Sciweavers

853 search results - page 7 / 171
» Flexible authentication of images
Sort
View
ISCAS
2005
IEEE
152views Hardware» more  ISCAS 2005»
14 years 1 months ago
Error resilient content-based image authentication over wireless channel
—The pervasive distribution of digital images triggers an emergent need of authenticating degraded images by lossy compression and transmission. This paper proposes a robust cont...
Shuiming Ye, Qibin Sun, Ee-Chien Chang
PCM
2009
Springer
180views Multimedia» more  PCM 2009»
14 years 1 days ago
RST-Invariant Semi-fragile Image Authentication Based on DWT-Coefficient Quantization
Abstract. In this paper, we propose an image moment-based geometric normalization to be applied before embedding and extracting a digital watermark in the DWT-domain of JPEG2000. A...
Mathias Schlauweg, Erika Müller
ICIP
2009
IEEE
13 years 5 months ago
Adaptive interpolation with flexible filter structures for video coding
Dmytro Rusanovskyy, Kemal Ugur, Moncef Gabbouj
ICIP
2006
IEEE
14 years 9 months ago
Rate-Distortion Optimized Streaming of Authenticated Video
Stream authentication methods usually impose overhead and dependency among packets. The straightforward application of state-of-the-art rate-distortion (R-D) optimized streaming t...
Zhishou Zhang, Qibin Sun, Wai-Choong Wong, John G....
ICIP
2006
IEEE
14 years 9 months ago
Image Tampering Identification using Blind Deconvolution
Digital images have been used in growing number of applications from law enforcement and surveillance, to medical diagnosis and consumer photography. With such widespread populari...
Ashwin Swaminathan, Min Wu, K. J. Ray Liu