نتایج جستجو برای: image authentication
تعداد نتایج: 408635 فیلتر نتایج به سال:
In this paper, we present a novel watermarking scheme to ensure the authenticity of digital images. Our authentication technique is able to detect malicious tampering of images even if they have been incidentally distorted by basic image processing operations. The image protection is achieved by the insertion of a secret author’s identification key in the image wavelet coefficients by their sel...
Accessibility and ease of internet, together with availability of relatively inexpensive digital recording and storage devices has created an environment where duplication, unauthenticated use and maldistribution of digital content has become very easy. This also facilitates unauthorized use, misappropriation, misrepresentation. Thus authentication of multimedia contents (such as image, video, ...
Although a variety of watermark-based image authentication schemes have been proposed so far, most of them have to leave some permanent distortions in the original image for embedding the watermark information. In this paper, we propose a novel reversible image authentication scheme to allow complete recovery of the cover image after the extraction of the embedded watermark. In the embedding pr...
In this paper a 4 x 4 Daubechies transform based authentication technique termed as SADT has been proposed to authenticate gray scale images. The cover image is transformed into the frequency domain using 4 x 4 mask in a row major order using Daubechies transform technique, resulting four frequency subbands AF, HF, VF and DF. One byte of every band in a mask is embedding with two/four bits of s...
It is very important to provide security to voting system and mostly which is online one. In this paper we provide security to online voting system with secure user authentication by providing biometric as well as password security to voter accounts. Basic idea behind this is to combine secret key with cover image on the basis of key image. As a result such new image is produced by system calle...
Conventional digital signature schemes for image authentication encode the signature in a file separate from the original image, thus require extra bandwidth to transmit it. Watermarking techniques embed some information in the host image. In this paper, a public key based digital signature scheme for image authentication is proposed. The scheme extracts feature value from the pixels of the of ...
This paper introduces an enhanced image authentication technique providing greater security with uncompromising visual quality. To augment data security, the authenticating information is diffused into the transformed coefficients of both the levels after a two level Discrete Haar Wavelet Transform. In addition a bit level noise reduction algorithm increases the imperceptibility of the added no...
This paper presents a secure and robust image watermarking scheme based on the reversible DWT-DCT-SVD transformations to increase both integrity authentication and confidentiality. The proposed approach uses two types of watermarks image: a reversible watermark W1 used for verification (integrity and authentication aspects), and a second watermark W2 (a logo image) to verify the confidentiality...
Semi-fragile image authentication methods are robust to JPEG images, but are fragile to other malicious manipulations. This paper presents a novel digital signature scheme that adopts statistic Ogive analysis in quantized discrete cosine transform (DCT) coefficients to construct a feature code for image authentication. The lower bound sensitivity of fragility can be determined by a predetermine...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید