Sciweavers

78 search results - page 10 / 16
» Attacking Some Perceptual Image Hash Algorithms
Sort
View
ICIP
2002
IEEE
14 years 9 months ago
On the security of an image encryption method
The security of digital images attracts much attention recently, and many different image encryption methods have been proposed. In 1999, J.-C. Yen and J.-I. Guo proposed a novel ...
Shujun Li, Xuan Zheng
ICMCS
1999
IEEE
118views Multimedia» more  ICMCS 1999»
13 years 12 months ago
Evaluation of Copyright Marking Systems
Hidden copyright marks have been proposed as a solution for solving the illegal copying and proof of ownership problems in the context of multimedia objects. Many systems have been...
Fabien A. P. Petitcolas, Ross J. Anderson
CSREASAM
2006
13 years 9 months ago
A New Robust and Secure Steganographic System for Greyscale Images
: The research work in this paper shows that the currently available stenographic methods might be quite easily detected by using sufficiently careful analysis of the transmitted d...
Hesham Elzouka
MMSEC
2006
ACM
231views Multimedia» more  MMSEC 2006»
14 years 1 months ago
JPEG2000-based secure image authentication
We present an efficient JPEG2000-based image authentication scheme, which is robust to JPEG compression and other allowed signal processing operations. Positive wavelet-based wate...
Mathias Schlauweg, Dima Pröfrock, Erika M&uum...
ICPR
2000
IEEE
14 years 8 months ago
Optimal Color Composition Matching of Images
Color features are among the most important features used in image database retrieval, especially in cases where no additional semantic information is available. Due to its compac...
Jianying Hu, Aleksandra Mojsilovic