نتایج جستجو برای: image authentication

تعداد نتایج: 408635  

Journal: :Signal Processing 2003
Alexandre H. Paquet Rabab Kreidieh Ward Ioannis Pitas

In this paper, we present a novel watermarking scheme to ensure the authenticity of digital images. Our authentication technique is able to detect malicious tampering of images even if they have been incidentally distorted by basic image processing operations. The image protection is achieved by the insertion of a secret author’s identification key in the image wavelet coefficients by their sel...

2009
Soumik Das Pradosh Bandyopadhyay Shauvik Paul Arindam SinhaRay

Accessibility and ease of internet, together with availability of relatively inexpensive digital recording and storage devices has created an environment where duplication, unauthenticated use and maldistribution of digital content has become very easy. This also facilitates unauthorized use, misappropriation, misrepresentation. Thus authentication of multimedia contents (such as image, video, ...

2010
Di Xiao Frank Y. Shih

Although a variety of watermark-based image authentication schemes have been proposed so far, most of them have to leave some permanent distortions in the original image for embedding the watermark information. In this paper, we propose a novel reversible image authentication scheme to allow complete recovery of the cover image after the extraction of the embedded watermark. In the embedding pr...

Journal: :CoRR 2012
Madhumita Sengupta J. K. Mandal

In this paper a 4 x 4 Daubechies transform based authentication technique termed as SADT has been proposed to authenticate gray scale images. The cover image is transformed into the frequency domain using 4 x 4 mask in a row major order using Daubechies transform technique, resulting four frequency subbands AF, HF, VF and DF. One byte of every band in a mask is embedding with two/four bits of s...

2014
Neha Gandhi

It is very important to provide security to voting system and mostly which is online one. In this paper we provide security to online voting system with secure user authentication by providing biometric as well as password security to voter accounts. Basic idea behind this is to combine secret key with cover image on the basis of key image. As a result such new image is produced by system calle...

2014
JAYASHREE S PILLAI

Conventional digital signature schemes for image authentication encode the signature in a file separate from the original image, thus require extra bandwidth to transmit it. Watermarking techniques embed some information in the host image. In this paper, a public key based digital signature scheme for image authentication is proposed. The scheme extracts feature value from the pixels of the of ...

Journal: :I. J. Network Security 2016
Anirban Goswami Nabin Ghoshal

This paper introduces an enhanced image authentication technique providing greater security with uncompromising visual quality. To augment data security, the authenticating information is diffused into the transformed coefficients of both the levels after a two level Discrete Haar Wavelet Transform. In addition a bit level noise reduction algorithm increases the imperceptibility of the added no...

2014
Kamel Mohamed

This paper presents a secure and robust image watermarking scheme based on the reversible DWT-DCT-SVD transformations to increase both integrity authentication and confidentiality. The proposed approach uses two types of watermarks image: a reversible watermark W1 used for verification (integrity and authentication aspects), and a second watermark W2 (a logo image) to verify the confidentiality...

2006
Chih-Hung Lin Wen-Shyong Hsieh

Semi-fragile image authentication methods are robust to JPEG images, but are fragile to other malicious manipulations. This paper presents a novel digital signature scheme that adopts statistic Ogive analysis in quantized discrete cosine transform (DCT) coefficients to construct a feature code for image authentication. The lower bound sensitivity of fragility can be determined by a predetermine...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید