Filters








3,437 Hits in 8.5 sec

Error Resilient Image Authentication Using Feature Statistical and Spatial Properties [chapter]

Shuiming Ye, Qibin Sun, Ee-Chien Chang
2006 Lecture Notes in Computer Science  
This proposed error resilient scheme is based on a statistics-and spatiality-based measure (SSM) of feature differences.  ...  Commonly employed distance measures such as the Minkowski measures may not be adequate for content-based image authentication since they do not exploit statistical and spatial properties of the feature  ...  statistical and spatial properties of feature differences.  ... 
doi:10.1007/11922841_37 fatcat:iuh3vr6tjfgz5oinbptp2hucfe

Photonic Pseudo-Random Number Generator for Internet-of-Things Authentication using a Waveguide based Physical Unclonable Function [article]

Charis Mesaritakis, Panagiotis Rizomiliotis, Marialena Akriotou, Charidimos Chaintoutis, Alexandros Fragkos, Dimitris Syvridis
2020 arXiv   pre-print
Finally, based on the demonstrated key features, we present and analyze a mutual authentication implementation scenario which is fully compatible with state-of-the-art commercial Internet-Of-Things architectures  ...  The elevated physical unclonability of our implementation is combined with spatial light modulation and post processing techniques, thus allowing the deterministic generation of an exponentially large  ...  The interaction of the phase and amplitude component of scattered photons at an imaging plane away from the PUF's volume, allows the generation of spatially complex images (speckle), whose features are  ... 
arXiv:2001.11794v1 fatcat:pceyf5ui55ay5egupys5fbiyou

A Hybrid Scheme for Authenticating Scalable Video Codestreams

Zhuo Wei, Yongdong Wu, Robert H. Deng, Xuhua Ding
2014 IEEE Transactions on Information Forensics and Security  
The HAU employs both cryptographic authentication and content-based authentication techniques to ensure integrity and authenticity of the SVC codestreams.  ...  of images in order to supplement the base layer in resolution, quality, and temporal scalabilities.  ...  [10] proposed a packet loss-resilience authentication scheme for H.264/SVC using hash chain and error-correction code.  ... 
doi:10.1109/tifs.2014.2301916 fatcat:24qbvqqoyffkjgc5mkau54a4me

Detection of image alterations using semifragile watermarks

Eugene T. Lin, Christine I. Podilchuk, Edward J. Delp III, Ping W. Wong, Edward J. Delp III
2000 Security and Watermarking of Multimedia Contents II  
Fragile watermarks are used for authentication purposes and are capable of detecting even minute changes of the watermarked content.  ...  altering" transformations (such as feature replacement) which change the expression of the content.  ...  Unfortunately, the very same properties that make a digital media element attractive for use and distribution also facilitate unauthorized use, misappropriation, and misrepresentation.  ... 
doi:10.1117/12.384969 dblp:conf/sswmc/LinPD00 fatcat:cyvjk64vwbd77pff65axqdsa6i

Challenge Responsive Multi Modal Biometric Authentication Resilient to Presentation Attacks

2022 International Journal of Intelligent Engineering and Systems  
This work proposes a challenge response based multi modal biometric authentication resilient to presentation attack.  ...  Multimodal biometric systems are a natural evolution of traditional biometric authentication systems with use of multiple biometric to enhance the security level.  ...  Zheng et al [8] combined depth and multi scale features to detect face spoofing. Higher level feature representation of depth and multi scale is learnt using a two steam spatial temporal network.  ... 
doi:10.22266/ijies2022.0430.44 fatcat:k3eexuq3ifg47ebs46r3nhstfq

Distributed Video Coding: Trends and Perspectives

Frederic Dufaux, Wen Gao, Stefano Tubaro, Anthony Vetro
2009 EURASIP Journal on Image and Video Processing  
More specifically, the status and potential benefits of distributed video coding in terms of coding efficiency, complexity, error resilience, and scalability are reviewed.  ...  Multiview video and applications beyond coding are also considered.  ...  This method provides a Slepian-Wolf encoded quantized image projection as an authentication data which can be successfully decoded only by using an authentic image as side information.  ... 
doi:10.1155/2009/508167 fatcat:wf4ui6mwlrcqjm2tor6h4h6aj4

