Image Authentication
26 Followers
Recent papers in Image Authentication
A discussion of Nicholas Turner's new catalogue raisonné of the Paintings of Guercino (2017), focusing on his idea that Guercino made full-scale "trial versions" of his paintings before making the definitive pictures delivered to clients.
The role of attendance in any organization cannot be over emphasis. Attendance Record System (ARS) is one of the tools used by organizations to track their staff`s daily attendance and performance analysis. ARS helps organizations to... more
Lead author: Gabi Ivens An increasing number of verified-at- capture tools and other tools for tracing authenticity provenance and edits/manipulations over time are being developed to counter misinformation, disinformation, deepfakes,... more
This paper presents an efficient technique for combined fragile and semi-fragile colour image authentication. The authentication signature is extracted from image representation in the automata domain. In the automata domain the... more
Teleradiology applications and universal availability of patient records using web-based technology are rapidly gaining importance. Consequently, digital medical image security has become an important issue when images and their pertinent... more
With fast advance digital technology image processing is fastest and secure area of research and technology. To hiding a data and repairing with generation of authentication signal are big challenges. To overcome a problem of... more
The purpose of an image hash is to provide a compact representation of the whole image. Designing a good image hash function requires careful consideration of many issues such as robustness, security and tamper detection with precise... more
Teleradiology applications and universal availability of patient records using web-based technology are rapidly gaining importance. Consequently, digital medical image security has become an important issue when images and their pertinent... more
In this paper, a modified SAFER plus algorithm is presented. Additionally, a comparison with various security algorithms like pipelined AES, Triple DES, Elliptic curve Diffie Hellman and the existing SAFER plus are done. Performance of... more
Various neural network based image hash functions have been proposed, in related works. However, statistical and security analysis must validate usage of them in military applications. This paper proposes a new neural network based hash... more
Abstract—Image forgery detection and its accuracy are addressed in the proposed work. The image authentication process aims at finding the originality of an image. Due to the advent of many image editing software image tampering has... more
Image authentication techniques have recently gained great attention due to its importance for a large number of multimedia applications. Digital images are increasingly transmitted over non-secure channels such as the Internet.... more