Sciweavers

853 search results - page 8 / 171
» Flexible authentication of images
Sort
View
ICIP
2004
IEEE
14 years 9 months ago
Secure transcoding with JPSEC confidentiality and authentication
Susie J. Wee, John G. Apostolopoulos
PR
2006
99views more  PR 2006»
13 years 7 months ago
Authenticating corrupted photo images based on noise parameter estimation
Photo image authentication is an interesting and demanding field in the computer vision and image processing community. This research is motivated by its wide range of application...
Sang-Woong Lee, Ho-Choul Jung, Bon-Woo Hwang, Seon...
ICIP
2005
IEEE
14 years 9 months ago
Localization and security enhancement of block-based image authentication
Most block-based image authentication techniques that are presented in the literature sacrifice localization accuracy in order to resist vector quantization (VQ) counterfeiting att...
Abdelkader H. Ouda, Mahmoud R. El-Sakka
TCSV
2008
156views more  TCSV 2008»
13 years 7 months ago
Robust Lossless Image Data Hiding Designed for Semi-Fragile Image Authentication
Recently, among various data hiding techniques, a new subset, lossless data hiding, has received increasing interest. Most of the existing lossless data hiding algorithms are, howe...
Zhicheng Ni, Yun Q. Shi, Nirwan Ansari, Wei Su, Qi...
ICMCS
2005
IEEE
106views Multimedia» more  ICMCS 2005»
14 years 1 months ago
Watermarking based Image Authentication using Feature Amplification
In a typical content and watermarking based image authentication approach, a feature is extracted from the given image, and then embedded back into the image using a watermarking ...
Shuiming Ye, Ee-Chien Chang, Qibin Sun