An image authentication technology based on depth residual network
نویسندگان
چکیده
منابع مشابه
Image authentication using LBP-based perceptual image hashing
Feature extraction is a main step in all perceptual image hashing schemes in which robust features will led to better results in perceptual robustness. Simplicity, discriminative power, computational efficiency and robustness to illumination changes are counted as distinguished properties of Local Binary Pattern features. In this paper, we investigate the use of local binary patterns for percep...
متن کاملDepth Estimation from Single Image Using CNN-Residual Network
In this project, we tackle the problem of depth estimation from single image. The mapping between a single image and the depth map is inherently ambiguous, and requires both global and local information. We employ a fully convolutional architecture, which first extracts image feature by pretrained ResNet-50 network. We do transfer learning by replacing the fully connected layer of ResNet-50 wit...
متن کاملPersian sign language detection based on normalized depth image information
There are many reports of using the Kinect to detect hand and finger gestures after release of device by Microsoft. The depth information is mostly used to separate the hand image in the two-dimension of RGB domain. This paper proposes a method in which the depth information plays a more dominant role. Using a threshold in depth space first the hand template is extracted. Then in 3D domain the ...
متن کاملAn Image Authentication Scheme Based on Correlation
This paper proposes a watermarking algorithm based on correlation to authenticate image content. The original image is converted to YIQ space first, then subdivided into 8× 8 non-overlapping blocks. DCT transform is executed on each block. The watermark sequence is derived from certain low frequency coefficients. It is hided into the middle frequency DCT coefficients of another pseudo-randomly ...
متن کاملImage Content Authentication based on
Reversible image authentication has drawn a great attention for its ability to recover the original image from the watermarked image. The primary concern of authentication is to prevent from unauthorized manipulation of the image and hence has attained good importance. This paper proposes a block based reversible watermarking scheme for image authentication based on histogram modification of th...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Systems Science & Control Engineering
سال: 2018
ISSN: 2164-2583
DOI: 10.1080/21642583.2018.1446056