Sciweavers

30 search results - page 4 / 6
» Digital image authentication from thumbnails
Sort
View
ICASSP
2011
IEEE
12 years 8 months ago
Authentication of fingerprint scanners
Fingerprint scanners have unique patterns that can be used to distinguish one scanner from another one. The pattern, which we call scanner pattern, stems from the variability of d...
Vladimir I. Ivanov, John S. Baras
JCDL
2004
ACM
127views Education» more  JCDL 2004»
13 years 10 months ago
Collection understanding
Collection understanding shifts the traditional focus of retrieval in large collections from locating specific artifacts to gaining a comprehensive view of the collection. Visuali...
Michelle Chang, John J. Leggett, Richard Furuta, A...
ICDS
2010
IEEE
13 years 11 months ago
e-Fraud Prevention Based on the Self-Authentication of e-Documents
—We consider a method for preventing e-Fraud in which a binary image is encrypted with a floating point cipher using a convolution operation and the output quantized into a 1-bi...
J. M. Blackledge, E. Coyle
ICIP
2002
IEEE
14 years 6 months ago
Semi-fragile image authentication using generic wavelet domain features and ECC
In this paper we present a generic content-based solution targeting at authenticating image in a semi-fragile way, which integrates watermarking-based approach with signature-base...
Qibin Sun, Shih-Fu Chang
AMC
2007
134views more  AMC 2007»
13 years 5 months ago
An image fragile watermark scheme based on chaotic image pattern and pixel-pairs
Fragile watermarking techniques for digital content have been studied in the past few years. Fragile watermarks are used to determine if a piece of watermarked digital content has...
Shaohui Liu, Hongxun Yao, Wen Gao, Yongliang Liu