Sciweavers

Share
46 search results - page 1 / 10
» Image Authentication Using Hierarchical Semi-Fragile Waterma...
Sort
View
TCSV
2008
156views more  TCSV 2008»
8 years 11 months ago
Robust Lossless Image Data Hiding Designed for Semi-Fragile Image Authentication
Recently, among various data hiding techniques, a new subset, lossless data hiding, has received increasing interest. Most of the existing lossless data hiding algorithms are, howe...
Zhicheng Ni, Yun Q. Shi, Nirwan Ansari, Wei Su, Qi...
ICIP
2001
IEEE
10 years 25 days ago
A hierarchical image authentication watermark with improved localization and security
Several fragile watermarking schemes presented in the literature are either vulnerable to vector quantization (VQ) counterfeiting attacks or sacrifice localization accuracy to imp...
Mehmet Utku Celik, Gaurav Sharma, Eli Saber, A. Mu...
MMSEC
2006
ACM
195views Multimedia» more  MMSEC 2006»
9 years 5 months ago
Image annotation watermarking: nested object embedding using hypergraph model
In this paper, we introduce to the special domain of image annotation watermarking, based on embedding of hierarchical data related to objects into user-selected areas on an image...
Claus Vielhauer, Maik Schott
MMSEC
2005
ACM
210views Multimedia» more  MMSEC 2005»
9 years 4 months ago
Composite signature based watermarking for fingerprint authentication
Digital watermarking is a technology to hide information in digital media. We extend the digital watermarking technique Phasemark™, originally developed solely for image authent...
Farid Ahmed, Ira S. Moskowitz
books