Sciweavers

853 search results - page 28 / 171
» Flexible authentication of images
Sort
View
ICIP
2008
IEEE
14 years 9 months ago
Localization of tampering in contrast and brightness adjusted images using distributed source coding and expectation maximizatio
Media authentication and tampering localization are important in content delivery via untrusted intermediaries, such as peer-to-peer (P2P) file sharing. Many differently encoded v...
Yao-Chung Lin, David P. Varodayan, Torsten Fink, E...
ICIP
2003
IEEE
14 years 9 months ago
Dither-based secure image hashing using distributed coding
We propose an image hashing algorithm that is based on distributed compression principles. The algorithm assumes the availability of a robust feature vector extracted from the ima...
Mark Johnson, Kannan Ramchandran
JEI
2002
152views more  JEI 2002»
13 years 7 months ago
Cryptanalysis of the Yeung - Mintzer fragile watermarking technique
The recent proliferation of digital multimedia content has raised concerns about authentication mechanisms for multimedia data. A number of authentication techniques based on digi...
Jessica J. Fridrich, Miroslav Goljan, Nasir Memon
ICIP
2002
IEEE
14 years 9 months ago
Likelihood normalization for face authentication in variable recording conditions
In this paper we evaluate the effectiveness of two likelihood normalization techniques, the Background Model Set (BMS) and the Universal Background Model (UBM), for improving perf...
Kuldip K. Paliwal, Conrad Sanderson
ICPR
2006
IEEE
14 years 1 months ago
Combining Fingerprint, Palmprint and Hand-Shape for User Authentication
This paper investigates a new approach for personal authentication by combining unique biometric features which can be acquired from hand images alone. The proposed method attempt...
Ajay Kumar, David Zhang