نتایج جستجو برای: image authentication

تعداد نتایج: 408635  

Journal: :I. J. Network Security 2017
Li Liu Anhong Wang Chin-Chen Chang Zhihong Li

A secret image sharing with deep-steganography and twostage authentication based on matrix encoding is proposed. This scheme firstly employed Wang and Su’s sharing scheme to share a secret image into n shadows. Then, n shadows were embedded into the pre-selected cover images by using matrix encoding so as to generate n stego images. Different from the common schemes which directly use LSBs repl...

Journal: :Optics letters 2011
Elisabet Pérez-Cabré Myungjin Cho Bahram Javidi

Photon-counting imaging is integrated with optical encryption for information authentication. An image is double-random-phase encrypted, and a photon-limited encrypted image is obtained. The photon-counting encrypted image is generated with few photons and appears sparse; however, we show that it has sufficient information for decryption and authentication. The decrypted image cannot be easily ...

Journal: :Informal: informatics journal 2022

Authentication is an important step in a system. Text-based authentication alternative that currently widely used. However, text-based has the disadvantage of being ineffective when users have multiple accounts. This weakness can be overcome using image-based authentication. The implementation use Reduced Difference Expansion (RDE) steganography method. application authentication, utilizing ima...

2016
Hong Zhong Haiquan Liu Chin-Chen Chang Chia-Chen Lin

A novel fragile watermark-based image authentication scheme for images that are compressed by absolute moment block truncation coding (AMBTC) was proposed in this paper. In the proposed scheme, an authentication code is generated by a pseudo random sequence. Subsequently, the authentication code is embedded into both quantization levels and the bit map of each image block for AMBTC-compressed i...

2015
Pradnya Kadam

Digital images are used to safeguard confidential & important information. But the problem is providing authentication, integrity and data security to these digital images. In existing techniques of security and authentication conventional watermarking schemes are used. In these techniques cryptography is the basic method adopted which has problem of tampering of information easily by hackers. ...

Journal: :Journal of Food Engineering 2018

Journal: :Journal of Physics: Conference Series 2007

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید