Sciweavers

474 search results - page 50 / 95
» Region-Based Watermarking for Images
Sort
View
ICIP
2009
IEEE
14 years 11 months ago
Perfomance Analysis Of The Fridrich-goljan Self-embedding Authentication Method
A performance analysis of the authentication method proposed by J. Fridrich and M. Goljan is carried out. This method has the particular feature that both the embedder and the det...
ICIP
2002
IEEE
14 years 11 months ago
Semi-fragile image authentication using generic wavelet domain features and ECC
In this paper we present a generic content-based solution targeting at authenticating image in a semi-fragile way, which integrates watermarking-based approach with signature-base...
Qibin Sun, Shih-Fu Chang
JDCTA
2010
152views more  JDCTA 2010»
13 years 4 months ago
An Image Authentication Scheme Based on Correlation
This paper proposes a watermarking algorithm based on correlation to authenticate image content. The original image is converted to YIQ space first, then subdivided into 8
Daxing Zhang, Shiming Liang, Zhigeng Pan, Haihua L...

Publication
302views
14 years 7 months ago
A New Fingerprinting Method For Digital Images
The wide use of digital media during the past few years, has led to an increase of digital piracy and tampering. To deal with these problems, the concept of watermarking has been i...
V.Fotopoulos and A.N.Skodras
MMSEC
2005
ACM
132views Multimedia» more  MMSEC 2005»
14 years 3 months ago
Resolution and quality scalable spread spectrum image watermarking
If digital watermarking is to adequately protect content in systems which provide both resolution and quality scalability, then the watermarking algorithms used must provide both ...
Angela Piper, Reihaneh Safavi-Naini, Alfred Mertin...