[PDF] Top 20 Authentication and recovery of an image by sharing and lattice-embedding
Has 10000 "Authentication and recovery of an image by sharing and lattice-embedding" found on our website. Below are the top 20 most common "Authentication and recovery of an image by sharing and lattice-embedding".
Authentication and recovery of an image by sharing and lattice-embedding
... the recovery data is embedded in DCT co- efficients using lattice embedding to reduce ...The recovery data is dispersed into many blocks by two-layer ...percentage of the ... See full document
14
A Sharing-Based Fragile Watermarking Method for Authentication and Self-Recovery of Image Tampering
... is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly ... See full document
17
Secret image sharing with steganography and authentication
... secret image sharing based on a ðk; nÞ-threshold scheme with the additional capabilities of steganography and authentication is ...secret image is first processed into n shares ... See full document
10
Authentication and cross-recovery for multiple images
... shares, and any r of these shares can recon- struct the secret numerical value, but less than r shares cannot 共r艋n is a prespecified ...unveiling of the secret is impossible unless all r = n shares ... See full document
12
Automatic Image Authentication and Recovery Using Fractal Code Embedding and Image Inpainting
... 2.2. Image Inpainting Image inpainting is a technique which restores the disappeared or damaged region in an ...number of image inpainting methods have been devised based on the ... See full document
9
A data hiding method based on information sharing via PNG images for applications of color image authentication and metadata embedding
... domain and palettes of images for use in data hiding, we try to explore a new embeddable space for data hiding, aiming at providing more data hiding capacity, better quality of the resulting ... See full document
16
Authentication and recovery for wavelet-based semifragile watermarking
... robustness, and allows the method to have spatial and fre- quency localization of digital data by the nature of multi- resolution discrete wavelet ...Kundur and Hatzinakos 11 ... See full document
10
Authenticate an Image under DCT Domain with Attack Recovery
... proposed image authentication and recovery approaches are completely compatible to quantization-based lossy compressions because of using above two ...robust authentication ... See full document
6
A Secret-Sharing-Based Method for Authentication of Grayscale Document Images via the Use of the PNG Image With a Data Repair Capability
... blind authentication method based on the se- cret sharing technique with a data repair capability for grayscale document images via the use of the Portable Network Graphics (PNG) image is ... See full document
12
A Secret-Sharing-Based Method for Authentication of Grayscale Document Images via the Use of the PNG Image with a Data Repair Capability
... blind authentication method based on the secret sharing technique with a data repair capability for gray- scale document images via the use of the PNG image is ...proposed. An ... See full document
11
Secret image sharing with steganography and authentication
... Secret image sharing with steganography and authentication 作者: ...Department of Information Communication 關鍵詞: Secret image ... See full document
1
Progressive sharing of an image
... Review of Secret-Sharing Methods The concept of secret sharing was introduced indepen- dently by Shamir 3 and ...shares, and any r shares can recover the secret numerical ... See full document
14
Copyright Protection and Authentication of Grayscale Images by Removable Visible Watermarking and Invisible Signal Embedding Techniques: A New Approach
... watermarked image so that only the watermarked image need be ...model, and a reversible pixel color adjustment scheme. Unlike a full-color image that has three channels of colors, ... See full document
8
Security protection of software programs by information sharing and authentication techniques using invisible ASCII control codes
... protection by information sharing and authentication techniques using invisible ASCII control codes is ...for sharing a secret source program written in Visual C++ among a group ... See full document
1
An ROI-Based Medical Image Tamper Detection and Recovery Scheme
... detection and recovery scheme for medical images is ...region of interest (ROI). An ROI is an important region for diagnosis in medical images, and it needs to be protected ... See full document
9
INFORMATION SHARING AND AUTHENTICATION TECHNIQUES USING INVISIBLE ASCII CONTROL CODES
... protection by information sharing and authentication techniques using invisible ASCII control codes is ...for sharing a secret source program among a group of participants, each ... See full document
8
An Image Tampers Detection and Recovery Technique using Wavelet Transform and Judgment Table 林鴻志、張世旭
... tampered by others in ...has recovery ability of tampered image with detect information, and hide that information into original image ...in image, more image ... See full document
2
Sharing an Image with Variable-size Shadows
... Department of Computer Science, Taipei Municipal University of Education ...secret image sharing schemes produce shadows with an equal size including the well know Shamir’s and ... See full document
6
Data Hiding and Image Authentication for Color-Palette Images
... 0 and , just leave the two pixels ...relationship of the two chosen pixels is utilized to embed a binary bit of annotation ...1 and are tuned up to become both even or both odd to represent ... See full document
11
Data Hiding and Image Authentication for Color-Palette Images
... 0 and , just leave the two pixels ...relationship of the two chosen pixels is utilized to embed a binary bit of annotation ...1 and are tuned up to become both even or both odd to represent ... See full document
11
相關主題