Sciweavers

10661 search results - page 4 / 2133
» Processing JPEG-Compressed Images
Sort
View
IPSN
2007
Springer
15 years 3 months ago
Energy-optimized image communication on resource-constrained sensor platforms
Energy-efficient image communication is one of the most important goals for a large class of current and future sensor network applications. This paper presents a quantitative com...
Dong-U Lee, Hyungjin Kim, Steven Tu, Mohammad H. R...
69
Voted
ICIP
2003
IEEE
15 years 11 months ago
Dither-modulation data hiding with distortion-compensation: exact performance analysis and an improved detector for JPEG attacks
The binary Distortion Compensated Dither-Modulation (DCDM), which can be regarded to as a baseline for quantizationbased data-hiding methods, is rigorously analyzed. A novel and a...
Félix Balado, Fernando Pérez-Gonz&aa...
ICMCS
2007
IEEE
163views Multimedia» more  ICMCS 2007»
15 years 4 months ago
Detecting Digital Image Forgeries by Measuring Inconsistencies of Blocking Artifact
Digital images can be forged easily with today’s widely available image processing software. In this paper, we describe a passive approach to detect digital forgeries by checkin...
Shuiming Ye, Qibin Sun, Ee-Chien Chang
59
Voted
ICASSP
2009
IEEE
15 years 4 months ago
Flatbed scanner identification based on dust and scratches over scanner platen
In this paper, a novel individual source scanner identification scheme is proposed. The scheme uses traces of dust, dirt, and scratches over scanner platen on scanned images to c...
Ahmet Emir Dirik, Husrev T. Sencar, Nasir D. Memon
JDCTA
2010
152views more  JDCTA 2010»
14 years 4 months ago
Robust and Geometric Invariant Watermarking Scheme using Block and Gray-Level Histograms
As one of the crucial problems in watermarking, robustness against geometric distortion and JPEG compression becomes more than challenging and problematic. In this paper, a robust...
Chi-Man Pun, Xiaochen Yuan