Sign Up to like & get
recommendations!
0
Published in 2017 at "IEEE Access"
DOI: 10.1109/access.2017.2719632
Abstract: A two-phase method for image authentication using side information from the communication channel, followed by improved error correction using reliable data, is presented. The functionality of the proposed method is divided into two phases. In…
read more here.
Keywords:
image authentication;
phase;
image;
two phase ... See more keywords
Sign Up to like & get
recommendations!
0
Published in 2019 at "IEEE Access"
DOI: 10.1109/access.2019.2938467
Abstract: This paper focuses on the digital image authentication and forgery localization using demosaicing artifacts. The aim is to build an algorithm allowing a bridge between the color filter array pattern and demosaicing algorithm estimation, and…
read more here.
Keywords:
authentication;
digital image;
authentication forgery;
image authentication ... See more keywords
Sign Up to like & get
recommendations!
1
Published in 2021 at "Indonesian Journal of Electrical Engineering and Computer Science"
DOI: 10.11591/ijeecs.v21.i1.pp%p
Abstract: Reversible image authentication scheme is a technique that detects tampered areas in images and allows them to be reconstructed to their original version without any distortion. In this paper, we propose a new, reversible, image…
read more here.
Keywords:
image authentication;
image;
authentication scheme;
reversible image ... See more keywords
Sign Up to like & get
recommendations!
0
Published in 2017 at "EURASIP Journal on Image and Video Processing"
DOI: 10.1186/s13640-017-0163-8
Abstract: Image authentication, which is provided with capabilities of tamper detection and data recovery, is an efficient way to protect the contents of digital images. Vector quantization (VQ) is a data compression method. A VQ-compressed code…
read more here.
Keywords:
image authentication;
image;
scheme;
quantization based ... See more keywords