Image Authentication Subject Review
نویسندگان
چکیده
منابع مشابه
Digital Image Authentication: A Review
Digital image authentication refers to all the techniques performing anti-falsification, digital image copyright protection, or access control. A large number of DIA techniques have been developed to authenticate digital images, including cryptography-based digital image authentication (CBDIA) techniques and data-hiding-based digital image authentication (DHBDIA) techniques. This paper not only...
متن کاملImage authentication using LBP-based perceptual image hashing
Feature extraction is a main step in all perceptual image hashing schemes in which robust features will led to better results in perceptual robustness. Simplicity, discriminative power, computational efficiency and robustness to illumination changes are counted as distinguished properties of Local Binary Pattern features. In this paper, we investigate the use of local binary patterns for percep...
متن کاملimage authentication using lbp-based perceptual image hashing
feature extraction is a main step in all perceptual image hashing schemes in which robust features will led to better results in perceptual robustness. simplicity, discriminative power, computational efficiency and robustness to illumination changes are counted as distinguished properties of local binary pattern features. in this paper, we investigate the use of local binary patterns for percep...
متن کاملReview of mental image
Mental imaging is a psychology that builds intrinsic images in the brain using conscious imagination And restored. People can create mental images about simple things like shapes Create mental images to remind you of complex life events. What matters The development of the use of mental imagery in the field of psychotherapy and rehabilitation for ordinary people It can have a direct effect on t...
متن کاملIssues on Image Authentication
Multimedia authentication distinguishes itself from other data integrity security issues because of its unique property of content integrity in several different levels — from signal syntax levels to semantic levels. In this section, we describe several image authentication issues, including the mathematical forms of optimal multimedia authentication systems, a description of robust digital sig...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: International Journal of Engineering Research and Advanced Technology
سال: 2018
ISSN: 2454-6135
DOI: 10.31695/ijerat.2018.3352