نتایج جستجو برای: image authentication

تعداد نتایج: 408635  

Journal: :International Journal of Computer and Communication Technology 2015

2010
G. Arumugam R. Sujatha

In order to protect secret information from sensitive and various applications, secured authentication system should be incorporated; it should contain security and confidentiality. Even if it is assumed that the cryptographic primitives are perfect, the security goals may not be achieved: the system itself may have weaknesses that can be exploited by an attacker in network attacks. In this pap...

2012
Neha Patil N. A. Dhawas

–The process of encryption and message authentication code is conventionally considered as orthogonal security mechanism. The objective of message security mechanism is to validate data authentication, whereas encryption is used to deform the message to achieve data confidentiality. The digital signature and watermarking methods are used for image authentication. Digital signature encodes the s...

2011
Che-Wei Lee Wen-Hsiang Tsai

A new grayscale image authentication method with a pixel-level self-recovering capability for tampered region repairing is proposed. By dividing the grayscale range into bins, a 3-bit bin code is generated as the authentication signal for each pixel in the input cover image. The authentication signals then are embedded randomly into the image pixels for the double purposes of tampering localiza...

1998
Ching-Yung Lin Shih-Fu Chang

Image/video authentication techniques protect the recipients against malicious forgery. In this paper, we describe an image authentication technique that verifies the originality of the received images. The authentication signature can distinguish content-changing manipulations (such as pixel replacing) from content-preserving manipulations (such as JPEG compression). We also propose a video au...

Journal: :Signal Processing 2013
Che-Wei Lee Wen-Hsiang Tsai

A new data hiding method via PNG images based on Shamir’s (k, n)-threshold secret sharing scheme is proposed. The coefficients of the polynomial used by the Shamir’s method are taken as carriers to carry given data. The data to be hidden then are transformed into partial shares and embedded into the alpha-channel plane of a cover PNG image. Undesired white noise created in the resulting stego-i...

2005
Mi-Ae Kim Kil-Sang Yoo Won-Hyung Lee

As images are commonly transmitted or stored in compressed form such as JPEG lossy compression, image authentication demands techniques that can distinguish incidental modifications (e.g., compression) from malicious ones. In this paper, we propose an effective technique for image authentication which can prevent malicious manipulations but allow JPEG compression. An image is divided into block...

Journal: :J. Electronic Imaging 2013
Yu-Chen Hu Chun-Chi Lo Wu-Lin Chen Chia-Hsien Wen

A joint image coding and image authentication scheme based on absolute moment block truncation coding (AMBTC) is proposed. In the proposed scheme, the authentication data is generated by using the pseudo random sequence. Then, the authentication codes are embedded into the bit maps of AMBTC-compressed image blocks. The embedded bit maps and these quantization levels are further losslessly compr...

2009
Mona F. M. Mursi Ghazy M.R. Assassa Hatim A. Aboalsamh Khaled Alghathbar

The challenge in the case of image authentication is that in many cases images need to be subjected to non malicious operations like compression, so the authentication techniques need to be compression tolerant. In this paper we propose an image authentication system that is tolerant to JPEG lossy compression operations. A scheme for JPEG grey scale images is proposed based on a data embedding ...

2003
Dekun Zou Chai Wah Wu Guorong Xuan Yun Q. Shi

In this paper, we present a novel content-based image authentication framework which embeds the authentication information into the host image using a lossless data hiding approach. In this framework the features of a target image are first extracted and signed using the Digital Signature Algorithm (DSA). The authentication information is generated from the signature and the features are then i...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید