Sciweavers

451 search results - page 4 / 91
» Processing JPEG-compressed images and documents
Sort
View
ICIP
2004
IEEE
14 years 8 months ago
Estimating and undoing rotation for print-scan resilient data hiding
This paper proposes a method to hide information into images that achieves robustness against printing and scanning with blind decoding. A significant contribution of this paper i...
Kaushal Solanki, Upamanyu Madhow, B. S. Manjunath,...
MMSEC
2006
ACM
195views Multimedia» more  MMSEC 2006»
14 years 29 days ago
Image annotation watermarking: nested object embedding using hypergraph model
In this paper, we introduce to the special domain of image annotation watermarking, based on embedding of hierarchical data related to objects into user-selected areas on an image...
Claus Vielhauer, Maik Schott
ICIP
2003
IEEE
14 years 8 months ago
Dither-modulation data hiding with distortion-compensation: exact performance analysis and an improved detector for JPEG attacks
The binary Distortion Compensated Dither-Modulation (DCDM), which can be regarded to as a baseline for quantizationbased data-hiding methods, is rigorously analyzed. A novel and a...
Félix Balado, Fernando Pérez-Gonz&aa...
ICMCS
2007
IEEE
163views Multimedia» more  ICMCS 2007»
14 years 1 months ago
Detecting Digital Image Forgeries by Measuring Inconsistencies of Blocking Artifact
Digital images can be forged easily with today’s widely available image processing software. In this paper, we describe a passive approach to detect digital forgeries by checkin...
Shuiming Ye, Qibin Sun, Ee-Chien Chang
SAC
2010
ACM
13 years 5 months ago
The 'Dresden Image Database' for benchmarking digital image forensics
This paper introduces and documents a novel image database specifically built for the purpose of development and benchmarking of camera-based digital forensic techniques. More th...
Thomas Gloe, Rainer Böhme