An image authentication technology based on depth residual network

نویسندگان
چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Image authentication using LBP-based perceptual image hashing

Feature extraction is a main step in all perceptual image hashing schemes in which robust features will led to better results in perceptual robustness. Simplicity, discriminative power, computational efficiency and robustness to illumination changes are counted as distinguished properties of Local Binary Pattern features. In this paper, we investigate the use of local binary patterns for percep...

متن کامل

Depth Estimation from Single Image Using CNN-Residual Network

In this project, we tackle the problem of depth estimation from single image. The mapping between a single image and the depth map is inherently ambiguous, and requires both global and local information. We employ a fully convolutional architecture, which first extracts image feature by pretrained ResNet-50 network. We do transfer learning by replacing the fully connected layer of ResNet-50 wit...

متن کامل

Persian sign language detection based on normalized depth image information

There are many reports of using the Kinect to detect hand and finger gestures after release of device by Microsoft. The depth information is mostly used to separate the hand image in the two-dimension of RGB domain. This paper proposes a method in which the depth information plays a more dominant role. Using a threshold in depth space first the hand template is extracted. Then in 3D domain the ...

متن کامل

An Image Authentication Scheme Based on Correlation

This paper proposes a watermarking algorithm based on correlation to authenticate image content. The original image is converted to YIQ space first, then subdivided into 8× 8 non-overlapping blocks. DCT transform is executed on each block. The watermark sequence is derived from certain low frequency coefficients. It is hided into the middle frequency DCT coefficients of another pseudo-randomly ...

متن کامل

Image Content Authentication based on

Reversible image authentication has drawn a great attention for its ability to recover the original image from the watermarked image. The primary concern of authentication is to prevent from unauthorized manipulation of the image and hence has attained good importance. This paper proposes a block based reversible watermarking scheme for image authentication based on histogram modification of th...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Systems Science & Control Engineering

سال: 2018

ISSN: 2164-2583

DOI: 10.1080/21642583.2018.1446056