Method and apparatus for authentication of documents by using the intensity profile of moire patterns
Graph Chatbot
Chattez avec Graph Search
Posez n’importe quelle question sur les cours, conférences, exercices, recherches, actualités, etc. de l’EPFL ou essayez les exemples de questions ci-dessous.
AVERTISSEMENT : Le chatbot Graph n'est pas programmé pour fournir des réponses explicites ou catégoriques à vos questions. Il transforme plutôt vos questions en demandes API qui sont distribuées aux différents services informatiques officiellement administrés par l'EPFL. Son but est uniquement de collecter et de recommander des références pertinentes à des contenus que vous pouvez explorer pour vous aider à répondre à vos questions.
We consider the problem of reconstructing a shared secret in the presence of faulty shares, with unconditional security. We require that any t shares give no information on the shared secret, and reconstruction is possible even if up to t out of the n shar ...
This paper presents a pseudo Wigner–Ville-distribution-based method in fringe projection for analyzing temporal behavior of the displacement derivative for a continuously deformed object. In the proposed method, a computer generated fringe pattern is proje ...
The relation between sensor resolution and the optics of a digital camera is determined by the Nyquist sampling theorem: the sampling frequency should be larger than twice the maximum frequency of the image content coming out of the optical system. If a lo ...
This work describes an image acquisition and processing system based on a new co-processor architecture designed for CMOS sensor imaging. The platform permits to configure a wide variety of acquisition modes (random region acquisition, variable image size, ...
The principal objective of this thesis is to investigate approaches toward a robust automatic face authentication (AFA) system in weakly constrained environments. In this context, we develop new algorithms based on local features and generative models. In ...
This paper establishes tight bounds on the \emph{best-case} time-complexity of distributed atomic read/write storage implementations that tolerate \emph{worst-case} conditions. We study asynchronous robust implementations where a writer and a set of reader ...
A simple imaging setup based on the principle of coherence-based contrast X-ray imaging with unmonochromatized synchrotron radiation was used for studying mammographic phantom and human breast specimens. The use of unmonochromatized synchrotron radiation s ...
The development of more processing demanding applications on the Internet (video broadcasting) on one hand and the popularity of recent devices at the user level (digital cameras, wireless videophones, ...) on the other hand introduce challenges at several ...
New methods and apparatus for authenticating security documents such as banknotes, passports, etc. which may be printed on any support, including transparent synthetic materials and traditional opaque materials such as paper. The invention is based on moir ...
The objective of this thesis was to increase our understanding of gravity-driven geophysical flows by developing a new platform to simulate avalanches of fluid in the laboratory. To simulate flow avalanches in the laboratory, we created a unique experiment ...