Sciweavers

853 search results - page 16 / 171
» Flexible authentication of images
Sort
View
JDCTA
2010
152views more  JDCTA 2010»
13 years 2 months ago
An Image Authentication Scheme Based on Correlation
This paper proposes a watermarking algorithm based on correlation to authenticate image content. The original image is converted to YIQ space first, then subdivided into 8
Daxing Zhang, Shiming Liang, Zhigeng Pan, Haihua L...
CORR
2011
Springer
169views Education» more  CORR 2011»
13 years 2 months ago
Strict Authentication Watermarking with JPEG Compression (SAW-JPEG) for Medical Images
This paper proposes a strict authentication watermarking for medical images. In this scheme, we define region of interest (ROI) by taking the smallest rectangle around an image. T...
Jasni Mohamad Zain
ISCAS
2003
IEEE
106views Hardware» more  ISCAS 2003»
14 years 25 days ago
Secure data hiding in binary document images for authentication
In this paper, we present a data hiding algorithm for binary document images. This algorithm is based on the DistanceReciprocal Distortion Measure [1] that is used to evaluate the...
Haiping Lu, Alex C. Kot, Jun Cheng
SOUPS
2005
ACM
14 years 1 months ago
Authentication using graphical passwords: effects of tolerance and image choice
Graphical passwords are an alternative to alphanumeric passwords in which users click on images to authenticate themselves rather than type alphanumeric strings. We have developed...
Susan Wiedenbeck, Jim Waters, Jean-Camille Birget,...
ICASSP
2011
IEEE
12 years 11 months ago
Authentication of fingerprint scanners
Fingerprint scanners have unique patterns that can be used to distinguish one scanner from another one. The pattern, which we call scanner pattern, stems from the variability of d...
Vladimir I. Ivanov, John S. Baras