نتایج جستجو برای: image authentication

تعداد نتایج: 408635  

2013
E. G. Rajan Venkat Raman

This Security and authentication are the two important criteria for any industrial product controlled through electronics. Microcontrollers interfacing along with electronic circuits, Controls various aspects of industry equipment. One among them is the communication and transfer of data between the equipment. In certain situations a need arises to secure the data and a proper authentication is...

2014
Mohammed Aamir Ali

This project cum paper we have implemented basically deals with authentication and the various improvements that can be brought about by integrating them with real time scenarios. Our basic aim of it to implement is to develop a secure environment that cannot be breached easily. There are many applications or algorithms that provide authentication at the finest level but we are a step ahead I b...

Journal: :Int. Arab J. Inf. Technol. 2016
Mohamed Hammad Mina Ibrahim Mohiy Hadhoud

This paper represents a complete system for using Electrocardiogram (ECG) images for human authentication. In this study, the proposed algorithm is divided into three main stages: Pre-processing stage, feature extraction stage and classification stage. A real database is used; it consists of 120 ECG images which are collected from 20 persons. The preprocessing stage is done on the ECG image. Pr...

2015
Saraswati B. Sahu

Authentication is the process to provide guaranteed information security and the graphical password authentication method is a convenient and easy process to provide authentication. The major problem of user registration, mostly text base password, is well known. If the login user be inclined to select a simple password which is frequently in his mind it becomes straightforward for attackers to...

1996
Hirotsugu Kinoshita

On conventional digital signature techniques, secret information, which is utilized for authentication, is disclosed to the verifier. In this paper, a new digital signature system for image data is proposed. This system can be used to assert the copyright of image data. In this system, a graph generated from an image which must has a signature and an isomorphic graph is concealed in this image....

2004
Farook Sattar

Absbrrcf-TIIe paper proposes a new fragile image watermarking scheme b a d on time-frequency analysis S p e d i d y , the watermark is ehps an arbitrary non-stationary signal with a particular signature in the time-frequency plane. The proposed technique retains a hi& quality watermarked image since only a few pixels of the original image are used in the watermarking process. Experimental resul...

Journal: :IJCVIP 2012
Siva Charan Muraharirao Manik Lal Das

Digital image authentication is an essential attribute for protecting digital image from piracy and copyright violator. Anti-piracy, digital watermarking, and ownership verification are some mechanisms evolving over the years for achieving digital image authentication. Cryptographic primitives, such as hash function, digital signature, and message authentication codes are being used in several ...

2007
Yao-Chung Lin David Varodayan Bernd Girod

Media authentication is important in content delivery via untrusted intermediaries, such as peer-to-peer (P2P) file sharing. Many differently encoded versions of a media file might exist. Our previous work applied distributed source coding not only to distinguish the legitimate diversity of encoded images from tampering but also localize the tampered regions in an image already deemed to be ina...

2016
M. Raghavi

Authentication is the demonstration of confirming reality of a quality of a datum or substance. For Robust Authentication using a Biometric verification which is considered a subset of biometric authentication. It can be particularly recognized through one or all the more recognizing natural qualities, for example, fingerprints. This paper proposed the concept of Embedding and Extracting the En...

2016
Sundara Krishna V. Srinivasa Rao

Monetary transactions are integral part of our day to day activities, so currency authentication has become one of the active research area at present and it has vast potential applications. In this paper we introduced a system to verify the authentication of banknotes bench mark dataset using computer vision. We considered 1372 samples of various bank notes in our work. The technology of curre...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید