نتایج جستجو برای: image authentication
تعداد نتایج: 408635 فیلتر نتایج به سال:
In this study, a novel binary image authentication scheme is proposed, which can be used to detect any alteration of the host image. In the proposed scheme, the watermark is embedded into a host image using a Hamming-code-based embedding algorithm. A performance analysis shows that the proposed scheme achieves both smaller distortion and lower false negative rates than the previous schemes. key...
Energy Aware Adaptive Image Transmission Scheme with Data Authentication in Wireless Sensor Networks
Wireless Multimedia Sensor Networks (WMSNs) are gaining research interest due to the availability of low-cost cameras and CMOS image sensors, also due to their broad application opportunities. The energy and resource constrained environment of WMSNs calls for low complexity energy aware image authentication and transmission schemes with minimal overheads. The proposed scheme enhances the data s...
Images are normally protected using standard messages authentication codes to protect them against tampering and forgeries. One problem with this approach is that when such images are transmitted over a noisy medium, even a single bit error might render the image as un-authentic to the receiver. In this paper, a noise tolerant data authentication algorithm is proposed. The proposed algorithm ca...
In this survey, we first describe the purposes for image hiding. They are Steganography, Image Watermarking and Image Authentication. Classified by hiding methods, image hiding can be divided into pixel-based image hiding, frequency-based image hiding and VQ-based image hiding. In the aspect of pixel-based image hiding, we describe three representative methods, the substitution table technique,...
Digital multimedia makes fabricating and copying much easier than ever before. Therefore, it demands efficient and automatic techniques to identify and verify the content of digital multimedia. Image authentication is such a technique to automatically identify whether the query image is a fabrication or a simple copy of the original one. In this paper, we propose a perceptual image authenticati...
Digital image authentication techniques have recently gained a lot of attention due to their importance large number military and medical applications, banks, institutions, which require high level security. Generally, digital images are transmitted over insecure media, such as the Internet computer networks various kinds. The has become one basic pillars life solution many problems left by cor...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید