Articles with "image authentication" as a keyword



Photo from wikipedia

Two-Phase Method for Image Authentication and Enhanced Decoding

Sign Up to like & get
recommendations!
Published in 2017 at "IEEE Access"

DOI: 10.1109/access.2017.2719632

Abstract: A two-phase method for image authentication using side information from the communication channel, followed by improved error correction using reliable data, is presented. The functionality of the proposed method is divided into two phases. In… read more here.

Keywords: image authentication; phase; image; two phase ... See more keywords
Photo by markusspiske from unsplash

An Improved Algorithm for Digital Image Authentication and Forgery Localization Using Demosaicing Artifacts

Sign Up to like & get
recommendations!
Published in 2019 at "IEEE Access"

DOI: 10.1109/access.2019.2938467

Abstract: This paper focuses on the digital image authentication and forgery localization using demosaicing artifacts. The aim is to build an algorithm allowing a bridge between the color filter array pattern and demosaicing algorithm estimation, and… read more here.

Keywords: authentication; digital image; authentication forgery; image authentication ... See more keywords
Photo from wikipedia

Reversible Image Authentication Scheme Based on PEE

Sign Up to like & get
recommendations!
Published in 2021 at "Indonesian Journal of Electrical Engineering and Computer Science"

DOI: 10.11591/ijeecs.v21.i1.pp%p

Abstract: Reversible image authentication scheme is a technique that detects tampered areas in images and allows them to be reconstructed to their original version without any distortion. In this paper, we propose a new, reversible, image… read more here.

Keywords: image authentication; image; authentication scheme; reversible image ... See more keywords
Photo from wikipedia

Quantization-based image authentication scheme using QR error correction

Sign Up to like & get
recommendations!
Published in 2017 at "EURASIP Journal on Image and Video Processing"

DOI: 10.1186/s13640-017-0163-8

Abstract: Image authentication, which is provided with capabilities of tamper detection and data recovery, is an efficient way to protect the contents of digital images. Vector quantization (VQ) is a data compression method. A VQ-compressed code… read more here.

Keywords: image authentication; image; scheme; quantization based ... See more keywords