Sciweavers

1629 search results - page 263 / 326
» Infeasible Code Detection
Sort
View
ICIP
2008
IEEE
14 years 12 months ago
Localization of sparse image tampering via random projections
Hashes can be used to provide authentication of multimedia contents. In the case of images, a hash can be used to detect whether the data has been modified in an illegitimate way....
Marco Tagliasacchi, Giuseppe Valenzise, Stefano Tu...
ICIP
2007
IEEE
14 years 12 months ago
Transform Coder Classification for Digital Image Forensics
The area of non-intrusive forensic analysis has found many applications in the area of digital imaging. One unexplored area is the identification of source coding in digital image...
Steven Tjoa, Wan-Yi Sabrina Lin, K. J. Ray Liu
ICIP
2006
IEEE
14 years 12 months ago
On Macroblock Partition for Motion Compensation
In the H.264/AVC video coding standard, motion compensation can be performed by partitioning macroblocks into square or rectangular sub-macroblocks in a quadtree decomposition. Th...
Edson M. Hung, Ricardo L. de Queiroz, Debargha Muk...
ICIP
2005
IEEE
14 years 12 months ago
Watermarking JBIG2 text region for image authentication
An authentication watermarking technique (AWT) inserts hidden data into an image in order to detect any accidental or malicious alteration to the image. AWT usually computes, usin...
Sergio Vicente Denser Pamboukian, Hae Yong Kim, Ri...
ICIP
2004
IEEE
14 years 11 months ago
A blind cdma image watermarking scheme in wavelet domain
The paper proposes a blind spread spectrum watermarking scheme where watermark information is embedded redundantly in the multilevel wavelet coefficients of the cover image. It ha...
Santi P. Maity, Malay Kumar Kundu