• 沒有找到結果。

A Watermarking-Based Image Ownership and Tampering Authentication Scheme

N/A
N/A
Protected

Academic year: 2022

Share "A Watermarking-Based Image Ownership and Tampering Authentication Scheme"

Copied!
1
0
0

加載中.... (立即查看全文)

全文

(1)
(2)

題名: A Watermarking-Based Image Ownership and Tampering Authentication Scheme

作者: Chang, C. C.;Hu, Y. S.;Lu, T. C.

關鍵詞: Image authentication;Watermarking;Ownership protection;Tampering detection

日期: 2006-04

上傳時間: 2009-12-17T06:58:22Z 出版者: Asia University

摘要: Nowadays, image authentication schemes are widely applied to

ownership protection and tampering detection of digital images. In this paper, we propose an image ownership and tampering authentication scheme based on watermarking techniques, which is employed to protect the rightful ownership and detect malicious manipulation over embedded images. In the scheme, the authentication data of an image will be inserted into adaptive least significant bits of the embedded pixels. And the number of the least significant bits will be determined according to the type of the corresponding block. The experimental results show that the quality of the embedded image is very high, and the positions of the tampered parts are located correctly.

參考文獻

相關文件

In summary, the main contribution of this paper is to propose a new family of smoothing functions and correct a flaw in an algorithm studied in [13], which is used to guarantee

The study explore the relation between ownership structure, board characteristics and financial distress by Logistic regression analysis.. Overall, this paper

 Local, RADIUS, LDAP authentication presents user with a login page.  On successful authentication the user is redirected to

– Change of ownership principle in recording trade in goods sent abroad for processing – The term Gross National Product (GNP) is... Capitalisation of research and development

In this thesis, we have proposed a new and simple feedforward sampling time offset (STO) estimation scheme for an OFDM-based IEEE 802.11a WLAN that uses an interpolator to recover

In order to detect each individual target in the crowded scenes and analyze the crowd moving trajectories, we propose two methods to detect and track the individual target in

In this thesis, we propose a novel image-based facial expression recognition method called “expression transition” to identify six kinds of facial expressions (anger, fear,

A decision scheme based on OWA operator for an evaluation programme: an approximate reasoning approach. A decision scheme based on OWA operator for an evaluation programme: