منابع مشابه
Fragile Watermarking for Image Authentication: Survey
In this paper, we report results from comparative study on various related and relevant aspects of the digital watermarking such as image authentication techniques using fragile watermarking, fuzzy clustering and genetically inspired watermarking techniques for integrity verification. This is carried out with intent to develop an understanding of their working, contained challenges, possible at...
متن کاملBiometric Authentication Methods on Smartphones: A Survey
Nowadays, users are starting to develop a symbiotic bound with their smartphones. Users continuously carry these devices and use them for daily communication activities and social network interactions. On the other hand, a smartphone is equipped with sensors that can infer not only information about the context (e.g., location), but also about its owner. Since smartphones handle a huge amount o...
متن کاملDigital Image Forgeries and Passive Image Authentication Techniques: A Survey
Digital images are present everywhere on magazine covers, in newspapers, in courtrooms as evidences, and all over the Internet signifying one of the major ways for communication nowadays. The trustworthiness of digital images has been questioned, because of the ease with which these images can be manipulated in both its origin & content as a result of tremendous growth of digital image manipula...
متن کاملA Survey of Watermarking Algorithms for Image Authentication
Digital image manipulation software is now readily available on personal computers. It is therefore very simple to tamper with any image and make it available to others. Insuring digital image integrity has therefore become a major issue. Watermarking has become a popular technique for copyright enforcement and image authentication. The aim of this paper is to present an overview of emerging te...
متن کاملSemifragile Watermarking Schemes for Image Authentication- A Survey
Digital images are very easy to manipulate, store, publish and secondary creation this juggle will lead to serious consequence in some applications such as military image, medical image. So, integrity of digital image must be authenticated. Tools that help us establish the authenticity and integrity of digital media are thus essential and can prove vital whenever questions are raised about the ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Multimedia Tools and Applications
سال: 2007
ISSN: 1380-7501,1573-7721
DOI: 10.1007/s11042-007-0154-3