نتایج جستجو برای: image authentication

تعداد نتایج: 408635  

2008
Huajian Liu

ii tampering detection is enabled in the authentication process by presetting the noise filter size. Second, we study the unique characteristics of synthetic images and develop a novel watermarking scheme for synthetic image authentication. The proposed watermarking algorithm is fully compatible with the characteristics of synthetic images. With less pixels modified, the authentication system c...

Journal: :Int. Arab J. Inf. Technol. 2015
Esther Perumal Shanmugalakshmi Ramachandran

Biometric authentication is an effective method for automatically recognizing a person’s identity. In our previous paper, we have considered palm print for human authentication. Recently, it has been found that the Finger Knuckle Print (FKP), which refers to the inherent skin patterns of the outer surface around the phalangeal joint of one’s finger, has high capability to discriminate different...

2009
Seongwon Cho

Face authentication for access control is a face membership authentication which passes the person of the incoming face if he turns out to be one of an enrolled person based on face recognition or rejects if not. Face membership authentication belongs to the two class classification problem where SVM(Support Vector Machine) has been successfully applied and shows better performance compared to ...

Journal: :Indian Scientific Journal Of Research In Engineering And Management 2023

Graphical password authentication is a method that uses passwords in the form of images or symbols. There can be various implementations based on its usage. Digitization and automation across all industries have resulted improvements efficiencies effectiveness systems processes, tech sector not immune to attacks through hackers. Password offers systematic secure alternative old text-based desig...

2011
Sherin Edward

Aim of this project is to implement a novel authentication scheme to establish Digital Rights Management (DRM) based on multimodal biometric verification and watermarking technique. Security of biometric system is a major concern. An attack on a biometric system can result in loss of privacy, monetary damage and security breach. Biometric system offer better security then existing approaches. T...

Journal: :CoRR 2016
Aleksey Zhuvikin Valery I. Korzhik Guillermo Morales-Luna

There is a great adventure of watermarking usage in the context of conventional authentication since it does not require additional storage space for supplementary metadata. However JPEG compression, being a conventional method to compress images, leads to exact authentication breaking. We discuss a semi-fragile watermarking system for digital images tolerant to JPEG/JPEG2000 compression. Recen...

2011
Yao-Chung Lin Robert M. Gray

Image authentication is important in content delivery via untrusted intermediaries, such as peer-to-peer (P2P) file sharing. Many differently encoded versions of the original image might exist. In addition, intermediaries might tamper with the contents. Distinguishing legitimate diversity from malicious manipulations is the challenge addressed in this dissertation. We propose an approach using ...

2014
S. YAMINI

Authentication is possible in several ways namely textual, graphical, bio-metric, 3D password and third party authentication. In this paper, the authentication system is presented by introducing the multi-level authentication technique which generates the password in multiple levels to access the services. The details of proposed multilevel authentication techniques are presented along with dat...

2011
Gang Cao Yao Zhao Rongrong Ni

Recently, a category of watermarking techniques based on binary phase-only filter (BPOF) has been proposed for image authentica-tion. In such techniques, the authentication is implemented by evaluating the correlation between Fourier phase information and the hidden watermark bitplane. In this paper, we reveal the security flaws of BPOF-based watermarking algorithms and propose sophisticated ta...

2013
Ranjeet Kumar Singh Deepak Gupta Santosh Kumar Singh

Digital watermarking is a method which is used to verify texts, image, video etc. Watermarking Technique is not only used for Authentication, it’s also used for security, image protection, rights of documents. In this perspective experiment we used edge detection technique in watermarking for the purpose of highly authentication of image. Here we used combined approach of LSB-DCT watermarking f...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید