Sciweavers

451 search results - page 5 / 91
» Processing JPEG-compressed images and documents
Sort
View
ICASSP
2009
IEEE
14 years 1 months ago
Flatbed scanner identification based on dust and scratches over scanner platen
In this paper, a novel individual source scanner identification scheme is proposed. The scheme uses traces of dust, dirt, and scratches over scanner platen on scanned images to c...
Ahmet Emir Dirik, Husrev T. Sencar, Nasir D. Memon
JDCTA
2010
152views more  JDCTA 2010»
13 years 1 months ago
Robust and Geometric Invariant Watermarking Scheme using Block and Gray-Level Histograms
As one of the crucial problems in watermarking, robustness against geometric distortion and JPEG compression becomes more than challenging and problematic. In this paper, a robust...
Chi-Man Pun, Xiaochen Yuan
ICIP
2001
IEEE
14 years 8 months ago
On the security of the SARI image authentication system
In this paper we investigate the image authentication system SARI, proposed by C.Y. Lin and S.F. Chang [1], that distinguishes JPEG compression from malicious manipulations. In pa...
Regunathan Radhakrishnan, Nasir D. Memon
CRV
2008
IEEE
125views Robotics» more  CRV 2008»
13 years 8 months ago
Enhancing Steganography in Digital Images
The recent digital revolution has facilitated communication, data portability and on-the-fly manipulation. Unfortunately, this has brought along some critical security vulnerabili...
Abbas Cheddad, Joan Condell, Kevin Curran, Paul Mc...
ICIP
2001
IEEE
14 years 8 months ago
Compression color space estimation of JPEG images using lattice basis reduction
Given a color image that was quantized in some hidden color space (termed compression color space) during previous JPEG compression, we aim to estimate this unknown compression co...
Ramesh Neelamani, Ricardo L. de Queiroz, Richard G...