Sciweavers

451 search results - page 7 / 91
» Processing JPEG-compressed images and documents
Sort
View
ICIP
2005
IEEE
14 years 1 months ago
Digital "bullet scratches" for images
The problem investigated in this paper is identification of sensor that was used to obtain a given digital image. We show that the high-medium frequency component of the sensor pa...
Jan Lukás, Jessica J. Fridrich, Miroslav Go...
TCSV
2008
134views more  TCSV 2008»
13 years 7 months ago
Invariant Image Watermarking Based on Statistical Features in the Low-Frequency Domain
Watermark resistance to geometric attacks is an important issue in the image watermarking community. Most countermeasures proposed in the literature usually focus on the problem of...
Shijun Xiang, Hyoung-Joong Kim, Jiwu Huang
SCALESPACE
2001
Springer
14 years 7 days ago
Down-Scaling for Better Transform Compression
Abstract. The most popular lossy image compression method used on the Internet is the JPEG standard. JPEG’s good compression performance and low computational and memory complexi...
Alfred M. Bruckstein, Michael Elad, Ron Kimmel
TIFS
2008
120views more  TIFS 2008»
13 years 7 months ago
Determining Image Origin and Integrity Using Sensor Noise
In this paper, we provide a unified framework for identifying the source digital camera from its images and for revealing digitally altered images using photo-response nonuniformit...
Mo Chen, Jessica J. Fridrich, Miroslav Goljan, Jan...
ICIP
2004
IEEE
14 years 9 months ago
Steganalysis of quantization index modulation data hiding
Quantization index modulation (QIM) techniques have been gaining popularity in the data hiding community because of their robustness and information-theoretic optimality against a...
Kenneth Sullivan, Zhiqiang Bi, Upamanyu Madhow, Sh...