Towards distortion-free robust image authentication
نویسندگان
چکیده
منابع مشابه
Distortion-Free Authentication Watermarking
In this paper we introduce a distortion free watermarking technique that strengthen the verification of integrity of the relational databases by using a public zero distortion authentication mechanism based on the Abstract Interpretation framework.
متن کاملDatabase Authentication by Distortion Free Watermarking
In this paper we introduce a distortion free watermarking technique that strengthen the verification of integrity of the relational databases by using a public zero distortion authentication mechanism based on the Abstract Interpretation framework. The watermarking technique is partition based. The partitioning can be seen as a virtual grouping, which does not change neither the value of the ta...
متن کاملRobust Radial Distortion from a Single Image
Many computer vision algorithms rely on the assumption of the pinhole camera model, but lens distortion with off-the-shelf cameras is significant enough to violate this assumption. Many methods for radial distortion estimation have been proposed, but they all have limitations. Robust automatic radial distortion estimation from a single natural image would be extremely useful for some applicatio...
متن کاملTransparent Robust Authentication and Distortion Measurement Technique for Images
We propose a novel scheme to embed an invisible signature into an image to check image integrity and measure its distortion. The technique is based on the pseudo noise sequences and visual masking eeects. The values of an image are modiied by a pseudo noise signature which is shaped by the perceptual thresholds from masking eeects. The method is robust and can gauge errors accurately up to half...
متن کاملSpread Spectrum based Robust Image Watermark Authentication
In this paper, a new approach to Spread Spectrum (SS) watermarking technique is introduced. This problem is particularly interesting in the field of modern multimedia applications like internet when copyright protection of digital image is required. The approach exploits two-predecessor single attractor (TPSA) cellular automata (CA) suitability to work as efficient authentication function in wa...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Journal of Physics: Conference Series
سال: 2007
ISSN: 1742-6588,1742-6596
DOI: 10.1088/1742-6596/77/1/012005