نتایج جستجو برای: image authentication

تعداد نتایج: 408635  

Journal: :journal of ai and data mining 2015
r. davarzani s. mozaffari kh. yaghmaie

feature extraction is a main step in all perceptual image hashing schemes in which robust features will led to better results in perceptual robustness. simplicity, discriminative power, computational efficiency and robustness to illumination changes are counted as distinguished properties of local binary pattern features. in this paper, we investigate the use of local binary patterns for percep...

Kh. Yaghmaie R. Davarzani, S. Mozaffari

Feature extraction is a main step in all perceptual image hashing schemes in which robust features will led to better results in perceptual robustness. Simplicity, discriminative power, computational efficiency and robustness to illumination changes are counted as distinguished properties of Local Binary Pattern features. In this paper, we investigate the use of local binary patterns for percep...

Image watermarking refers to the process of embedding an authentication message, called watermark, into the host image to uniquely identify the ownership. In this paper a novel, intelligent, scalable, robust wavelet-based watermarking approach is proposed. The proposed approach employs a genetic algorithm to find nearly optimal positions to insert watermark. The embedding positions coded as chr...

Journal: :International Journal of Engineering Research and Advanced Technology 2018

Journal: :Advanced Information Systems 2021

Journal: :Signal Processing 2014
Chun-Chi Lo Yu-Chen Hu

Image authentication is to protect the image integrity when the digital image is illegally modified. Most of the image authentication schemes proposed so far employed the irreversible data hiding approach to embed the authentication data into the cover images. In this paper, a novel reversible image authentication scheme for digital images is proposed. In the proposed scheme, the authentication...

Journal: :International Journal of Computer Applications 2012

Journal: :International Journal of Research in Engineering and Technology 2013

Journal: :IEICE Transactions on Information and Systems 2010

Journal: :TIIS 2014
Thai Son Nguyen Chin-Chen Chang Ting-Feng Chung

This paper proposes a novel image authentication scheme, aiming at tampering detection for block truncation coding (BTC) compressed image. The authentication code is generated by using the random number generator with a seed, and the size of the authentication code is based on the user’s requirement, with each BTC-compressed image block being used to carry the authentication code using the data...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید