Person:
Essa, Irfan

Associated Organization(s)
Organizational Unit
ORCID
ArchiveSpace Name Record

Publication Search Results

Now showing 1 - 4 of 4
Thumbnail Image
Item

Localization and 3D Reconstruction of Urban Scenes Using GPS

2008 , Kim, Kihwan , Summet, Jay , Starner, Thad , Ashbrook, Daniel , Kapade, Mrunal , Essa, Irfan

Using off-the-shelf Global Positioning System (GPS) units, we reconstruct buildings in 3D by exploiting the reduction in signal to noise ratio (SNR) that occurs when the buildings obstruct the line-of-sight between the moving units and the orbiting satellites. We measure the size and height of skyscrapers as well as automatically constructing a density map representing the location of multiple buildings in an urban landscape. If deployed on a large scale, via a cellular service provider’s GPS-enabled mobile phones or GPS-tracked delivery vehicles, the system could provide an inexpensive means of continuously creating and updating 3D maps of urban environments.

Thumbnail Image
Item

Hello, Are You Human?

2000 , Essa, Irfan , Lipton, Richard J. , Xu, Jun

In this paper, we propose the concept of a humanizer and explore its applications in network security and E-commerce. A humanizer is a novel authentication scheme that asks the question "are you human?" (instead of "who are you?"), and upon the correct answer to this question, can prove a principal to be a human being instead of a computer program. We demonstrate that the humanizer helps solve problems in network security and E-commerce that existing security measures can not address properly. A key component of this "are you human?" authentication process is a new type of trapdoor one-way hash function, called Turing-resistant hashing. It transforms a character string (the preimage) into a graphical form (the image) in such a way that a human being won't have any problem recovering the preimage through the trapdoor of human pattern recognition skills, while a computer program, essentially a Turing machine, will not be able to decode it or make a correct guess of the preimage with non-negligible probability. Based on this hash function, we design a stateless generic humanizer that can be parameterized for use in various real-world applications.

Thumbnail Image
Item

Remixing Authorship: Reconfiguring the Author in Online Video Remix Culture

2007 , Diakopoulos, Nicholas , Luther, Kurt , Medynskiy, Yevgeniy (Eugene) , Essa, Irfan

In an abstract sense, authorship entails the constrained selection or generation of media and the organization and layout of that media in a larger structure. But authorship is more than just selection and organization; it is a complex construct incorporating concepts of originality, authority, intertextuality, and attribution. In this paper we explore these concepts as they relate to authorship and ask how they are changing in light of modes of collaborative authorship in remix culture. A detailed qualitative study of an online video remixing site is presented to help understand how the constraints of that environment are impacting authorial constructs. We discuss users’ self-conceptions as authors, and how values related to authorship are reflected to users through the interface and design of the site’s remixing and community tools. Finally, we present some implications of this work for the design of online communities for collaborative media creation and remixing.

Thumbnail Image
Item

Mandatory Human Participation: A New Scheme for Building Secure Systems

2001 , Essa, Irfan , Sung, Min-Ho , Lipton, Richard J. , Xu, Jun

Mandatory Human Participation (MHP) is a novel authentication scheme that asks the question "are you human?" (instead of "who are you?"), and upon the correct answer to this question, can prove a principal to be a human being instead of a computer program. MHP helps solve old and new problems in computer security that existing security measures can not address properly, including password (or PIN number) guessing attacks, automated service and information theft, and denial of service. A key component of this `are you human?'' authentication process is a character morphing algorithm that transforms a character string into its graphical form in such a way that a human being won't have any problem recognizing the original string, while a computer program (e.g., an Optical Character Recognition program), will not be able to decipher it or make a correct guess with non-negligible probability. The basic idea of the MHP scheme is to ask an agent to recognize the string before its login attempts or transaction requests can be honored. Here a protocol is needed to send a puzzle to an agent, check if the answer supplied by the agent is correct, and most importantly make sure that the agent can not cheat in the process. A number of system and security issues that relate to the protocol need to be addressed for the protocol to be secure, efficient, robust, and user-friendly. The MHP scheme contributes to the foundation of the computer security by faithfully implementing a novel security semantics, "human," which existing cryptographic measures can not express accurately. As many real-world security applications involve the interaction between a human and a computer, which naturally contains "human" as a part of its protocol semantics, we believe that the MHP scheme will find many new applications in the future.