Sciweavers

78 search results - page 10 / 16
» Attacking Some Perceptual Image Hash Algorithms
Sort
View
ICIP
2002
IEEE
16 years 1 months ago
On the security of an image encryption method
The security of digital images attracts much attention recently, and many different image encryption methods have been proposed. In 1999, J.-C. Yen and J.-I. Guo proposed a novel ...
Shujun Li, Xuan Zheng
82
Voted
ICMCS
1999
IEEE
118views Multimedia» more  ICMCS 1999»
15 years 3 months ago
Evaluation of Copyright Marking Systems
Hidden copyright marks have been proposed as a solution for solving the illegal copying and proof of ownership problems in the context of multimedia objects. Many systems have been...
Fabien A. P. Petitcolas, Ross J. Anderson
CSREASAM
2006
15 years 1 months ago
A New Robust and Secure Steganographic System for Greyscale Images
: The research work in this paper shows that the currently available stenographic methods might be quite easily detected by using sufficiently careful analysis of the transmitted d...
Hesham Elzouka
MMSEC
2006
ACM
231views Multimedia» more  MMSEC 2006»
15 years 5 months ago
JPEG2000-based secure image authentication
We present an efficient JPEG2000-based image authentication scheme, which is robust to JPEG compression and other allowed signal processing operations. Positive wavelet-based wate...
Mathias Schlauweg, Dima Pröfrock, Erika M&uum...
ICPR
2000
IEEE
16 years 21 days ago
Optimal Color Composition Matching of Images
Color features are among the most important features used in image database retrieval, especially in cases where no additional semantic information is available. Due to its compac...
Jianying Hu, Aleksandra Mojsilovic