نتایج جستجو برای: image authentication

تعداد نتایج: 408635  

1998
Min Wu Bede Liu

A data embedding method is proposed for image authentication based on table look-up in frequency domain. A visually meaningful watermark and a set of simple features are embedded invisibly in the marked image, which can be stored in the compressed form. The scheme can detect and localize alterations of the original image, such as the tempering of images exported from a digital camera.

1998
Sushil K. Bhattacharjee Martin Kutter

It is straightforward to apply general schemes for authenticating digital data to the problem of authenticating digital images. However, such a scheme would not authenticate images that have undergone lossy compression, even though they may not have been manipulated otherwise. In this paper we propose a scheme for authenticating the visual content of digital images. This scheme is robust to com...

Journal: :I. J. Network Security 2015
Yi-Hui Chen Chih-Yang Lin Wanutchaporn Sirakriengkrai I-Chun Weng

Nowadays, authentication mechanism is widely applied to digital images to verify whether the received image is not a fake. In this paper, we propose a selfauthentication mechanism without any extra data to authenticate whether the area is modified by comparing the generated authentication code and hidden authentication code together. Also, the recovery ability is employed to the proposed scheme...

2015
T.Sathya T.Krishnan

In a wireless communications in order to share secret information between 2 or entities remote authentication could be used. It internally contains three works. The first one is the encryption of finger print image in the form of chaotic image then internally converts that chaotic image into set of vectors. The second one is the extracting human object from the video or teleconferencing or in a...

Journal: :IEICE Transactions 2007
Nozomi Ishihara Kôki Abe

This paper describes a semi-fragile watermarking scheme for image authentication and tamper-proofing. Each watermark bit is duplicated and randomly embedded in the original image in the discrete wavelet domain by modifying the corresponding image coefficients through quantization. The modifications are made so that they have little effect on the image and that the watermarking is robust against...

2009
Michele De Santis Giuseppe Schirripa Spagnolo Francesco Bella Marco Carli

Techniques to establish the authenticity and integrity of digital images are becoming increasly essential over the Intermet. The authentication algorithm should distinguish malicious manipulations from the original watermarked image[1]. Fragile watermarking is recomended for a very sensible image authentication scheme, able to localize the slightest changes occured to the marked image. The frag...

2006
Tak Chan Junping Zhang

Biometric Person Authentication such as face, fingerprint, palmprint and signature depends on the quality of image processing. When it needs to be done under a low-resolution image, the accuracy will be impaired. So how to recover the lost information from downsampled images is important for both authentication and preprocessing. Based on Super-Resolution through Neighbor Embedding algorithm an...

Journal: :Future Internet 2017
Xiaoyan Yu Cheng-You Wang Xiao Zhou

With the popularity of network and the continuous development of multimedia technology, saving of network bandwidth and copyright protection of multimedia content have gradually attracted people’s attention. The fragile watermark for integrity authentication of image data and protection of copyright has become a hotspot. In the storage and transmission process, image data must be compressed to ...

2005
P Tsai

In this paper, a new image authentication scheme based on quadtree segmentation is presented. In this scheme, partial digital signature encryption is employed to ascertain the origin of the image. Furthermore, the quadtree structure is imposed on the design of the authentication code. The authentication code consists of the quadtree list and the mean values of the quadtree leaf nodes. The size ...

2004
Hae Yong Kim Ricardo L. de Queiroz

In image authentication watermarking, hidden data is inserted into an image to detect any accidental or malicious image alteration. In the literature, quite a small number of cryptography-based secure authentication methods are available for binary images. This paper proposes a new authentication watermarking method for binary images. It can detect any visually significant alteration while main...

200420052006200720082009201020112012201320142015201620172018201920202021202220230100002000030000

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید