Sciweavers

274 search results - page 44 / 55
» Anti-forensics of JPEG compression
Sort
View
ICMCS
2006
IEEE
143views Multimedia» more  ICMCS 2006»
14 years 1 months ago
On Resampling Detection and its Application to Detect Image Tampering
Usually digital image forgeries are created by copy-pasting a portion of an image onto some other image. While doing so, it is often necessary to resize the pasted portion of the ...
S. Prasad, K. Ramakrishnan
ICMCS
2005
IEEE
101views Multimedia» more  ICMCS 2005»
14 years 1 months ago
Rotation, scaling, and translation-invariant multi-bit watermarking based on log-polar mapping and discrete Fourier transform
This paper proposes an RST-invariant multi-bit watermarking system based on LPM and DFT. This system embeds the watermark in a rotation and translation invariant domain obtained b...
Wilson W. L. Fung, Akiomi Kunisa
ISCAS
2003
IEEE
125views Hardware» more  ISCAS 2003»
14 years 1 months ago
A blind watermarking technique for multiple watermarks
We propose a blind watermarking technique to embed multiple watermarks simultaneously. It allows the use of correlated key to embed multiple watermarks. A dual-key system is used ...
Peter H. W. Wong, Oscar C. Au
DOCENG
2003
ACM
14 years 1 months ago
Two diet plans for fat PDF
As Adobe's Portable Document Format has exploded in popularity so too has the number PDF generators, and predictably the quality of generated PDF varies considerably. This pa...
Thomas A. Phelps, Robert Wilensky
MM
2000
ACM
112views Multimedia» more  MM 2000»
14 years 4 days ago
How to bypass the Wassenaar arrangement: a new application for watermarking
The scope of this article is to clarify the current legal and political situation related to electronic surveillance on the one hand, and to export regulations for encryption soft...
Franck Leprévost, Raphaël Erard, Toura...