Sciweavers

10661 search results - page 5 / 2133
» Processing JPEG-Compressed Images
Sort
View
70
Voted
ICIP
2001
IEEE
15 years 11 months ago
On the security of the SARI image authentication system
In this paper we investigate the image authentication system SARI, proposed by C.Y. Lin and S.F. Chang [1], that distinguishes JPEG compression from malicious manipulations. In pa...
Regunathan Radhakrishnan, Nasir D. Memon
ICASSP
2011
IEEE
14 years 1 months ago
Detection and removal of binocular luster in compressed 3D images
Binocular luster is an extremely salient effect seen in 3D when an object in each stereo image exhibits a different contrast polarity relative to the background. The object appear...
Can Bal, Ankit K. Jain, Truong Q. Nguyen
IVC
2000
142views more  IVC 2000»
14 years 9 months ago
Recognition of JPEG compressed face images based on statistical methods
Stefan Eickeler, Stefan Müller, Gerhard Rigol...
82
Voted
ICIP
2005
IEEE
15 years 11 months ago
Game-theoretic analysis of a semi-fragile watermarking scheme based on SCS
Semi-fragile watermarking can be used to detect illegal and local manipulation of images, while being robust towards legal manipulations such as lossy compression. This paper desc...
Jean-Philippe Boyer, Pierre Duhamel, Jacques Blanc...
ICIP
2001
IEEE
15 years 11 months ago
Compression color space estimation of JPEG images using lattice basis reduction
Given a color image that was quantized in some hidden color space (termed compression color space) during previous JPEG compression, we aim to estimate this unknown compression co...
Ramesh Neelamani, Ricardo L. de Queiroz, Richard G...