Protecting identity documents by microstructure color differences
Graph Chatbot
Chat with Graph Search
Ask any question about EPFL courses, lectures, exercises, research, news, etc. or try the example questions below.
DISCLAIMER: The Graph Chatbot is not programmed to provide explicit or categorical answers to your questions. Rather, it transforms your questions into API requests that are distributed across the various IT services officially administered by EPFL. Its purpose is solely to collect and recommend relevant references to content that you can explore to help you answer your questions.
Many online transactions require the sharing of identity information, even though this sharing poses substantial trust challenges, both for the sender and the receiver. For this reason, Internet must provide channels to ensure a secure, reliable, private, ...
"We conducted an evaluative research on a sample of participants to a Geneva program aiming to increase the access of young people to culture. Once this research was done, we developed questions concerning how identity develops among these people. The mode ...
This article explores how readers recognize their personal identities represented through data visualizations. The recognition is investigated starting from three definitions captured by the philosopher Paul Ricoeur: the identification with the visualizati ...
We present a novel framework for automatically determining whether or not to apply black point compensation (BPC) in image reproduction. Visually salient objects have a larger influence on determining image quality than the number of dark pixels in an imag ...
Spie-Int Soc Optical Engineering, Po Box 10, Bellingham, Wa 98227-0010 Usa2011
To address the issues like identity theft and security threats, a continuously evolving technology known as biometrics is presently being deployed in a wide range of personal, government, and commercial applications. Despite the great progress in the field ...
In a significant class of sensor-network applications, the identities of the reporting sensors constitute the bulk of the communicated data, whereas the message itself can be as small as a single bit—for instance, in many cases, sensors are used to detect ...
Institute of Electrical and Electronics Engineers2010
One fundamental issue in existing reputation mechanisms, particularly those in open and decentralized multi-agent systems, is whitewashing attacks by rational providers. If identities are cheap, it is beneficial for a provider to simply defect when selling ...
One fundamental issue with existing reputation systems, particularly those implemented in open and decentralized environments, is whitewashing attacks by opportunistic participants. If identities are cheap, it is beneficial for a rational provider to simpl ...
The 40 thieves realize that the fortune in their cave is vanishing. A rumor says that Ali Baba has been granted access (in the form of a certificate) to the cave but they need evidence to get justice from the Caliph. On the other hand, Ali Baba wants to be ...
This document contains information about how to install Lightsolve, how to create a SketchUp model which is recognizable by Lightsolve, how to run the renderer and how to navigate the Lightsolve interface. It also contains tips for troubleshooting known pr ...