Sciweavers

853 search results - page 11 / 171
» Flexible authentication of images
Sort
View
ICIP
2009
IEEE
14 years 8 months ago
Perfomance Analysis Of The Fridrich-goljan Self-embedding Authentication Method
A performance analysis of the authentication method proposed by J. Fridrich and M. Goljan is carried out. This method has the particular feature that both the embedder and the det...
VIP
2001
13 years 9 months ago
Web-based Image Authentication Using Invisible Fragile Watermark
The demand of security is getting higher in these days due to easy reproduction of digitally created multimedia data. Digital watermark is the emerging technique to embed secret i...
Yusuk Lim, Changsheng Xu, David Dagan Feng
ICIP
2001
IEEE
14 years 9 months ago
A flexible polygon representation of multiple overlapping regions of interest for wavelet-based image coding
Image transmission over low-bandwidth channels can be speeded up if the image coding mechanism supports regions of interest (RoIs). By such a scheme, image parts not belonging to ...
Heidrun Schumann, René Rosenbaum, Uwe Rausc...
ICMCS
2006
IEEE
107views Multimedia» more  ICMCS 2006»
14 years 1 months ago
A Flexible Content-Based Approach to Adaptive Image Compression
Recent research in image compression has focused on lossy compression algorithms. However, the baseline implementations of such algorithms generally use a universal quantization p...
Alexander Wong, William Bishop
MEDIAFORENSICS
2010
13 years 9 months ago
Digital image authentication from thumbnails
We describe how to exploit the formation and storage of an embedded image thumbnail for image authentication. The creation of a thumbnail is modeled with a series of filtering ope...
Eric Kee, Hany Farid