Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 2 of 2

Full-Text Articles in Physical Sciences and Mathematics

Reputation As Public Policy For Internet Security, Leigh L. Linden, John S. Quarterman, Qian Tang, Andrew B. Whinston Sep 2012

Reputation As Public Policy For Internet Security, Leigh L. Linden, John S. Quarterman, Qian Tang, Andrew B. Whinston

Research Collection School Of Computing and Information Systems

Insufficient resource allocation causes an Internet information security (infosec) problem that public policy could improve. Lack of transparency lets organizations avoid addressing internal risks, leaving vulnerabilities that are exploited by botnets, threatening information security of other Internet participants. Their protection provides no economic benefit to the firm, so this negative externality causes underinvestment in infosec. Public policy could provide a partial solution by adding incentives for organizations to have well-configured infosec. Specifically, mandatory reporting of security issues plus presenting this information to the public, can impose shame and fame on organizations through publicity and peer influence by comparison with major …


Composite Feature-Based Face Detection Using Skin Color Modeling And Svm Classification, Swathi Rajashekar May 2012

Composite Feature-Based Face Detection Using Skin Color Modeling And Svm Classification, Swathi Rajashekar

All Graduate Plan B and other Reports, Spring 1920 to Spring 2023

This report proposes a face detection algorithm based on skin color modeling and support vector machine (SVM) classification. Said classification is based on various face features used to detect specific faces in an input color image. A YCbCr color space is used to filter the skin color pixels from the input color image. Template matching is used on the result with various window sizes of the template created from an ORL face database. The candidates obtained above, are then classified by SVM classifiers using the histogram of oriented gradients, eigen features, edge ratio, and edge statistics features.