Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Skip to main content
    • by 
    •   9  
      Computer SciencePattern RecognitionImage WatermarkingPolar Spherical Coordinates
    • by 
    •   4  
      Crime scene analysisInformation HidingColor ImageImage Authentication
    • by 
    •   15  
      EngineeringTechnologySignal ProcessingImage Watermarking
    • by 
    •   4  
      Digital TvImage AuthenticationCopyright ProtectionTrusted Third Party
A discussion of Nicholas Turner's new catalogue raisonné of the Paintings of Guercino (2017), focusing on his idea that Guercino made full-scale "trial versions" of his paintings before making the definitive pictures delivered to clients.
    • by 
    •   11  
      Italian Baroque artTechnical Art History, ConservationConnoisseurshipTechnical Art History
The role of attendance in any organization cannot be over emphasis. Attendance Record System (ARS) is one of the tools used by organizations to track their staff`s daily attendance and performance analysis. ARS helps organizations to... more
    • by 
    •   12  
      Facial RecognitionAuthenticationBiometrics Authentication TechnologiesFacial Expression Recognition using Eigenfaces
    • by 
    •   6  
      Cellular AutomataSingular value decompositionImage AuthenticationVisual Quality
Lead author: Gabi Ivens An increasing number of verified-at- capture tools and other tools for tracing authenticity provenance and edits/manipulations over time are being developed to counter misinformation, disinformation, deepfakes,... more
    • by 
    •   7  
      Human RightsDigital WatermarkingDigital FingerprintingOsint
WAVELET-BASED DIGITAL WATERMARKING FOR IMAGE AUTHENTICATION ... University of British Columbia Department of Electrical and Computer Engineering 2356 Main Mall, Vancouver, BC, V6T 124, Caniada, { alexp, rababw}@ece.ubc.ca
    • by  and +1
    •   18  
      Image ProcessingVisual perceptionData CompressionWatermarking
    • by 
    •   22  
      Cognitive ScienceComputer ScienceImage ProcessingPattern Recognition
    • by 
    •   11  
      WatermarkingLow FrequencyAuthenticationWavelet Transforms
    • by 
    •   8  
      Character RecognitionBack PropagationWord SegmentationComputer Program
    • by 
    •   4  
      Cognitive ScienceSliding WindowImage AuthenticationElectrical And Electronic Engineering
    • by 
    •   4  
      Lossy CompressionImage AuthenticationFrequency Domaindata embedding
In this paper, we have proposed a novel feature-based fragile water-marking scheme for image authentication. The proposed technique extracts Feature Points (FP) by performing the Harris corner detector and used them as germs to decomposes... more
    • by  and +1
    •   8  
      Image ProcessingDigital Image ProcessingVoronoi DiagramsWater Marking
This paper presents an efficient technique for combined fragile and semi-fragile colour image authentication. The authentication signature is extracted from image representation in the automata domain. In the automata domain the... more
    • by 
    •   7  
      Computer ScienceComputer EngineeringImage RepresentationFinite Automata
    • by 
    •   7  
      Digital InvestigationDigital ForensicsImage InterpolationContrast-Enhanced Ultrasound
    • by 
    •   23  
      EngineeringTechnologyImage ProcessingSignal Processing
    • by 
    •   24  
      EngineeringTechnologyImage ProcessingSignal Processing
    • by 
    •   6  
      Information SecurityDigital SignatureCryptographyImage Authentication
Teleradiology applications and universal availability of patient records using web-based technology are rapidly gaining importance. Consequently, digital medical image security has become an important issue when images and their pertinent... more
    • by 
    •   15  
      Computer SecurityDigital imagingDigitalHumans
    • by 
    •   4  
      Image ProcessingData HidingImage AuthenticationMESSAGE AUTHENTICATION CODE(MAC)
With fast advance digital technology image processing is fastest and secure area of research and technology. To hiding a data and repairing with generation of authentication signal are big challenges. To overcome a problem of... more
    • by 
    •   7  
      Digital Data HidingData HidingImage AuthenticationPNG Prehistory
    • by 
    •   12  
      Computational ComplexityData CompressionImage AnalysisSource Coding
The purpose of an image hash is to provide a compact representation of the whole image. Designing a good image hash function requires careful consideration of many issues such as robustness, security and tamper detection with precise... more
    • by 
    •   5  
      CryptographyDiscrete wavelet transformImage AuthenticationDiscrete Cosine Transforms
    • by 
    •   5  
      Digital SignatureFeature ExtractionSystem SecurityImage Authentication
    • by  and +1
    •   7  
      EngineeringTechnologySignal ProcessingData Hiding
Teleradiology applications and universal availability of patient records using web-based technology are rapidly gaining importance. Consequently, digital medical image security has become an important issue when images and their pertinent... more
    • by 
    •   16  
      Computer SecurityDigital imagingDigitalHumans
In this paper, a modified SAFER plus algorithm is presented. Additionally, a comparison with various security algorithms like pipelined AES, Triple DES, Elliptic curve Diffie Hellman and the existing SAFER plus are done. Performance of... more
    • by 
    •   16  
      EncryptionAuthenticationImage EncryptionConfidentiality
Various neural network based image hash functions have been proposed, in related works. However, statistical and security analysis must validate usage of them in military applications. This paper proposes a new neural network based hash... more
    • by 
    •   2  
      Applied CryptographyImage Authentication
    • by 
    •   5  
      WatermarkingUltrasoundDICOMImage Authentication
    • by 
    •   11  
      Mechanical EngineeringDigital Signal ProcessingSingular value decompositionDiscrete Cosine Transform
    • by 
    •   14  
      DesignBiomedical EngineeringCryptographyAuthentication
Abstract—Image forgery detection and its accuracy are addressed in the proposed work. The image authentication process aims at finding the originality of an image. Due to the advent of many image editing software image tampering has... more
    • by 
    •   5  
      Image Forgery DetectionPerceptual HashingImage AuthenticationImage Hashing
    • by 
    •   3  
      WatermarkingDigital WatermarkingImage Authentication
    • by 
    •   6  
      Computer SciencePattern RecognitionParameter estimationSmart Card
    • by 
    •   6  
      Image ProcessingIndependent Component AnalysisInformaticaDiscrete Cosine Transform
    • by 
    •   4  
      Information SystemsLawImage AuthenticationElectrical And Electronic Engineering
Image authentication techniques have recently gained great attention due to its importance for a large number of multimedia applications. Digital images are increasingly transmitted over non-secure channels such as the Internet.... more
    • by 
    •   4  
      Information SecurityCryptographyImage AuthenticationIaeme Ijeet
    • by 
    •   4  
      Image RegistrationSpatial DistributionImage AuthenticationImage Alignment
    • by 
    •   2  
      Multimedia information retrievalImage Authentication
    • by  and +2
    •   10  
      Data CompressionDecompositionImage compressionData Hiding
    • by 
    •   3  
      EngineeringMathematical SciencesImage Authentication
    • by 
    •   5  
      Image ProcessingData HidingImage AuthenticationMESSAGE AUTHENTICATION CODE(MAC)
    • by 
    •   12  
      EngineeringImage ProcessingMultimedia SecurityWatermarking
    • by 
    •   11  
      EngineeringTechnologySignal ProcessingImage Analysis
    • by 
    •   11  
      Cognitive ScienceAlgorithmsComputer GraphicsData Compression
    • by 
    •   11  
      Mechanical EngineeringDigital Signal ProcessingSingular value decompositionDiscrete Cosine Transform
    • by 
    •   2  
      Image Tampering Copy-Move Sift Image ForensicsImage Authentication