نتایج جستجو برای: image authentication
تعداد نتایج: 408635 فیلتر نتایج به سال:
Color image authentication is a method that allows the detection of tampered regions on images. Existing related works evaluated their performance based visual quality and capability marked image, but issue grayscale invariance was ignored. However, many applications in processing required color to first convert into before any further post-processing such as edge detection, masking Photoshop, ...
With the tremendous expansion of the Internet and multimedia technologies in the recent past, digital media is being manipulated more frequently. Digital watermarking technologies are one of the best solutions for authentication and copyright protection of digital data. In this paper, we applied our lossless image authentication technique on different datasets, random images and also on differe...
This paper proposes an approach for the combined image authentication and compression of color images by making use of a digital watermarking and data hiding framework. The digital watermark is comprised of two components: a soft-authenticator watermark for authentication and tamper assessment of the given image, and a chrominance watermark employed to improve the efficiency of compression. The...
Watermarking technology was originally proposed for copyright protection. Recently it has been applied to media authentication so that a proof of authenticity is inserted into the media instead of being appended to the media as a separated attachment. However, security requirements of the authentication are overlooked in some authentication watermark schemes. In this paper we analyze three auth...
Ownership authentication and copyright protection of image has achieved a sharp attention due to easy and global availability of internet services. Illegal copying and misappropriation of digital image leads cyber crime in an epidemic form. Invisible watermarking technique is one of the leading solutions towards violation of ownership authentication problem without deteriorating the quality of ...
In this letter, we present an authentication and recovery scheme to protect images. The image blocks are DCT transformed and then encoded with different patterns. An optimal selection is adopted to find the best pattern for each block which results in better image quality. Both the recovery and check data are embedded for data protection. The experimental results demonstrate that our method is ...
Perceptual hashing is a promising solution to image content authentication. However, conventional image hash algorithms only offer a limited authentication level for the protection of overall content. In this work, we propose an image hash algorithm with block level content protection. It extracts features from DFT coefficients of image blocks. Experiments show that the hash has strong robustne...
This paper proposes a novel approach to content-based watermarking for image authentication that is based on Independent Component Analysis (ICA). In the scheme proposed here, ICA is applied to blocks of the host image and the resulting mixing matrix represents the features of the image blocks. Frobenius norm of the mixing matrix is adopted as the content-based feature. This is embedded as the ...
In this paper, we propose an image moment-based geometric normalization to be applied before embedding and extracting a digital watermark in the DWT-domain of JPEG2000. A semi-fragile signature, generated from the normalized host signal, afterwards, is embedded for image authentication. The new system is tested extensively and performance results are compared to those of methods proposed by oth...
Copyright protection of digital media is the very first application that comes to mind for digital watermarking. In the past, duplicating artwork was quite complicated and requires great efforts to create the work looks just like the original. However, in present digital world it is very simple for anyone to duplicate or manipulate digital data. The digital image watermarking allows the waterma...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید