نتایج جستجو برای: image authentication

تعداد نتایج: 408635  

2016
Senthil Kumar

A two-phase content-based image authentication scheme is constructed based on a combination of hard and soft authentication implementing previous existing generic approximate message authentication codes which is a error-correcting codes with cryptographic message authentication codes and symmetric encryption techniques. The message authentication codes which used for hard authentication. The t...

2014

To improve the information authentication and network security one of the effective authentication mechanism is Biometric authentication System. But when this authentication system is a offline authentication system, in such case, it is required to secure this authentication information. In this work, a biometric watermarking based authentication system is defined to secure the authentication s...

Watermarking is one of the best solutions for copyright protection and authentication of multimedia contents. In this paper a hybrid scheme is proposed using wavelet and shearlet transforms with singular value decomposition. For better security, Arnold map is used for encryption. Examining the results and comparing with other methods show that this hybrid proposed scheme with simultaneous utili...

Journal: :Symmetry 2018
Chin-Chen Chang Tzu-Chuen Lu Zhao-Hua Zhu Hui Tian

This paper proposes an image authentication scheme for mobile devices. The proposed scheme generates an image watermark by using discrete cosine transform (DCT) and hides the watermark in the spatial pixels for image authentication and tamper detection. The hiding operator used in this paper is very simple in a mobile environment allowing high-speed authentication using a low-power mobile devic...

2012
Piyu Tsai Yu-Chen Hu Hsiu-Lien Yeh Wei-Kuan Shih

In this paper, a watermarking for multi-resolution image authentication is proposed. The most important image content with progressive characteristic is taken as the authentication code. The authentication code is then embedded/extracted according to multi-resolution image coding. The experimental results show the validity of the proposed scheme. The significant tampering can be detected firstl...

2006
Chien-Chang Chen Cheng-Shian Lin Hsuan Chuang

In this paper, we present how to find nearly optimal positions for embedding authentication message by Genetic Algorithm (GA), so as to achieve high quality protected image in image authentication problem. Correlations between important DCT coefficients and user defined thresholds constitute the image authentication message. The embedding positions are simulated as chromosomes and we use GA ope...

Journal: :IJDLS 2011
Yue Li Chia-Hung Wei

Digital image authentication refers to all the techniques performing anti-falsification, digital image copyright protection, or access control. A large number of DIA techniques have been developed to authenticate digital images, including cryptography-based digital image authentication (CBDIA) techniques and data-hiding-based digital image authentication (DHBDIA) techniques. This paper not only...

2012
Kanchan K. Doke S. M. Patil

Image authentication techniques have recently gained great attention due to its importance for a large number of multimedia applications. Digital images are increasingly transmitted over non-secure channels such as the Internet. Therefore, military, medical and quality control images must be protected against attempts to manipulate them; such manipulations could tamper the decisions based on th...

2003
Mehmet Utku Celik Gaurav Sharma A. Murat Tekalp Eli Saber

A novel framework is proposed for lossless authentication watermarking of images which allows authentication and recovery of original images without any distortions. This overcomes a significant limitation of traditional authentication watermarks that irreversibly alter image data in the process of watermarking and authenticate the watermarked image rather than the original. In particular, auth...

Journal: :J. Inf. Sci. Eng. 2007
Chien-Chang Chen Cheng-Shian Lin

This paper presents a robust image authentication approach that distinguishes malicious attacks from JPEG lossy compression. The authentication procedure calculates the relationships between important DCT coefficients in each pair of DCT blocks and predefined thresholds to form the authentication message, and then embeds the encryption of the authenticated message into other DCT coefficients. T...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید