Sciweavers

123 search results - page 10 / 25
» New attacks on SARI image authentication system
Sort
View
JDCTA
2008
535views more  JDCTA 2008»
14 years 11 months ago
Steganography: DCT Coefficients Reparation Technique in JPEG Image
Due to the ever-growing usage of the computer, it has led to a rapid increment in the data that is being exchanged, published and stored in an assortment of digital form. This phe...
Chiew Kang Leng, Jane Labadin, Sarah Flora Samson ...
IEEEMSP
2002
IEEE
156views Multimedia» more  IEEEMSP 2002»
15 years 4 months ago
A robust and secure media signature scheme for JPEG images
—In [1, 2, 3], we have introduced a robust and secure digital signature solution for multimedia content authentication, by integrating content feature extraction, error correctio...
Qibin Sun, Qi Tian, Shih-Fu Chang
MM
2010
ACM
146views Multimedia» more  MM 2010»
14 years 11 months ago
Understanding the security and robustness of SIFT
Many content-based retrieval systems (CBIRS) describe images using the SIFT local features because of their very robust recognition capabilities. While SIFT features proved to cop...
Thanh-Toan Do, Ewa Kijak, Teddy Furon, Laurent Ams...
89
Voted
ICIP
2009
IEEE
14 years 8 months ago
Finger-knuckle-print: A new biometric identifier
This paper presents a new biometric identifier, namely finger-knuckle-print (FKP), for personal identity authentication. First a specific data acquisition device is constructed to...
Lin Zhang, Lei Zhang 0006, David Zhang
MMSEC
2006
ACM
231views Multimedia» more  MMSEC 2006»
15 years 5 months ago
JPEG2000-based secure image authentication
We present an efficient JPEG2000-based image authentication scheme, which is robust to JPEG compression and other allowed signal processing operations. Positive wavelet-based wate...
Mathias Schlauweg, Dima Pröfrock, Erika M&uum...