نتایج جستجو برای: image authentication

تعداد نتایج: 408635  

2017
Raphael C.-W. Phan

We analyse a recent image authentication scheme designed by Chang et al. [Chang, C.-C., Hu, Y.-S., Lu, T.-C., 2006, A watermarkingbased image ownership and tampering authentication scheme. Pattern Recognition Letters. 27, 439-446] whose first step is based on a watermarking scheme of Maniccam and Bourbakis [Maniccam, S.S., Bourbakis, N., 2004, Lossless compression and information hiding in imag...

2013
G. Vijay Baskar N. Sangeetha

Adequate user authentication is a persistent problem, particularly with mobile devices such as Personal Digital Assistants (PDAs), which tend to be highly personal and at the fringes of an organization's influence. Yet these devices are being used increasingly in military and government agencies, hospitals, and other business settings, where they pose a risk to security and privacy, not only fr...

Journal: :EURASIP J. Adv. Sig. Proc. 2010
Hongmei Liu Xinzhi Yao Jiwu Huang

We propose a content-based semi-fragile watermarking algorithm for image authentication. In content-based watermarking scheme for authentication, one of the most challenging issues is to define a computable feature vector that can capture the major content characteristics. We identify Zernike moments of the image to generate feature vector and demonstrate its good robustness and discriminative ...

2015
Mona A. M. Fouad Ahmed Mokhtar A. Mansour

This paper proposes a novel scheme for securing and authenticating digital data. Although, the experiments were applied to digital images, it is valid for sound, and video without any modifications of the core scheme. The developed scheme could be applied to the encoded data at the sender and the receiver sides, apart from the compression and decompression processes. The watermark information i...

2015
Junpeng Zhang Huaijing Qu Hongjuan Yang

A novel image authentication algorithm resisting to JPEG compression is proposed. The authentication watermark is generated based on the stability of relationship of adjacent Contourlet transform coefficients before and after JPEG. According to the random block mapping, the watermark is embedded into the discrete cosine transform (DCT) coefficients of other image blocks. The tampering identific...

2015
Sushant Kumar

Biometrics means the automated methods of identifying a person and verify the identity of a person based on physiological or behavioural characteristics. Visual cryptography divide the original image into different shares but any of the share does not give any clue about the original image. As biometric template are stored in the centralized database. Asymmetric digital watermarking is provide ...

Journal: :I. J. Network Security 2013
P. D. Sheba Kezia Malarchelvi

Image Authentication techniques enable the recipients to verify the integrity of the received image. In this paper, a semi-fragile image authentication technique based on secure hash generated with Orthogonal Polynomials based Transformation (OPT) coefficients is proposed. In this proposed scheme, the content based image feature is extracted from the OPT domain and the image hash which is used ...

2010
JOSE ANTONIO MENDOZA NORIEGA BRIAN M. KURKOSKI MARIKO NAKANO MIYATAKE HECTOR PEREZ MEANA

In this paper an image authentication algorithm is proposed where the modified areas in an image are detected, besides an aproximation of the original image, called digest image Cdig, is recovered (recovery capability). Two different watermarks are used. One semi-fragile watermark w1 is used for authentication phase. The digest image Cdig is compressed using an arithmetic code, then redundancy ...

2016
Beste Ustubioglu Elif Baykal Gul Muzaffer Guzin Ulutas

With the rapid development of powerful image, editing software makes the forgery of the digital image easy. Researchers proposed methods to cope with image authentication in recent years. We proposed a passive image authentication technique to determine the copy move forgery that copied a part of an image and pasted it on the other region in the same image. First, the method divides the image i...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید