Sciweavers

Share
46 search results - page 2 / 10
» Image Authentication Using Hierarchical Semi-Fragile Waterma...
Sort
View
ICMCS
2005
IEEE
106views Multimedia» more  ICMCS 2005»
9 years 5 months ago
Watermarking based Image Authentication using Feature Amplification
In a typical content and watermarking based image authentication approach, a feature is extracted from the given image, and then embedded back into the image using a watermarking ...
Shuiming Ye, Ee-Chien Chang, Qibin Sun
SIBGRAPI
2003
IEEE
9 years 5 months ago
Secure Authentication Watermarking for Binary Images
Abstract. Authentication watermarking is a hidden data inserted into an image, in order to detect any alterations. It seems to be almost impossible to design a really secure authen...
Hae Yong Kim, Amir Afif
ICMCS
2006
IEEE
131views Multimedia» more  ICMCS 2006»
9 years 5 months ago
Wavelet-based Color Image Watermarking using Adaptive Entropy Casting
An adaptive robust image watermarking technique for color image authentication is proposed. In the proposed approach, the Y channel of a Yuv color host image and a concatenated RG...
Ming-Shing Hsieh, Din-Chang Tseng
TIP
2002
102views more  TIP 2002»
8 years 11 months ago
Hierarchical watermarking for secure image authentication with localization
Several fragile watermarking schemes presented in the literature are either vulnerable to vector quantization (VQ) counterfeiting attacks or sacrifice localization accuracy to impr...
Mehmet Utku Celik, Gaurav Sharma, Eli Saber, A. Mu...
ICMCS
2006
IEEE
178views Multimedia» more  ICMCS 2006»
9 years 5 months ago
Block-Based Lossless Data Hiding in Delta Domain
Digital watermarking is one of the ways to prove the ownership and the authenticity of the media. However, some applications, such as medical and military, are sensitive to distor...
Shu-Kei Yip, Oscar C. Au, Hoi-Ming Wong, Chi-Wang ...
books