• 沒有找到結果。

[PDF] Top 20 Authentication and recovery for wavelet-based semifragile watermarking

Has 10000 "Authentication and recovery for wavelet-based semifragile watermarking" found on our website. Below are the top 20 most common "Authentication and recovery for wavelet-based semifragile watermarking".

Authentication and recovery for wavelet-based semifragile watermarking

Authentication and recovery for wavelet-based semifragile watermarking

... need for tamper recovery tech- niques, since there are not many references in this ...The recovery information can be embedded in either the trans- form domain or spatial ...domain. For ... See full document

10

A Sharing-Based Fragile Watermarking Method for Authentication and Self-Recovery of Image Tampering

A Sharing-Based Fragile Watermarking Method for Authentication and Self-Recovery of Image Tampering

... and recovery data from the extracted watermark, according to the locations corresponding to the obtained ...The authentication data “extracted” this way using the t LSBs of the query block’s pixels ... See full document

17

Authentication and cross-recovery for multiple images

Authentication and cross-recovery for multiple images

... approaches for recovery of a single image. Wu and Chang 7 proposed an elegant method based on the JPEG compression ...compression, and then embedded the obtained edge characteristic ... See full document

12

Automatic Image Authentication and Recovery Using Fractal Code Embedding and Image Inpainting

Automatic Image Authentication and Recovery Using Fractal Code Embedding and Image Inpainting

... image authentication and recovery, in which the altered region of the image can be detected and recovered in a fully automatic ...Fragile watermarking is used for image ... See full document

9

Authentication and recovery of an image by sharing and lattice-embedding

Authentication and recovery of an image by sharing and lattice-embedding

... Abstract. Based on sharing and lattice-embedding techniques, we present an authentication-recovery method for an ...noise, and brightness adjustment, up to a tolerance level ... See full document

14

Secure Semi-Fragile Watermarking for Image Authentication Based on Parameterized Integer Wavelet

Secure Semi-Fragile Watermarking for Image Authentication Based on Parameterized Integer Wavelet

... image authentication has drawn extensive attention for integrity ...verification. For instance, watermarking fragile to malicious modifications while robust to data compression has been ... See full document

10

Wavelet tree based digital image watermarking by adopting the chaotic system for security enhancement

Wavelet tree based digital image watermarking by adopting the chaotic system for security enhancement

... encryption and decryption functions have a more continuous ...needed for unauthorized ...the recovery of an original message M from an encrypted message M E : the (symmetric) encryption method E is ... See full document

21

Wavelet tree quantization for copyright protection watermarking

Wavelet tree quantization for copyright protection watermarking

... ETHOD AND THE M ETHOD OF [19] ...a wavelet-based watermarking technique by quantizing the so-called super ...bands and the information of the watermark bit is spread throughout large ... See full document

12

Watermarking approach to embedded signature-based authentication by channel statistics

Watermarking approach to embedded signature-based authentication by channel statistics

... quantization- based method developed by Kundur and Hatzinakos 11 : the host image is transformed using a wavelet transform, and the watermark is embedded bit by bit in the randomly cho- sen ... See full document

9

A Watermarking-Based Authentication for Progressive Transmission Images

A Watermarking-Based Authentication for Progressive Transmission Images

... image authentication, the scaled authentication code from quantized coefficients is represented with binary ...binary authentication code is first embedded and then the second MSB bit plane is ... See full document

6

A Watermarking-Based Image Ownership and Tampering Authentication Scheme

A Watermarking-Based Image Ownership and Tampering Authentication Scheme

... In this paper, we propose an image ownership and tampering authentication scheme based on watermarking techniques, which is employed to protect the rightful ownership and detect malic[r] ... See full document

1

BLIND WATERMARKING BASED ON WAVELET SINGULARITY DETECTION

BLIND WATERMARKING BASED ON WAVELET SINGULARITY DETECTION

... blind watermarking method for copyright ...significant wavelet singularities for lossless and robust ...forward and backward pair checksum generated from the embedded ... See full document

2

A Robust Wavelet-Based Watermarking Using Quantization and Human Visual System

A Robust Wavelet-Based Watermarking Using Quantization and Human Visual System

... blind watermarking scheme based on Discrete Wavelet Transform (DWT) is ...robust and transparent watermarking scheme, we use ... See full document

1

Reversible Watermarking for Relational Database Authentication

Reversible Watermarking for Relational Database Authentication

... distortions and data’s integrity needs to be ...reversible watermarking technique for lossless authentication of relational ...variables and gains embedding capacity from reversible ... See full document

8

Constrained wavelet tree quantization for image watermarking

Constrained wavelet tree quantization for image watermarking

... the wavelet tree based quantization and proposes a constrained wavelet tree quantization for image ...The wavelet coefficients of the cover image are grouped into super trees ... See full document

5

Novel Watermarking Authentication Schemes for Binary Images Based on Dual-Pair Block Pixel Patterns

Novel Watermarking Authentication Schemes for Binary Images Based on Dual-Pair Block Pixel Patterns

... Novel Watermarking Authentication Schemes for Binary Images Based on Dual-Pair Block Pixel Patterns.[r] ... See full document

1

A Lossless Watermarking Scheme for Halftone Image Authentication

A Lossless Watermarking Scheme for Halftone Image Authentication

... outputs, and fax documents. It is desirable to embed data in halftone images for copyright protection and content ...novel watermarking scheme for halftone image authentication, ... See full document

2

Adaptive Wavelet Quantization Index Modulation Technique for Audio Watermarking

Adaptive Wavelet Quantization Index Modulation Technique for Audio Watermarking

... in watermarking can provide a tradeoff between robustness and ...audio watermarking technique which adopts the wavelet QIM method with adaptive step sizes for blind watermark ...Since ... See full document

5

H.264 VIDEO AUTHENTICATION BASED ON SEMI-FRAGILE WATERMARKING

H.264 VIDEO AUTHENTICATION BASED ON SEMI-FRAGILE WATERMARKING

... video watermarking, that prevented the data to be illegally used, has attracted a great deal of research interest in the past few ...developed for this ...watermark authentication code, which ... See full document

1

Hardware-efficient architecture design of wavelet-based adaptive visible watermarking

Hardware-efficient architecture design of wavelet-based adaptive visible watermarking

... based visible watermarking to solve this problem. Wavelet- based visible watermarking is applied to JPEG-2000 image and many consumer electronics product. These technique[r] ... See full document

5

Show all 10000 documents...