Sciweavers

35 search results - page 7 / 7
» Secure Authentication Watermarking for Binary Images
Sort
View
JDCTA
2010
113views more  JDCTA 2010»
12 years 11 months ago
A Watermarking Algorithm Based on Block Energy Analysis of Wavelet Transform's Coefficients and Lorenz Chaotic Attractor
Perceptual transparency and robustness are conflicting requirements. To ensure the security of the watermarkhow to choose the embedding position and intensity is a difficult probl...
Xuelong Hu, Wei Tian, Yongai Zheng
ICIP
2004
IEEE
14 years 6 months ago
Robust perceptual image hashing using feature points
Perceptual image hashing maps an image to a fixed length binary string based on the image's appearance to the human eye, and has applications in image indexing, authenticatio...
Vishal Monga, Brian L. Evans
ICIP
2003
IEEE
14 years 6 months ago
Joint security & robustness enhancement for quantization embedding
This paper studies joint security and robustness enhancement of quantization based data embedding for multimedia authentication applications. We present analysis showing that thro...
M. Wu
ICIP
2010
IEEE
13 years 2 months ago
Randomly driven fuzzy key extraction of unclonable images
In this paper, we develop an adjustable Fuzzy Extractor using the Physical Unclonable Functions (PUF) obtained by a common laser engraving method to sign physical objects. In part...
Saloomeh Shariati, Laurent Jacques, Françoi...
ICIP
2009
IEEE
14 years 5 months ago
Secure Distortion Computation Among Untrusting Parties Using Homomorphic Encryption
Alice and Bob possess sequences xn and yn respectively and would like to compute d(xn , yn ) where d(., .) is a distortion measure. However, Alice and Bob do not trust each other ...