نتایج جستجو برای: image authentication

تعداد نتایج: 408635  

Journal: :EURASIP J. Adv. Sig. Proc. 2002
Christian Rey Jean-Luc Dugelay

Digital image manipulation software is now readily available on personal computers. It is therefore very simple to tamper with any image and make it available to others. Insuring digital image integrity has therefore become a major issue. Watermarking has become a popular technique for copyright enforcement and image authentication. The aim of this paper is to present an overview of emerging te...

2008
Xiaoping Liang

(invertible, lossless) authentication draws much attention recently for its ability to restore the original image from marked image without any distortions upon verification. In this paper, we propose a reversible water-marking scheme for image authentication based on histogram modification in integer wavelet transform (IWT) domain. The proposed scheme has features: i) Reversibility, high embed...

Journal: :DEStech Transactions on Computer Science and Engineering 2017

2003
Tetsuji Takada Hideki Koike

There is a trade-off between security and usability in user authentication for mobile phones. Since such devices have a poor input interfaces, 4-digit number passwords are widely used at present. Therefore, a more secure and user friendly authentication is needed. This paper proposes a novel authentication method called “Awase-E”. The system uses image passwords. It, moreover, integrates image ...

2014
R. Priya

Fingerprint authentication is the most consistent and practicable methods of person appreciation. The only problem with functionality of Fingerprint authentication System is it depends on the eminence of image. The quality of fingerprint image affects by both surroundings and scanner’s-surface. The Fingerprint Trivia-Matching is not possible until the eminence of fingerprint image improve. The ...

2012
L. Sumalatha V. Venkata Krishna A. Vinay Babu

Reversible image authentication has drawn a great attention for its ability to recover the original image from the watermarked image. The primary concern of authentication is to prevent from unauthorized manipulation of the image and hence has attained good importance. This paper proposes a block based reversible watermarking scheme for image authentication based on histogram modification of th...

2016
L. Sumalatha V. Venkata Krishna A. Vinay Babu

Reversible image authentication has drawn a great attention for its ability to recover the original image from the watermarked image. The primary concern of authentication is to prevent from unauthorized manipulation of the image and hence has attained good importance. This paper proposes a block based reversible watermarking scheme for image authentication based on histogram modification of th...

2013
Jun-Chou Chuang Pei-Yu Lin

The paper presented a reversible image authentication scheme for VQ images using codebook clustering. The proposed method not only locates the alterations of VQ images but also recover the indexes of VQ image without any distortion from the marked VQ indexes after the hidden authentication bits have been extracted. The method uses the codebook clustering to generate four fixed-size small codebo...

2014
S. G. Rathod A. K. Gupta

With Fast Advance Of Digital Technology Image Processing Is The Fastest Growing Area Of Research And Development. Sharing The Data And Authenticate The Same Is The Big Challenges Now A Days. To Overcome The Problem Of Pretending The Documents As Well As Image As On His /Her Name, We Invent The New Method Of An Authentication And Recovery Of Color Tampered Image Using Secure Shamir Secret Sharin...

2004
Mehmet Utku Çelik Murat Tekalp Gaurav Sharma

This thesis addresses authentication watermarking and compression of digital images under zero-distortion and maximum-per-sample-distortion constraints. In this context, a hierarchical authentication watermark is proposed for securely verifying the source and integrity of digital images and for determining altered image regions when the integrity verification fails. The proposed approach elimin...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید