A Photo Composite Detection Based on Eye Specular Highlight Using Pixel-based Approach
A Photo Composite Detection Based on Eye Specular Highlight Using Pixel-based Approach Author : PRASTYAWAN AJI NUGRAHA; RIMBA WHIDIANA CIPTASARI; BAMBANG PUDJOATMODJO Published on : The 3rd International Conference on Information and Communication Technology (ICoICT) Abstract There are several types of photo manipulation. For example, combining objects from different sources into a single […]
The analysis of perception of useness, ease, social influence, trust, and cost and the effect on interest of using Alfa Online.
The analysis of perception of useness, ease, social influence, trust, and cost and the effect on interest of using Alfa Online. Author : ASTRI WULANDARI; ATI MUSTIKASARI; SRI WIDANINGSIH Published on : 2nd International Conference on Global Trends in Academic Research Abstract “As a result of the lifestyle changes in Indonesia, many companies […]
Design and Implementation of Secure Fingerprint Template Using Key Binding Scheme and Random Triangle Hashing Scheme
Design and Implementation of Secure Fingerprint Template Using Key Binding Scheme and Random Triangle Hashing Scheme Author : ERWID MUSTHOFA JADIED Published on : ICOICT 2015 Abstract One problem in biometric fingerprint technology is template protection. Template is individuals digital reference extracted from biometric sample. The objective of template protection is to protect […]
Network Market Analysis using Large Scale Social Network Conversation of Indonesia???s Fast Food Industry
Network Market Analysis using Large Scale Social Network Conversation of Indonesia???s Fast Food Industry Author : ANDRY ALAMSYAH; YAHYA PARANGINANGIN Published on : The 3rd International Conference of Information and Communication Technology Abstract The high competitiveness of the Indonesia Fast Food market has forced the industry to find the new way to understand […]
The Detection of DDOS Flooding Attack using Hybrid Analysis in IPv6 Networks
The Detection of DDOS Flooding Attack using Hybrid Analysis in IPv6 Networks Author : GANDEVA BAYU; RIZQI LUTFIA CHANDRA Published on : 2015 International Conference on Information and Communication Technology Abstract “DDOS attack is very popular used by attacker to disrupt a computer network. The evolution of attack and the increase of vulnerable […]