Sciweavers

88 search results - page 17 / 18
» Digital Watermarking Robust Against JPEG Compression
Sort
View
ICMCS
2006
IEEE
143views Multimedia» more  ICMCS 2006»
14 years 8 days ago
On Resampling Detection and its Application to Detect Image Tampering
Usually digital image forgeries are created by copy-pasting a portion of an image onto some other image. While doing so, it is often necessary to resize the pasted portion of the ...
S. Prasad, K. Ramakrishnan
MEDIAFORENSICS
2010
13 years 7 months ago
Modern steganalysis can detect YASS
YASS is a steganographic algorithm for digital images that hides messages robustly in a key-dependent transform domain so that the stego image can be subsequently compressed and d...
Jan Kodovský, Tomás Pevný, Je...
ICIP
2004
IEEE
14 years 7 months ago
Steganalysis of quantization index modulation data hiding
Quantization index modulation (QIM) techniques have been gaining popularity in the data hiding community because of their robustness and information-theoretic optimality against a...
Kenneth Sullivan, Zhiqiang Bi, Upamanyu Madhow, Sh...
IJNSEC
2007
193views more  IJNSEC 2007»
13 years 6 months ago
Statistical Attack Resilient Data Hiding
In this paper, we propose a discrete cosine transform (DCT) based spread spectrum data-hiding algorithm that is resilient to statistical attacks. Unlike other spread spectrum base...
Palak K. Amin, Ning Liu, Koduvayur P. Subbalakshmi
TIFS
2008
120views more  TIFS 2008»
13 years 6 months ago
Determining Image Origin and Integrity Using Sensor Noise
In this paper, we provide a unified framework for identifying the source digital camera from its images and for revealing digitally altered images using photo-response nonuniformit...
Mo Chen, Jessica J. Fridrich, Miroslav Goljan, Jan...