نتایج جستجو برای: image authentication
تعداد نتایج: 408635 فیلتر نتایج به سال:
ii tampering detection is enabled in the authentication process by presetting the noise filter size. Second, we study the unique characteristics of synthetic images and develop a novel watermarking scheme for synthetic image authentication. The proposed watermarking algorithm is fully compatible with the characteristics of synthetic images. With less pixels modified, the authentication system c...
Biometric authentication is an effective method for automatically recognizing a person’s identity. In our previous paper, we have considered palm print for human authentication. Recently, it has been found that the Finger Knuckle Print (FKP), which refers to the inherent skin patterns of the outer surface around the phalangeal joint of one’s finger, has high capability to discriminate different...
Face authentication for access control is a face membership authentication which passes the person of the incoming face if he turns out to be one of an enrolled person based on face recognition or rejects if not. Face membership authentication belongs to the two class classification problem where SVM(Support Vector Machine) has been successfully applied and shows better performance compared to ...
Graphical password authentication is a method that uses passwords in the form of images or symbols. There can be various implementations based on its usage. Digitization and automation across all industries have resulted improvements efficiencies effectiveness systems processes, tech sector not immune to attacks through hackers. Password offers systematic secure alternative old text-based desig...
Aim of this project is to implement a novel authentication scheme to establish Digital Rights Management (DRM) based on multimodal biometric verification and watermarking technique. Security of biometric system is a major concern. An attack on a biometric system can result in loss of privacy, monetary damage and security breach. Biometric system offer better security then existing approaches. T...
There is a great adventure of watermarking usage in the context of conventional authentication since it does not require additional storage space for supplementary metadata. However JPEG compression, being a conventional method to compress images, leads to exact authentication breaking. We discuss a semi-fragile watermarking system for digital images tolerant to JPEG/JPEG2000 compression. Recen...
Image authentication is important in content delivery via untrusted intermediaries, such as peer-to-peer (P2P) file sharing. Many differently encoded versions of the original image might exist. In addition, intermediaries might tamper with the contents. Distinguishing legitimate diversity from malicious manipulations is the challenge addressed in this dissertation. We propose an approach using ...
Authentication is possible in several ways namely textual, graphical, bio-metric, 3D password and third party authentication. In this paper, the authentication system is presented by introducing the multi-level authentication technique which generates the password in multiple levels to access the services. The details of proposed multilevel authentication techniques are presented along with dat...
Recently, a category of watermarking techniques based on binary phase-only filter (BPOF) has been proposed for image authentica-tion. In such techniques, the authentication is implemented by evaluating the correlation between Fourier phase information and the hidden watermark bitplane. In this paper, we reveal the security flaws of BPOF-based watermarking algorithms and propose sophisticated ta...
Digital watermarking is a method which is used to verify texts, image, video etc. Watermarking Technique is not only used for Authentication, it’s also used for security, image protection, rights of documents. In this perspective experiment we used edge detection technique in watermarking for the purpose of highly authentication of image. Here we used combined approach of LSB-DCT watermarking f...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید