Sciweavers

282 search results - page 4 / 57
» Robust Hash for Detecting and Localizing Image Tampering
Sort
View
ISCAS
2005
IEEE
152views Hardware» more  ISCAS 2005»
14 years 29 days ago
Error resilient content-based image authentication over wireless channel
—The pervasive distribution of digital images triggers an emergent need of authenticating degraded images by lossy compression and transmission. This paper proposes a robust cont...
Shuiming Ye, Qibin Sun, Ee-Chien Chang
ICASSP
2009
IEEE
14 years 2 months ago
An efficient and robust method for detecting copy-move forgery
Copy-move forgery is a specific type of image tampering, where a part of the image is copied and pasted on another part of the same image. In this paper, we propose a new approac...
Sevinc Bayram, Husrev T. Sencar, Nasir D. Memon
ICIP
2001
IEEE
14 years 9 months ago
Multi-level watermarking with independent decoding
A drawback of most watermarking techniques is the need for some additional information in order to retrieve the watermark. Additionally, the robustness of the watermark decreases ...
Moshe Butman, Hagit Zabrodsky Hel-Or
ISMAR
2009
IEEE
14 years 2 months ago
Augmenting text document by on-line learning of local arrangement of keypoints
We propose a technique for text document tracking over a large range of viewpoints. Since the popular SIFT or SURF descriptors typically fail on such documents, our method conside...
Hideaki Uchiyama, Hideo Saito
ISM
2008
IEEE
100views Multimedia» more  ISM 2008»
14 years 1 months ago
Robust Edge Detection Based on Non-local Contribution of Local Frequency Characteristics
This paper introduces a robust approach to the problem of edge detection in situations characterized by high levels of image degradation and illumination non-uniformity. Popular e...
Alexander Wong, William Bishop