Sciweavers

356 search results - page 38 / 72
» Foveated image watermarking
Sort
View
ICIP
2002
IEEE
14 years 11 months ago
Semi-fragile image authentication using generic wavelet domain features and ECC
In this paper we present a generic content-based solution targeting at authenticating image in a semi-fragile way, which integrates watermarking-based approach with signature-base...
Qibin Sun, Shih-Fu Chang
JDCTA
2010
152views more  JDCTA 2010»
13 years 4 months ago
An Image Authentication Scheme Based on Correlation
This paper proposes a watermarking algorithm based on correlation to authenticate image content. The original image is converted to YIQ space first, then subdivided into 8
Daxing Zhang, Shiming Liang, Zhigeng Pan, Haihua L...

Publication
302views
14 years 7 months ago
A New Fingerprinting Method For Digital Images
The wide use of digital media during the past few years, has led to an increase of digital piracy and tampering. To deal with these problems, the concept of watermarking has been i...
V.Fotopoulos and A.N.Skodras
MMSEC
2005
ACM
132views Multimedia» more  MMSEC 2005»
14 years 3 months ago
Resolution and quality scalable spread spectrum image watermarking
If digital watermarking is to adequately protect content in systems which provide both resolution and quality scalability, then the watermarking algorithms used must provide both ...
Angela Piper, Reihaneh Safavi-Naini, Alfred Mertin...
IWDW
2004
Springer
14 years 3 months ago
Alteration-Locating Authentication Watermarking for Binary Images
Abstract. In image authentication watermarking, hidden data is inserted into an image to detect any accidental or malicious image alteration. In the literature, quite a small numbe...
Hae Yong Kim, Ricardo L. de Queiroz