Sciweavers

61 search results - page 4 / 13
» Image Tamper Detection Based On Demosaicing Artifacts
Sort
View
ICIP
2008
IEEE
14 years 8 months ago
A perceptual metric for blind measurement of blocking artifacts with applications in transform-block-based image and video codin
In this paper, we analyze the formation of blocking artifacts as a result of quantization of the discrete cosine transform (DCT) coefficients. These artifacts are known to be the ...
Koohyar Minoo, Truong Q. Nguyen
AMC
2007
134views more  AMC 2007»
13 years 7 months ago
An image fragile watermark scheme based on chaotic image pattern and pixel-pairs
Fragile watermarking techniques for digital content have been studied in the past few years. Fragile watermarks are used to determine if a piece of watermarked digital content has...
Shaohui Liu, Hongxun Yao, Wen Gao, Yongliang Liu
ISCAS
2003
IEEE
106views Hardware» more  ISCAS 2003»
14 years 8 days ago
Secure data hiding in binary document images for authentication
In this paper, we present a data hiding algorithm for binary document images. This algorithm is based on the DistanceReciprocal Distortion Measure [1] that is used to evaluate the...
Haiping Lu, Alex C. Kot, Jun Cheng
ISCAS
2005
IEEE
152views Hardware» more  ISCAS 2005»
14 years 17 days ago
Error resilient content-based image authentication over wireless channel
—The pervasive distribution of digital images triggers an emergent need of authenticating degraded images by lossy compression and transmission. This paper proposes a robust cont...
Shuiming Ye, Qibin Sun, Ee-Chien Chang
ICSAP
2010
13 years 10 months ago
An Enhanced Implementation of Brain Tumor Detection Using Segmentation Based on Soft Computing
—Image Segmentation is an important and challenging factor in the medical image segmentation. This paper describes segmentation method consisting of two phases. In the first phas...
T. Logeswari, M. Karnan