• 沒有找到結果。

[PDF] Top 20 Authentication and recovery of an image by sharing and lattice-embedding

Has 10000 "Authentication and recovery of an image by sharing and lattice-embedding" found on our website. Below are the top 20 most common "Authentication and recovery of an image by sharing and lattice-embedding".

Authentication and recovery of an image by sharing and lattice-embedding

Authentication and recovery of an image by sharing and lattice-embedding

... the recovery data is embedded in DCT co- efficients using lattice embedding to reduce ...The recovery data is dispersed into many blocks by two-layer ...percentage of the ... See full document

14

A Sharing-Based Fragile Watermarking Method for Authentication and Self-Recovery of Image Tampering

A Sharing-Based Fragile Watermarking Method for Authentication and Self-Recovery of Image Tampering

... is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly ... See full document

17

Secret image sharing with steganography and authentication

Secret image sharing with steganography and authentication

... secret image sharing based on a ðk; nÞ-threshold scheme with the additional capabilities of steganography and authentication is ...secret image is first processed into n shares ... See full document

10

Authentication and cross-recovery for multiple images

Authentication and cross-recovery for multiple images

... shares, and any r of these shares can recon- struct the secret numerical value, but less than r shares cannot 共r艋n is a prespecified ...unveiling of the secret is impossible unless all r = n shares ... See full document

12

Automatic Image Authentication and Recovery Using Fractal Code Embedding and Image Inpainting

Automatic Image Authentication and Recovery Using Fractal Code Embedding and Image Inpainting

... 2.2. Image Inpainting Image inpainting is a technique which restores the disappeared or damaged region in an ...number of image inpainting methods have been devised based on the ... See full document

9

A data hiding method based on information sharing via PNG images for applications of color image authentication and metadata embedding

A data hiding method based on information sharing via PNG images for applications of color image authentication and metadata embedding

... domain and palettes of images for use in data hiding, we try to explore a new embeddable space for data hiding, aiming at providing more data hiding capacity, better quality of the resulting ... See full document

16

Authentication and recovery for wavelet-based semifragile watermarking

Authentication and recovery for wavelet-based semifragile watermarking

... robustness, and allows the method to have spatial and fre- quency localization of digital data by the nature of multi- resolution discrete wavelet ...Kundur and Hatzinakos 11 ... See full document

10

Authenticate an Image under DCT Domain with Attack Recovery

Authenticate an Image under DCT Domain with Attack Recovery

... proposed image authentication and recovery approaches are completely compatible to quantization-based lossy compressions because of using above two ...robust authentication ... See full document

6

A Secret-Sharing-Based Method for Authentication of Grayscale Document Images via the Use of the PNG Image With a Data Repair Capability

A Secret-Sharing-Based Method for Authentication of Grayscale Document Images via the Use of the PNG Image With a Data Repair Capability

... blind authentication method based on the se- cret sharing technique with a data repair capability for grayscale document images via the use of the Portable Network Graphics (PNG) image is ... See full document

12

A Secret-Sharing-Based Method for Authentication of Grayscale Document Images via the Use of the PNG Image with a Data Repair Capability

A Secret-Sharing-Based Method for Authentication of Grayscale Document Images via the Use of the PNG Image with a Data Repair Capability

... blind authentication method based on the secret sharing technique with a data repair capability for gray- scale document images via the use of the PNG image is ...proposed. An ... See full document

11

Secret image sharing with steganography and authentication

Secret image sharing with steganography and authentication

... Secret image sharing with steganography and authentication 作者: ...Department of Information Communication 關鍵詞: Secret image ... See full document

1

Progressive sharing of an image

Progressive sharing of an image

... Review of Secret-Sharing Methods The concept of secret sharing was introduced indepen- dently by Shamir 3 and ...shares, and any r shares can recover the secret numerical ... See full document

14

Copyright Protection and Authentication of Grayscale Images by Removable Visible Watermarking and Invisible Signal Embedding Techniques: A New Approach

Copyright Protection and Authentication of Grayscale Images by Removable Visible Watermarking and Invisible Signal Embedding Techniques: A New Approach

... watermarked image so that only the watermarked image need be ...model, and a reversible pixel color adjustment scheme. Unlike a full-color image that has three channels of colors, ... See full document

8

Security protection of software programs by information sharing and authentication techniques using invisible ASCII control codes

Security protection of software programs by information sharing and authentication techniques using invisible ASCII control codes

... protection by information sharing and authentication techniques using invisible ASCII control codes is ...for sharing a secret source program written in Visual C++ among a group ... See full document

1

An ROI-Based Medical Image Tamper Detection and Recovery Scheme

An ROI-Based Medical Image Tamper Detection and Recovery Scheme

... detection and recovery scheme for medical images is ...region of interest (ROI). An ROI is an important region for diagnosis in medical images, and it needs to be protected ... See full document

9

INFORMATION SHARING AND AUTHENTICATION TECHNIQUES USING  INVISIBLE ASCII CONTROL CODES

INFORMATION SHARING AND AUTHENTICATION TECHNIQUES USING INVISIBLE ASCII CONTROL CODES

... protection by information sharing and authentication techniques using invisible ASCII control codes is ...for sharing a secret source program among a group of participants, each ... See full document

8

An Image Tampers Detection and Recovery Technique using Wavelet Transform and Judgment Table 林鴻志、張世旭

An Image Tampers Detection and Recovery Technique using Wavelet Transform and Judgment Table 林鴻志、張世旭

... tampered by others in ...has recovery ability of tampered image with detect information, and hide that information into original image ...in image, more image ... See full document

2

Sharing an Image with Variable-size Shadows

Sharing an Image with Variable-size Shadows

... Department of Computer Science, Taipei Municipal University of Education ...secret image sharing schemes produce shadows with an equal size including the well know Shamir’s and ... See full document

6

Data Hiding and Image Authentication for Color-Palette Images

Data Hiding and Image Authentication for Color-Palette Images

... 0 and , just leave the two pixels ...relationship of the two chosen pixels is utilized to embed a binary bit of annotation ...1 and are tuned up to become both even or both odd to represent ... See full document

11

Data Hiding and Image Authentication for Color-Palette Images

Data Hiding and Image Authentication for Color-Palette Images

... 0 and , just leave the two pixels ...relationship of the two chosen pixels is utilized to embed a binary bit of annotation ...1 and are tuned up to become both even or both odd to represent ... See full document

11

Show all 10000 documents...