نتایج جستجو برای: image authentication

تعداد نتایج: 408635  

Journal: :International Journal of Computer and Communication Technology 2016

Journal: :International Journal of Computer Applications 2010

2013
P. Sujitha G. Murali

A new authentication method based on the secret sharing technique along with a data repairing capability for gray scale document images via the use of PNG (portable network graphics) is proposed. An authentication signal is generated for every and each block of a gray-scale document image, which, in conjunction with the binarized block content, is remodeled into many shares exploitation the Sha...

2003
Pei-Ming Huang Wen-Hsiang Tsai

A novel method for copyright protection and authentication of grayscale images is proposed. The involved techniques include a human visual model, least significant bit replacement, and reversible pixel color adjustment. These techniques are integrated effectively to embed a visible watermark and authentication signals into the single grayscale channel of the image. The copyright of the image ca...

Journal: :CoRR 2012
Madhumita Sengupta J. K. Mandal

In this paper a self organized legal document/content authentication, copyright protection in composite domain has been proposed without using any external information. Average values of transformed red and green components in frequency domain generated through wavelet transform are embedded into the blue component of the color image matrix in spatial domain. A reverse transformation is made in...

Journal: :Trans. Data Hiding and Multimedia Security 2007
Shuiming Ye Qibin Sun Ee-Chien Chang

Content-based image authentication typically assesses authenticity based on a distance measure between the image to be tested and its original. Commonly employed distance measures such as the Minkowski measures (including Hamming and Euclidean distances) may not be adequate for content-based image authentication since they do not exploit statistical and spatial properties in features. This pape...

Journal: :Mathematical Problems in Engineering 2014

Journal: :Journal of Physics: Conference Series 2021

Journal: :Wireless Communications and Mobile Computing 2022

With the advancement of technology, it has become easier to modify or tamper with digital data effortlessly. In recent times, image hashing algorithm gained popularity for authentication applications. this paper, a convolutional stacked denoising autoencoder (CSDAE) is utilized producing hash codes that are robust against different content preserving operations (CPOs). The CSDAE comprises mappi...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید