Sciweavers

356 search results - page 65 / 72
» Foveated image watermarking
Sort
View
ICIP
2004
IEEE
14 years 11 months ago
Redundant image representations in security applications
To be efficient, data protection algorithms should generally exploit the properties of the media information in the transform domain. In this paper, we will advocate the use of no...
Philippe Jost, Pierre Vandergheynst, Pascal Frossa...

Publication
308views
15 years 9 months ago
Measures for Classification and Detection in Steganalysis
Still and multi-media images are subject to transformations for compression, steganographic embedding and digital watermarking. In a major program of activities we are engaged in t...
Sujit Gujar, C E Veni Madhavan
JCP
2007
88views more  JCP 2007»
13 years 9 months ago
Watermarks and Text Transformations in Visual Document Authentication
— Integrity of digital documents is a very important issue if they are to be legally binding. Common solutions, like digital signatures or message authentication codes, are based...
Igor Fischer, Thorsten Herfet
BMCBI
2007
117views more  BMCBI 2007»
13 years 10 months ago
DNA-based watermarks using the DNA-Crypt algorithm
Background: The aim of this paper is to demonstrate the application of watermarks based on DNA sequences to identify the unauthorized use of genetically modified organisms (GMOs) ...
Dominik Heider, Angelika Barnekow
ICIP
2000
IEEE
14 years 11 months ago
Robust Image Hashing
Media hashing is an alternative to achieve many applications previously accomplished with watermarking. The major disadvantage of the existing media hashing technologies is their ...
Ramarathnam Venkatesan, S.-M. Koon, Mariusz H. Jak...