Image Authentication Based on Magic Square

نویسندگان

چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Image authentication using LBP-based perceptual image hashing

Feature extraction is a main step in all perceptual image hashing schemes in which robust features will led to better results in perceptual robustness. Simplicity, discriminative power, computational efficiency and robustness to illumination changes are counted as distinguished properties of Local Binary Pattern features. In this paper, we investigate the use of local binary patterns for percep...

متن کامل

Image Content Authentication based on

Reversible image authentication has drawn a great attention for its ability to recover the original image from the watermarked image. The primary concern of authentication is to prevent from unauthorized manipulation of the image and hence has attained good importance. This paper proposes a block based reversible watermarking scheme for image authentication based on histogram modification of th...

متن کامل

image authentication using lbp-based perceptual image hashing

feature extraction is a main step in all perceptual image hashing schemes in which robust features will led to better results in perceptual robustness. simplicity, discriminative power, computational efficiency and robustness to illumination changes are counted as distinguished properties of local binary pattern features. in this paper, we investigate the use of local binary patterns for percep...

متن کامل

Image Authentication Based on Modular Embedding

We consider a watermark application to assist in the integrity maintenance and verification of the associated images. There is a great benefit in using WM in the context of authentication since it does not require any additional storage space for supplementary metadata, in contrast with cryptographic signatures, for instance. However there is a fundamental problem in the case of exact authentic...

متن کامل

An Image Authentication Scheme Based on Correlation

This paper proposes a watermarking algorithm based on correlation to authenticate image content. The original image is converted to YIQ space first, then subdivided into 8× 8 non-overlapping blocks. DCT transform is executed on each block. The watermark sequence is derived from certain low frequency coefficients. It is hided into the middle frequency DCT coefficients of another pseudo-randomly ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Advances in computer science research

سال: 2022

ISSN: ['2352-538X']

DOI: https://doi.org/10.2991/acsr.k.220202.043