نتایج جستجو برای: image authentication
تعداد نتایج: 408635 فیلتر نتایج به سال:
In order to protect secret information from sensitive and various applications, secured authentication system should be incorporated; it should contain security and confidentiality. Even if it is assumed that the cryptographic primitives are perfect, the security goals may not be achieved: the system itself may have weaknesses that can be exploited by an attacker in network attacks. In this pap...
–The process of encryption and message authentication code is conventionally considered as orthogonal security mechanism. The objective of message security mechanism is to validate data authentication, whereas encryption is used to deform the message to achieve data confidentiality. The digital signature and watermarking methods are used for image authentication. Digital signature encodes the s...
A new grayscale image authentication method with a pixel-level self-recovering capability for tampered region repairing is proposed. By dividing the grayscale range into bins, a 3-bit bin code is generated as the authentication signal for each pixel in the input cover image. The authentication signals then are embedded randomly into the image pixels for the double purposes of tampering localiza...
Image/video authentication techniques protect the recipients against malicious forgery. In this paper, we describe an image authentication technique that verifies the originality of the received images. The authentication signature can distinguish content-changing manipulations (such as pixel replacing) from content-preserving manipulations (such as JPEG compression). We also propose a video au...
A new data hiding method via PNG images based on Shamir’s (k, n)-threshold secret sharing scheme is proposed. The coefficients of the polynomial used by the Shamir’s method are taken as carriers to carry given data. The data to be hidden then are transformed into partial shares and embedded into the alpha-channel plane of a cover PNG image. Undesired white noise created in the resulting stego-i...
As images are commonly transmitted or stored in compressed form such as JPEG lossy compression, image authentication demands techniques that can distinguish incidental modifications (e.g., compression) from malicious ones. In this paper, we propose an effective technique for image authentication which can prevent malicious manipulations but allow JPEG compression. An image is divided into block...
A joint image coding and image authentication scheme based on absolute moment block truncation coding (AMBTC) is proposed. In the proposed scheme, the authentication data is generated by using the pseudo random sequence. Then, the authentication codes are embedded into the bit maps of AMBTC-compressed image blocks. The embedded bit maps and these quantization levels are further losslessly compr...
The challenge in the case of image authentication is that in many cases images need to be subjected to non malicious operations like compression, so the authentication techniques need to be compression tolerant. In this paper we propose an image authentication system that is tolerant to JPEG lossy compression operations. A scheme for JPEG grey scale images is proposed based on a data embedding ...
In this paper, we present a novel content-based image authentication framework which embeds the authentication information into the host image using a lossless data hiding approach. In this framework the features of a target image are first extracted and signed using the Digital Signature Algorithm (DSA). The authentication information is generated from the signature and the features are then i...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید