Sciweavers

282 search results - page 2 / 57
» Robust Hash for Detecting and Localizing Image Tampering
Sort
View
ICPR
2006
IEEE
14 years 1 months ago
Robust Detection of Region-Duplication Forgery in Digital Image
Region duplication forgery, in which a part of a digital image is copied and then pasted to another portion of the same image in order to conceal an important object in the scene,...
Weiqi Luo, Jiwu Huang, Guoping Qiu
ICIP
2006
IEEE
14 years 9 months ago
Tamper-Localization Watermarking with Systematic Error Correcting Code
Abstract-- This paper presents an authentication watermarking method which can localize the tampering regions in fine granularity. Unlike the previous block-wise Tampering-Localiza...
Yongdong Wu
ICIP
2010
IEEE
13 years 5 months ago
Rotation robust detection of copy-move forgery
Copy-move tampering is a common type of image synthesizing, where a part of an image is copied and pasted to another place to add or remove an object. In this paper, an efficient ...
Weihai Li, Nenghai Yu
IH
2007
Springer
14 years 1 months ago
Software Integrity Checking Expressions (ICEs) for Robust Tamper Detection
Abstract. We introduce software integrity checking expressions (SoftICEs), which are program predicates that can be used in software tamper detection. We present two candidates, pr...
Mariusz H. Jakubowski, Prasad Naldurg, Vijay Patan...
ICMCS
2006
IEEE
143views Multimedia» more  ICMCS 2006»
14 years 1 months ago
On Resampling Detection and its Application to Detect Image Tampering
Usually digital image forgeries are created by copy-pasting a portion of an image onto some other image. While doing so, it is often necessary to resize the pasted portion of the ...
S. Prasad, K. Ramakrishnan