Essays about: "secure image"
Showing result 1 - 5 of 29 essays containing the words secure image.
-
1. FFS: A cryptographic cloud-based deniable filesystem through exploitation of online web services : Store your sensitive data in plain sight
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : Many Online Web Services (OWSs) today, such as Flickr and Twitter, provide users with the possibility to post images that are stored on the platform for free. This thesis explores creating a cryptographically secure filesystem that stores its data on an online web service by encoding the encrypted data as images. READ MORE
-
2. Contactless palm print recognition: Novel design and palm openness classification
University essay from Lunds universitet/Matematik LTHAbstract : Biometric technologies, such as facial and fingerprint recognition, have become widely adopted for identity verification in various applications. Palm biometrics, utilizing the unique patterns of the human palm, has gained significant attention for its accuracy and security. READ MORE
-
3. Next Level 365id Scanner : Improving the photo environment of the scanner.
University essay from Högskolan i Halmstad/Akademin för informationsteknologiAbstract : The development of smart ID cards necessitates the development of secure methods for verifying the authenticity of these cards by organizations, businesses, and government authorities. This motivated the development of such a scanner capable of reading several ID cards from various countries. READ MORE
-
4. Security in Rootless Containers : Measuring the Attack Surface of Containers
University essay from Linköpings universitet/Institutionen för datavetenskapAbstract : Rootless containers are commonly perceived as more secure, as they run without added privileges. To the best of my knowledge, this hypothesis has never been proven. This thesis aims to contribute to addressing knowledge gaps in research by measuring the attack surface of Rootless Podman, Rootless Docker, as well as Rootful Docker for comparison. READ MORE
-
5. Identifying Piggybacking with Radar and Neural Networks
University essay from Lunds universitet/Matematik LTHAbstract : A common problem in access control is piggybacking. This is when a person without authorized access sneaks closely behind another with access through a door. This thesis seeks to answer whether using radar is a viable solution when attempting to detect piggybacking. READ MORE