نتایج جستجو برای: image authentication
تعداد نتایج: 408635 فیلتر نتایج به سال:
A Secret Image Sharing with Deep-steganography and Two-stage Authentication Based on Matrix Encoding
A secret image sharing with deep-steganography and twostage authentication based on matrix encoding is proposed. This scheme firstly employed Wang and Su’s sharing scheme to share a secret image into n shadows. Then, n shadows were embedded into the pre-selected cover images by using matrix encoding so as to generate n stego images. Different from the common schemes which directly use LSBs repl...
Photon-counting imaging is integrated with optical encryption for information authentication. An image is double-random-phase encrypted, and a photon-limited encrypted image is obtained. The photon-counting encrypted image is generated with few photons and appears sparse; however, we show that it has sufficient information for decryption and authentication. The decrypted image cannot be easily ...
Authentication is an important step in a system. Text-based authentication alternative that currently widely used. However, text-based has the disadvantage of being ineffective when users have multiple accounts. This weakness can be overcome using image-based authentication. The implementation use Reduced Difference Expansion (RDE) steganography method. application authentication, utilizing ima...
A novel fragile watermark-based image authentication scheme for images that are compressed by absolute moment block truncation coding (AMBTC) was proposed in this paper. In the proposed scheme, an authentication code is generated by a pseudo random sequence. Subsequently, the authentication code is embedded into both quantization levels and the bit map of each image block for AMBTC-compressed i...
Digital images are used to safeguard confidential & important information. But the problem is providing authentication, integrity and data security to these digital images. In existing techniques of security and authentication conventional watermarking schemes are used. In these techniques cryptography is the basic method adopted which has problem of tampering of information easily by hackers. ...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید