Sciweavers

853 search results - page 5 / 171
» Flexible authentication of images
Sort
View
ICMCS
2006
IEEE
131views Multimedia» more  ICMCS 2006»
14 years 1 months ago
A Content-Aware Stream Authentication Scheme Optimized for Distortion and Overhead
This paper proposes a content-aware authentication scheme optimized to account for distortion and overhead for media streaming. When authenticated media is streamed over a lossy n...
Zhishou Zhang, Qibin Sun, Wai-Choong Wong, John G....
DCC
1998
IEEE
13 years 11 months ago
A Lossless 2-D Image Compression Technique for Synthetic Discrete-Tone Images
Abstract - A new image compression technique, Flexible Automatic Block Decomposi
Jeffrey M. Gilbert, Robert W. Brodersen
WEBNET
2000
13 years 8 months ago
Electronic Portfolios in Assessment of Preservice Teachers
: Portfolios are valuable authentic assessment tools in preservice teacher education programs, as they allow for student demonstration of performance, interconnected tasks, respons...
Scott Walker
ICIP
2006
IEEE
14 years 1 months ago
Public Key Watermarking for Reversible Image Authentication
In this paper, we propose a new public key watermarking scheme for reversible image authentication where if the image is authentic, the distortion due to embedding can be complete...
Sang-Kwang Lee, Young-Ho Suh, Yo-Sung Ho
IJIT
2004
13 years 9 months ago
A Lossless Watermarking Based Authentication System For Medical Images
In this paper we investigate the watermarking authentication when applied to medical imagery field. We first give an overview of watermarking technology by paying attention to frag...
Samia Boucherkha, Mohamed Benmohamed