Essays about: "secure image"

Showing result 1 - 5 of 29 essays containing the words secure image.

  1. 1. FFS: A cryptographic cloud-based deniable filesystem through exploitation of online web services : Store your sensitive data in plain sight

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Glenn Olsson; [2023]
    Keywords : Filesystem; Fejk FileSystem; Cloud-based filesystem; Steganograhpic filesystem; Filsystem; Fejk FileSystem; Molnbaserat filsystem; Steganografiskt filsystem;

    Abstract : Many Online Web Services (OWSs) today, such as Flickr and Twitter, provide users with the possibility to post images that are stored on the platform for free. This thesis explores creating a cryptographically secure filesystem that stores its data on an online web service by encoding the encrypted data as images. READ MORE

  2. 2. Contactless palm print recognition: Novel design and palm openness classification

    University essay from Lunds universitet/Matematik LTH

    Author : Simon Mahdavi Khayavi; Leo Yi-Lei Li; [2023]
    Keywords : Mathematics and Statistics;

    Abstract : Biometric technologies, such as facial and fingerprint recognition, have become widely adopted for identity verification in various applications. Palm biometrics, utilizing the unique patterns of the human palm, has gained significant attention for its accuracy and security. READ MORE

  3. 3. Next Level 365id Scanner : Improving the photo environment of the scanner.

    University essay from Högskolan i Halmstad/Akademin för informationsteknologi

    Author : Abdulrahman Husari; [2022]
    Keywords : ID scanner; Raspberry PI camera;

    Abstract : The development of smart ID cards necessitates the development of secure methods for verifying the authenticity of these cards by organizations, businesses, and government authorities. This motivated the development of such a scanner capable of reading several ID cards from various countries. READ MORE

  4. 4. Security in Rootless Containers : Measuring the Attack Surface of Containers

    University essay from Linköpings universitet/Institutionen för datavetenskap

    Author : Matilda Engström Ericsson; [2022]
    Keywords : rootless container; container security; attack surface; Docker; Podman;

    Abstract : Rootless containers are commonly perceived as more secure, as they run without added privileges. To the best of my knowledge, this hypothesis has never been proven.  This thesis aims to contribute to addressing knowledge gaps in research by measuring the attack surface of Rootless Podman, Rootless Docker, as well as Rootful Docker for comparison. READ MORE

  5. 5. Identifying Piggybacking with Radar and Neural Networks

    University essay from Lunds universitet/Matematik LTH

    Author : Joel Sigurdsson; Hannes Olsson; [2022]
    Keywords : neural networks; classification; radar; access control; artificial; recurrent; convolutional; point clouds; cnn; ann; lstm; rnn; optimization; gradient descent; camera; piggybacking; tailgating; fmcw; pointnet; Mathematics and Statistics;

    Abstract : A common problem in access control is piggybacking. This is when a person without authorized access sneaks closely behind another with access through a door. This thesis seeks to answer whether using radar is a viable solution when attempting to detect piggybacking. READ MORE