نتایج جستجو برای: image authentication

تعداد نتایج: 408635  

2012
G. Schirripa Spagnolo M. De Santis

The protection of the contents of digital products is referred to as content authentication. In some applications, to be able to authenticate a digital product could be extremely essential. For example, if a digital product is used as a piece of evidence in the court, its integrity could mean life or death of the accused. Generally, the problem of content authentication can be solved using semi...

2014
S. Nivas P. Prakash

As the need for personal authentication increases, many people are turning to biometric authentication as an alternative to traditional security devices. Concurrently, users and vendors of biometric authentication systems are searching for methods to establish system performance. However, most existing biometric systems have high complexity in time or space or both. In this paper, we propose a ...

2017

The digital revolution in digital image processing has made it possible to create, manipulate and transmit digital images in a simple and fast manner. The adverse affect of this is that the same image processing techniques can be used by hackers to tamper with any image and use it illegally. This has made digital image safety and integrity the top prioritized issue in today’s information explos...

2012
Sofija Bogdanova

In this paper we present a combined hashing/watermarking method for image authentication. A robust image hash, invariant to legitimate modifications, but fragile to illegitimate modifications is generated from the local image characteristics. To increase security of the system the watermark is generated using the image hash as a key. Quantized Index Modulation of DCT coefficients is used for wa...

2015
Radu Ovidiu PREDA Ioana MARCU Amelia CIOBANU Radu Ovidiu Preda Ioana Marcu Amelia Ciobanu

In this paper a novel watermarking scheme for image authentication and recovery is presented. The algorithm can detect modified regions in images and is able to recover a good approximation of the original content of the tampered regions. For this purpose, two different watermarks have been used: a semi-fragile watermark for image authentication and a robust watermark for image recovery, both e...

2013
Xu Li Xingming Sun Quansheng Liu Beijing Chen

Based on fixed point theory, this paper proposes a simple but efficient method for image integrity authentication, which is different from Digital Signature and Fragile Watermarking. By this method, any given image can be transformed into a fixed point of a well-chosen function, which can be constructed with periodic functions. The authentication can be realized due to the fragility of the fixe...

2013
Seyed Mohammad Mousavi

Usual digital signature schemes for image authentication encode the signature in a file separate from the original image, so this process require extra bandwidth to transmit it. Meantime, watermarking is an information hiding sub-discipline that embeds some information into host image. In this paper a joined digital signature and digital watermarking scheme for image authentication is proposed ...

2015
G. B Ogunniye O. M Afolabi

This paper presents multifactor authentication method for securing access to e-banking systems in Nigeria using fingerprint recognition and SiteKey authentication. Fingerprint authentication is based on the notion of fingerprint individuality; the idea that fingerprint image of an individual is unique and can be used to uniquely identify him/her. SiteKey authentication on the other hand, uses a...

Journal: :J. Visual Communication and Image Representation 2011
Jun-Chou Chuang Yu-Chen Hu

1047-3203/$ see front matter 2011 Elsevier Inc. A doi:10.1016/j.jvcir.2011.03.011 ⇑ Corresponding author. Fax: +886 4 26324045. E-mail addresses: [email protected] (J.-C. Chuang This paper proposes an image authentication scheme which detects illegal modifications for image vector quantization (VQ). In the proposed scheme, the index table is divided into non-overlapping index blocks. The authen...

2014
Akshay Girdhar

Secret image sharing is a technique to protect the sensitive data. Secret image sharing combined with steganography and transform domain improves authentication ability. The primary objective of the paper is to design a novel algorithm for hiding the secret data in the transform domain. The underlying concept is based on the discrete wavelet transform. A technique comprising of Haar filter and ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید