Sensor Pattern Noise

Guru Bennabhaktula, Enrique Alegre, Dimka Karastoyanova, George Azzopardi
2020 Proceedings of the 9th International Conference on Pattern Recognition Applications and Methods  
This knowledge can help forensic experts in gathering intelligence about suspects by analyzing digital images.  ...  One of the challenging problems in digital image forensics is the capability to identify images that are captured by the same camera device.  ...  Figure 3 : 3 The proposed neural network architecture of the Similarity Network. Table 1 : 1 The proposed CNN architecture of the signature network.  ... 
doi:10.5220/0009155505780584 dblp:conf/icpram/BennabhaktulaAK20 fatcat:flmk2h2qtfflvcqfd7kbdj2w2m

Private data sharing between decentralized users through the privGAN architecture [article]

Jean-Francois Rajotte, Raymond T Ng
2020 arXiv   pre-print
The privacy is demonstrated with white-box attacks on the most vulnerable elments of the architecture and the results are close to random guessing.  ...  The method proposed is based on the privGAN architecture where local GANs are trained on their respective data subsets with an extra penalty from a central discriminator aiming to discriminate the origin  ...  Following the procedure of the original paper, we run a model for each digit in order to have a label for each sample.  ... 
arXiv:2009.06764v1 fatcat:bmisiad3jvg5bdmbbhaknq3acq

Quality labels for e-health

O. Ferrer-Roca, F. Marcano, A. Diaz-Cardama
2008 IET Communications  
A professional ID-card was built on a high security chip (ISTEC E4 High; EAL-5) with a Hash hardware accelerator for a digital signature placed in a single chip USB token.  ...  The paper points out the urgent need for an e-health conformance label as well as a quality label for liability and confidence to gain users' trust.  ...  ID, and a digital signature is not mandatory.  ... 
doi:10.1049/iet-com:20060596 fatcat:ljd53r5zgfeerl2gx7s6lktt4i

Label-free digital pathology by infrared imaging

Frederik Großerueschkamp, Klaus Gerwert
2020 Biomedical Spectroscopy and Imaging  
All hurdles has been overcome and label-free digital pathology is ready to validate now the approach in clinically relevant unmet medical needs.  ...  Here, we present a short overview of our implementation of label-free digital pathology by infrared (IR) imaging. We address the major issues to overcome for clinical translation.  ...  Gerwert / Label-free digital pathology by infrared imaging QCL-based IR imaging revolutionizes label-free digital pathology Up to here, FTIR imaging proofed that it can be used to analyze label-free  ... 
doi:10.3233/bsi-200196 fatcat:vfoaj6wnuzd5xgbmf3jnnzqpmu

Discovering Digital Tumor Signatures—Using Latent Code Representations to Manipulate and Classify Liver Lesions

Jens Kleesiek, Benedikt Kersjes, Kai Ueltzhöffer, Jacob M. Murray, Carsten Rother, Ullrich Köthe, Heinz-Peter Schlemmer
2021 Cancers  
To illustrate that the "digital signatures" can also be used to differentiate lesion from normal tissue, we employed several machine learning methods.  ...  Within the field of oncological medical imaging, we term these latent representations "digital tumor signatures" and hypothesize that they can be used, in analogy to radiomics features, to differentiate  ...  In this article, we present a generative architecture for learning of spatially encoded digital tumor signatures.  ... 
doi:10.3390/cancers13133108 pmid:34206336 pmcid:PMC8269051 fatcat:nrk2xqip2zct3mmu45ircbpdoa

Deep Convolutional Generative Adversarial Networks to Enhance Artificial Intelligence in Healthcare: A Skin Cancer Application

Marco La Salvia, Emanuele Torti, Raquel Leon, Himar Fabelo, Samuel Ortega, Beatriz Martinez-Vega, Gustavo M. Callico, Francesco Leporati
2022 Sensors  
Conceived to serve the role of diagnostic tool and surgical guidance, hyperspectral images emerged as a non-contact, non-ionizing, and label-free technology.  ...  convolutional generative adversarial network to generate synthetic hyperspectral images of epidermal lesions, targeting skin cancer diagnosis, and overcome small-sized datasets challenges to train DL architectures  ...  (a) Pseudo-RGB images obtained with the HS camera, (b) grayscale image captured with the monochromatic sensor, (c) RGB images obtained with the digital dermoscopic camera, (d) average spectral signature  ... 
doi:10.3390/s22166145 pmid:36015906 pmcid:PMC9416026 fatcat:pxv2bb2bizhq7luub6uzd6syli

Quality Labeling of Web Content: The Quatro approach

Vangelis Karkaletsis, Andrea Perego, Phil Archer, Kostas Stamatakis, Pantelis Nasikas, David Rose
2006 Workshop on Models of Trust for the Web  
The paper presents the QUATRO processes for label validation and user notification, and outlines the architecture of QUATRO system.  ...  the label(s) found in a Web resource, and functionalities for checking the validity of these labels.  ...  The label file will contain the digital signature of the hash.  ... 
dblp:conf/mtw/KarkaletsisPASNR06 fatcat:lfxjl2vlknfzpk2volecqosu5e

Certificate Path Verification in Hierarchical and Peer-to-Peer Public Key Infrastructures

Balachandra, Prema K.V.
2010 Journal of Technology Management for Growing Economies  
Each user or end entity is given a digitally signed data structure called digital certificate.  ...  Peer-to-Peer(also called Mesh PKI) architecture is one of the most popular PKI trust models that is widely used in automated business transactions, but certificate path verification is very complex since  ...  DIGITAL SIGNATURE GENERATION AND VERIFICATION Digital signature generation and verification are important part of dealing with digital certificates.  ... 
doi:10.15415/jtmge.2010.11005 fatcat:arcktlgurrfvtiyevj6rsyc6x4
« Previous Showing results 1 — 15 out of 32,314 results