Sciweavers

18 search results - page 3 / 4
» Visual Document Authentication Using Human-Recognizable Wate...
Sort
View
IJNSEC
2010
141views more  IJNSEC 2010»
13 years 12 days ago
Protection of an Intrusion Detection Engine with Watermarking in Ad Hoc Networks
In this paper we present an intrusion detection engine comprised of two main elements; firstly, a neural network for the actual detection task and secondly watermarking techniques...
Aikaterini Mitrokotsa, Nikos Komninos, Christos Do...
MMSEC
2006
ACM
195views Multimedia» more  MMSEC 2006»
13 years 11 months ago
Image annotation watermarking: nested object embedding using hypergraph model
In this paper, we introduce to the special domain of image annotation watermarking, based on embedding of hierarchical data related to objects into user-selected areas on an image...
Claus Vielhauer, Maik Schott
IEEEIAS
2009
IEEE
14 years 7 days ago
A Block Feature Correlation Based Image Watermarking for Tamper Detection Using Linear Equation
: This paper proposes a new watermarking method for detecting image tampering. First, an authentication number is created using a pair of watermark pixels as the coefficients of a ...
Chin-Feng Lee, Kuo-Nan Chen, Chin-Chen Chang, Meng...
MMSEC
2006
ACM
231views Multimedia» more  MMSEC 2006»
13 years 11 months ago
JPEG2000-based secure image authentication
We present an efficient JPEG2000-based image authentication scheme, which is robust to JPEG compression and other allowed signal processing operations. Positive wavelet-based wate...
Mathias Schlauweg, Dima Pröfrock, Erika M&uum...
ICIP
1999
IEEE
14 years 7 months ago
Data Embedding in Text for a Copier System
In this paper, we present a scheme for embedding data in copies (color or monochrome) of predominantly text pages that may also contain color images or graphics. Embedding data im...
Anoop K. Bhattacharjya, Hakan Ancin