نتایج جستجو برای: image authentication
تعداد نتایج: 408635 فیلتر نتایج به سال:
This paper proposes a zero-distortion authentication watermarking to produces a watermarked signal. With the same decoder, the watermarked signal has the same quality as the original one. To this end, the scheme replaces the original signal with its equivalence so as to embed authentication message. We employ this concept to authenticate palette images by regulating the palette. Because the vis...
In order to increase the security in storage and transmission, the secret image can be shared and hidden in ordinary cover images to form the stego images. Many image secret sharing schemes with steganography and authentication have been proposed. The qualification of the stego images can be verified. Unfortunately, each of these schemes has one or more drawbacks. First, the size of the stego i...
The Session Initiation Protocol (SIP) is the main protocol behind Voice over IP (VoIP). However, it does not provide authentication, which may lead to possible impersonation and eavesdropping threats. Negotiating keys using digital certificates may help secure the channel, but this method incurs extra maintenance cost. Verbal authentication utilizes the real-time nature of VoIP but it requires ...
In this paper we propose an Image Analysis technique for Vascular Pattern of Hand Palm, which in turn leads towards Palm Vein Authentication of an individual. Near-Infrared Image of Palm Vein pattern is taken and passed through three different processes or algorithms to process the Infrared Image in such a way that the future authentication can be done accurately or almost exactly. These three ...
Designing low cost and high speed authentication solution for digital images is always an attractive area of research in image processing. In past few years because of widespread use of internet and network technology, concept of information distribution has been become habit rather than exception in daily life. In same aspects challenges involved with distribution of authenticate information h...
A perceptual fingerprint hashing method is proposed for audio authentication in this paper. First, the biologic fingerprint image is divided into overlapping rectangle blocks by randomly using a chaotic sequence, and then the gravity center of each block is calculated. Finally, the perceptual Hashing value is generated based on the gravity center of each block. To authenticate the speech identi...
Password authentication is a very important system security procedure to gain access to user resources. In the Traditional password authentication methods a server has check the authenticity of the users. In our proposed method users can freely select their passwords from a predefined character set. They can also use a graphical image as password. The password may be a character or an image it ...
In this paper a novel data embedding technique in frequency domain has been proposed using Discrete Fourier Transform (DFT) for image authentication and secured message transmission based on hiding a large volume of data into gray images. Image authentication is done by embedding message/image in frequency domain by choosing image blocks of size 2 × 2, called mask, from the source image in row ...
An authentication scheme that uses rehashing and secret sharing methods to verify the reality of a color image’s content is proposed in this paper. First, the proposed scheme uses Shamir’s secret sharing method to share image features. Second, the proposed scheme innovatively utilizes the rehashing method to overcome easy collisions of the random numbers to enhance the effectiveness against att...
Authentication using images or graphical passwords is one of the possible alternatives for traditional authentication based upon passwords. This study aims to investigate the practicality of giving guidelines or advice to users before they start choosing their image passwords, the effectiveness of using a smaller tolerance (clickable areas) and the optimum combination of click and image passwor...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید