Sciweavers

20 search results - page 1 / 4
» Fault-induced attack on semi-fragile image authentication sc...
Sort
View
TCSV
2008
156views more  TCSV 2008»
13 years 4 months ago
Robust Lossless Image Data Hiding Designed for Semi-Fragile Image Authentication
Recently, among various data hiding techniques, a new subset, lossless data hiding, has received increasing interest. Most of the existing lossless data hiding algorithms are, howe...
Zhicheng Ni, Yun Q. Shi, Nirwan Ansari, Wei Su, Qi...
CHI
2011
ACM
12 years 8 months ago
Security through a different kind of obscurity: evaluating distortion in graphical authentication schemes
While a large body of research on image-based authentication has focused on memorability, comparatively less attention has been paid to the new security challenges these schemes m...
Eiji Hayashi, Jason Hong, Nicolas Christin
TIP
2002
102views more  TIP 2002»
13 years 4 months ago
Hierarchical watermarking for secure image authentication with localization
Several fragile watermarking schemes presented in the literature are either vulnerable to vector quantization (VQ) counterfeiting attacks or sacrifice localization accuracy to impr...
Mehmet Utku Celik, Gaurav Sharma, Eli Saber, A. Mu...
JEI
2007
88views more  JEI 2007»
13 years 4 months ago
Wavelet-based fragile watermarking scheme for image authentication
In this work, we propose a novel fragile watermarking scheme in wavelet transform domain, which is sensitive to all kinds of manipulations and has the ability to localize the tamp...
Chang-Tsun Li, Huayin Si