• 沒有找到結果。

[PDF] Top 20 Authentication and cross-recovery for multiple images

Has 10000 "Authentication and cross-recovery for multiple images" found on our website. Below are the top 20 most common "Authentication and cross-recovery for multiple images".

Authentication and cross-recovery for multiple images

Authentication and cross-recovery for multiple images

... approaches for recovery of a single image. Wu and Chang 7 proposed an elegant method based on the JPEG compression ...compression, and then embedded the obtained edge characteristic into some ... See full document

12

Authentication and recovery for wavelet-based semifragile watermarking

Authentication and recovery for wavelet-based semifragile watermarking

... robustness, and allows the method to have spatial and fre- quency localization of digital data by the nature of multi- resolution discrete wavelet ...Kundur and Hatzinakos 11 proposed one of the ... See full document

10

3D shape recovery of complex objects from multiple silhouette images

3D shape recovery of complex objects from multiple silhouette images

... fast and requires a relatively low memory space compared to the octree-based reconstruction ...adequate for use in object recognition and pose determination. And it is also suitable for ... See full document

15

A Sharing-Based Fragile Watermarking Method for Authentication and Self-Recovery of Image Tampering

A Sharing-Based Fragile Watermarking Method for Authentication and Self-Recovery of Image Tampering

... distribution, and reproduction in any medium, provided the original work is properly ...digital images across networks has become very popular due to the rapid development of Internet and computer ... See full document

17

Universal share for the sharing of multiple images

Universal share for the sharing of multiple images

... (c) and 2(c)) to attend the recovery meeting for any ...grey images, it can also be applied to color images by processing the three color components one by ... See full document

6

Sharing of multiple images: economically sized and fast-decoding approach based on modulus and Boolean operations

Sharing of multiple images: economically sized and fast-decoding approach based on modulus and Boolean operations

... PSS and VC schemes, Alvarez, Encinas, and del Rey also developed a multisecret sharing scheme 10 for color images with different sizes based on modulus opera- ...secret images by n+1 ... See full document

10

An Optimal Pixel-level Self-repairing Authentication Method for Grayscale Images under a Minimax Criterion of Distortion Reduction*

An Optimal Pixel-level Self-repairing Authentication Method for Grayscale Images under a Minimax Criterion of Distortion Reduction*

... detection, and tampering repairing using image Lena of ...image authentication methods [8-9] in terms of capabilities of self-recovery and tampered-pixel ...detection and tampering ... See full document

34

Data Hiding and Image Authentication for Color-Palette Images

Data Hiding and Image Authentication for Color-Palette Images

... 0 and , just leave the two pixels ...1 and are tuned up to become both even or both odd to represent the fact that a “1” is ...is, for one index to become even and the other to become is ...4 ... See full document

11

Data Hiding and Image Authentication for Color-Palette Images

Data Hiding and Image Authentication for Color-Palette Images

... 0 and , just leave the two pixels ...1 and are tuned up to become both even or both odd to represent the fact that a “1” is ...is, for one index to become even and the other to become is ...4 ... See full document

11

A Watermarking-Based Authentication for Progressive Transmission Images

A Watermarking-Based Authentication for Progressive Transmission Images

... image authentication, the scaled authentication code from quantized coefficients is represented with binary ...binary authentication code is first embedded and then the second MSB bit plane is ... See full document

6

A Novel Image Recovery Algorithm for Visible Watermarked Images

A Novel Image Recovery Algorithm for Visible Watermarked Images

... image recovery algorithm for removing visible water- marks is ...source images from watermarked and reference ...uniform and linear-gra- dient watermarks are ...removed, and that ... See full document

8

Playback dispatch and fault recovery for a clustered video system with multiple servers

Playback dispatch and fault recovery for a clustered video system with multiple servers

... playing multiple videos simultaneously is also dealt with the same ...channels for playing the same video object will be in balancing states with the point of long-term ...workload and ... See full document

18

Automatic Image Authentication and Recovery Using Fractal Code Embedding and Image Inpainting

Automatic Image Authentication and Recovery Using Fractal Code Embedding and Image Inpainting

... pixels, recovery of edges and curvature-driven diffusions ...selected and then color information is propagated inward from the region boundaries, ...only for filling in small damaged ... See full document

9

Authentication and recovery of an image by sharing and lattice-embedding

Authentication and recovery of an image by sharing and lattice-embedding

... the recovery data is embedded in DCT co- efficients using lattice embedding to reduce ...The recovery data is dispersed into many blocks by two-layer ...strategy for finding locations to hide ... See full document

14

A new approach to authentication of binary images for multimedia communication with distortion reduction and security enhancement

A new approach to authentication of binary images for multimedia communication with distortion reduction and security enhancement

... image authentication in multimedia communication with distortion reduction and security enhancement is ...given images and verified to accomplish ... See full document

1

A High-Quality Image Authentication Scheme for AMBTC-compressed Images

A High-Quality Image Authentication Scheme for AMBTC-compressed Images

... image authentication scheme based on absolute moment block truncation ...the authentication code for each compressed image ...not. For image authentication, we embed the ... See full document

16

Sharing Secrets in Stego Images with Authentication

Sharing Secrets in Stego Images with Authentication

... Lin and Tsai and Yang et ...steganography and authentication, which divide a secret image into the shadows and embed the produced shadows in the cover images to form the stego ... See full document

1

Integrity Authentication of Grayscale Document Images Surviving Print-And-Scan Attacks

Integrity Authentication of Grayscale Document Images Surviving Print-And-Scan Attacks

... image and rescan the result to become another digital ...printers and scanners are commonly used for distributions and reproductions of ...format and the printed ...therefore, ... See full document

6

A data hiding method based on information sharing via PNG images for applications of color image authentication and metadata embedding

A data hiding method based on information sharing via PNG images for applications of color image authentication and metadata embedding

... domain and palettes of images for use in data hiding, we try to explore a new embeddable space for data hiding, aiming at providing more data hiding capacity, better quality of the resulting ... See full document

16

Novel Watermarking Authentication Schemes for Binary Images Based on Dual-Pair Block Pixel Patterns

Novel Watermarking Authentication Schemes for Binary Images Based on Dual-Pair Block Pixel Patterns

... Novel Watermarking Authentication Schemes for Binary Images Based on Dual-Pair Block Pixel Patterns.[r] ... See full document

1

Show all 10000 documents...