Sciweavers

45 search results - page 8 / 9
» Image Authentication Using Hierarchical Semi-Fragile Waterma...
Sort
View
55
Voted
INFORMATICASI
2008
83views more  INFORMATICASI 2008»
14 years 9 months ago
Content-Based Watermarking for Image Authentication Using Independent Component Analysis
Latha Parameswaran, K. Anbumani
MMSEC
2006
ACM
231views Multimedia» more  MMSEC 2006»
15 years 3 months ago
JPEG2000-based secure image authentication
We present an efficient JPEG2000-based image authentication scheme, which is robust to JPEG compression and other allowed signal processing operations. Positive wavelet-based wate...
Mathias Schlauweg, Dima Pröfrock, Erika M&uum...
JCP
2007
88views more  JCP 2007»
14 years 9 months ago
Watermarks and Text Transformations in Visual Document Authentication
— Integrity of digital documents is a very important issue if they are to be legally binding. Common solutions, like digital signatures or message authentication codes, are based...
Igor Fischer, Thorsten Herfet
SSWMC
2004
14 years 10 months ago
Lossless data embedding with file size preservation
In lossless watermarking, it is possible to completely remove the embedding distortion from the watermarked image and recover an exact copy of the original unwatermarked image. Lo...
Jessica J. Fridrich, Miroslav Goljan, Qing Chen, V...
ICIP
2004
IEEE
15 years 11 months ago
Robust perceptual image hashing using feature points
Perceptual image hashing maps an image to a fixed length binary string based on the image's appearance to the human eye, and has applications in image indexing, authenticatio...
Vishal Monga, Brian L. Evans