Sciweavers

474 search results - page 76 / 95
» Region-Based Watermarking for Images
Sort
View
IWDW
2005
Springer
14 years 3 months ago
The Return of the Sensitivity Attack
The sensitivity attack is considered as a serious threat to the security of spread-spectrum-based schemes, since it provides a practical method of removing watermarks with minimum ...
Pedro Comesaña, Luis Pérez-Freire, F...
ICIP
2004
IEEE
14 years 11 months ago
Redundant image representations in security applications
To be efficient, data protection algorithms should generally exploit the properties of the media information in the transform domain. In this paper, we will advocate the use of no...
Philippe Jost, Pierre Vandergheynst, Pascal Frossa...

Publication
308views
15 years 9 months ago
Measures for Classification and Detection in Steganalysis
Still and multi-media images are subject to transformations for compression, steganographic embedding and digital watermarking. In a major program of activities we are engaged in t...
Sujit Gujar, C E Veni Madhavan
ICDAR
2009
IEEE
13 years 7 months ago
Extraction of Nom Text Regions from Stele Images Using Area Voronoi Diagram
Automatic processing of images of steles is a challenging problem due to the variation in their structures and body text characteristics. In this paper, area Voronoi diagram is us...
Thai V. Hoang, Salvatore Tabbone, Ngoc-Yen Pham
JCP
2007
88views more  JCP 2007»
13 years 9 months ago
Watermarks and Text Transformations in Visual Document Authentication
— Integrity of digital documents is a very important issue if they are to be legally binding. Common solutions, like digital signatures or message authentication codes, are based...
Igor Fischer, Thorsten Herfet