نتایج جستجو برای: image authentication
تعداد نتایج: 408635 فیلتر نتایج به سال:
A data embedding method is proposed for image authentication based on table look-up in frequency domain. A visually meaningful watermark and a set of simple features are embedded invisibly in the marked image, which can be stored in the compressed form. The scheme can detect and localize alterations of the original image, such as the tempering of images exported from a digital camera.
It is straightforward to apply general schemes for authenticating digital data to the problem of authenticating digital images. However, such a scheme would not authenticate images that have undergone lossy compression, even though they may not have been manipulated otherwise. In this paper we propose a scheme for authenticating the visual content of digital images. This scheme is robust to com...
Nowadays, authentication mechanism is widely applied to digital images to verify whether the received image is not a fake. In this paper, we propose a selfauthentication mechanism without any extra data to authenticate whether the area is modified by comparing the generated authentication code and hidden authentication code together. Also, the recovery ability is employed to the proposed scheme...
In a wireless communications in order to share secret information between 2 or entities remote authentication could be used. It internally contains three works. The first one is the encryption of finger print image in the form of chaotic image then internally converts that chaotic image into set of vectors. The second one is the extracting human object from the video or teleconferencing or in a...
This paper describes a semi-fragile watermarking scheme for image authentication and tamper-proofing. Each watermark bit is duplicated and randomly embedded in the original image in the discrete wavelet domain by modifying the corresponding image coefficients through quantization. The modifications are made so that they have little effect on the image and that the watermarking is robust against...
Techniques to establish the authenticity and integrity of digital images are becoming increasly essential over the Intermet. The authentication algorithm should distinguish malicious manipulations from the original watermarked image[1]. Fragile watermarking is recomended for a very sensible image authentication scheme, able to localize the slightest changes occured to the marked image. The frag...
Biometric Person Authentication such as face, fingerprint, palmprint and signature depends on the quality of image processing. When it needs to be done under a low-resolution image, the accuracy will be impaired. So how to recover the lost information from downsampled images is important for both authentication and preprocessing. Based on Super-Resolution through Neighbor Embedding algorithm an...
With the popularity of network and the continuous development of multimedia technology, saving of network bandwidth and copyright protection of multimedia content have gradually attracted people’s attention. The fragile watermark for integrity authentication of image data and protection of copyright has become a hotspot. In the storage and transmission process, image data must be compressed to ...
In this paper, a new image authentication scheme based on quadtree segmentation is presented. In this scheme, partial digital signature encryption is employed to ascertain the origin of the image. Furthermore, the quadtree structure is imposed on the design of the authentication code. The authentication code consists of the quadtree list and the mean values of the quadtree leaf nodes. The size ...
In image authentication watermarking, hidden data is inserted into an image to detect any accidental or malicious image alteration. In the literature, quite a small number of cryptography-based secure authentication methods are available for binary images. This paper proposes a new authentication watermarking method for binary images. It can detect any visually significant alteration while main...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید