Sciweavers

30 search results - page 5 / 6
» Digital image authentication from thumbnails
Sort
View
PC
1998
125views Management» more  PC 1998»
13 years 4 months ago
A High-Performance Active Digital Library
We describe Javaflow and Paraflow, the client and server parts of a digital library, providing high-performance data-retrieval and data-mining services, with emphasis on user in...
Roy Williams, Bruce Sears
ICIP
2000
IEEE
14 years 6 months ago
Robust Image Hashing
Media hashing is an alternative to achieve many applications previously accomplished with watermarking. The major disadvantage of the existing media hashing technologies is their ...
Ramarathnam Venkatesan, S.-M. Koon, Mariusz H. Jak...
CORR
2010
Springer
191views Education» more  CORR 2010»
13 years 4 months ago
Dual Watermarking Scheme with Encryption
-- Digital Watermarking is used for copyright protection and authentication. In the proposed system, a Dual Watermarking Scheme based on DWT-SVD with chaos encryption algorithm, wi...
R. Dhanalakshmi, K. Thaiyalnayaki
IEEEMSP
2002
IEEE
125views Multimedia» more  IEEEMSP 2002»
13 years 9 months ago
Wireless multimedia error resilience via a data hiding technique
Abstract—Transmission of digital contents in unavoidable noiseprone environments demands sophisticated error detection and concealment techniques to restore the perceptual qualit...
Chun-Shien Lu
JDCTA
2008
535views more  JDCTA 2008»
13 years 4 months ago
Steganography: DCT Coefficients Reparation Technique in JPEG Image
Due to the ever-growing usage of the computer, it has led to a rapid increment in the data that is being exchanged, published and stored in an assortment of digital form. This phe...
Chiew Kang Leng, Jane Labadin, Sarah Flora Samson ...