Sciweavers

200 search results - page 33 / 40
» Digital Watermarking
Sort
View
JCP
2007
88views more  JCP 2007»
13 years 9 months ago
Watermarks and Text Transformations in Visual Document Authentication
— Integrity of digital documents is a very important issue if they are to be legally binding. Common solutions, like digital signatures or message authentication codes, are based...
Igor Fischer, Thorsten Herfet
IH
1999
Springer
14 years 2 months ago
Developments in Steganography
Abstract. This paper presents two main results. The first is a new approach to steganography in which data is encoded in correlations among the pixels in an image. Almost all prev...
Joshua R. Smith, Chris Dodge
CVPR
2010
IEEE
14 years 6 months ago
Learning from Interpolated Images using Neural Networks for Digital Forensics
Interpolated images have data redundancy, and special correlation exists among neighboring pixels, which is a crucial clue in digital forensics. We design a neural network based f...
Yizhen Huang, Na Fan
JDCTA
2010
113views more  JDCTA 2010»
13 years 4 months ago
A Watermarking Algorithm Based on Block Energy Analysis of Wavelet Transform's Coefficients and Lorenz Chaotic Attractor
Perceptual transparency and robustness are conflicting requirements. To ensure the security of the watermarkhow to choose the embedding position and intensity is a difficult probl...
Xuelong Hu, Wei Tian, Yongai Zheng
IH
1999
Springer
14 years 2 months ago
Recovery of Watermarks from Distorted Images
Many techniques for watermarking of digital images have appeared in numerous publications. Most of these techniques are sensitive to cropping and or a ne distortions e.g., rotatio...
Neil F. Johnson, Zoran Duric, Sushil Jajodia