Most block-based image authentication techniques that are presented in the literature sacrifice localization accuracy in order to resist vector quantization (VQ) counterfeiting att...
Wireless mesh systems offer several advantages for emerging high-bandwidth networks because of their cooperative routing capabilities. In this study, we consider the potential ben...
Ali C. Begen, Yucel Altunbasak, M. Reha Civanlar, ...
The last generation of satellites leads to the very high-resolution images which offer a high quality of detailed information about the Earth's surface. However, the exploita...
A powerful class of attacks in multimedia fingerprinting is known as collusion attacks, where a clique of colluders, each having a copy of the same multimedia content with differe...
Images are often compressed using JPEG or JPEG2000. Many retrieval systems operated in either uncompressed or compressed domains have been proposed. However, retrieving in multipl...