Spread Spectrum based Robust Image Watermark Authentication [article]

T. S. Das, V. H. Mankar, S. K. Sarkar
2012 arXiv   pre-print
The transform domain blind watermarking technique offers better visual & statistical imperceptibility and resiliency against different types of intentional & unintentional image degradations.  ...  Experimental studies confirm that the scheme is robust in terms of confidentiality, authentication, non-repudiation and integrity.  ...  Subir Kumar Sarkar acknowledges the financial assistance obtained from the Centre for Mobile Computing and Communication, Jadavpur University, Kolkata.  ... 
arXiv:1207.2701v1 fatcat:nws76ds3braydh2zdppmlfi46m

Technique for authenticating H.264/SVC streams in surveillance applications

Zhuo Wei, Robert H. Deng, Jialie Shen, Yongdong Wu, Xuhua Ding, SweeWon Lo
2013 2013 IEEE International Conference on Multimedia and Expo Workshops (ICMEW)  
For content-based authentication, AUSSC extracts full features from the first frame of each GOP (group of picture) and partial features from "active" macroblocks of other frames.  ...  AUSSC exploits cryptographic-based authentication for base layer and content-based authentication for enhancement layers.  ...  Since those images have the same content as the original images used by encoders, AUSSC can take content-based features extracted from original images to authenticate qualtiy/spatial scalability.  ... 
doi:10.1109/icmew.2013.6618259 dblp:conf/icmcs/WeiDSWDL13 fatcat:rwrty5wpdrhirek7bjzm3c6w2a

Video Authentication- An Overview

Saurabh Upadhyay, Sanjay Kumar Singh
2011 International Journal of Computer Science & Engineering Survey  
These authentication techniques are broadly classified into four categories: digital signature based techniques, watermark based techniques, intelligent techniques and other techniques.  ...  With the innovations and development in sophisticated video editing technology and a wide spread of video information and services in our society, it is becoming increasingly significant to assure the  ...  Since it is statistically unlikely to find identical and spatially coherent regions in an image, therefore their presence can be used as evidence of tampering.  ... 
doi:10.5121/ijcses.2011.2406 fatcat:25woqprenraqniloz7u25vdj74

Image Authentication Based on Watermarking Approach: Review

Basna Mohammed Salih Hasan, Siddeeq Y. Ameen, Omer Mohammed Salih Hasan
2021 Asian Journal of Research in Computer Science  
Digital image watermark is a strategy to ensure the reliability, resilience, intellectual property, and validity of multimedia documents.  ...  Digital image authentication techniques have recently gained a lot of attention due to their importance to a large number of military and medical applications, banks, and institutions, which require a  ...  [63] IMAGE AUTHENTICATION BASED ON WATERMARKING To ensure the image authentication with the watermarking approach with an appropriate level of security, the safer and more diverse use of authentication  ... 
doi:10.9734/ajrcos/2021/v9i330224 fatcat:ng5kkpahcnah3p5iysh4m7egbu

Robust and Secure Image Hashing

A. Swaminathan, Y. Mao, M. Wu
2006 IEEE Transactions on Information Forensics and Security  
Image hash functions find extensive applications in content authentication, database search, and watermarking.  ...  This paper develops a new algorithm for generating an image hash based on Fourier transform features and controlled randomization.  ...  be considered as a hypothesis testing problem with the following two hypotheses • H 0 : Image is not authentic; and • H 1 : Image is authentic.  ... 
doi:10.1109/tifs.2006.873601 fatcat:2truvdg2izcndk2rf2rmixde4u

2020 Index IEEE Transactions on Information Forensics and Security Vol. 15

2020 IEEE Transactions on Information Forensics and Security  
., +, TIFS 2020 391-406 A Framework to Counter Statistical Ineffective Fault Analysis of Block Ciphers Using Domain Transformation and Error Correction.  ...  ., +, TIFS 2020 2556-2569 Industrial property Resilient System-on-Chip Designs With NoC Fabrics.  ...  G Gait analysis Deep Learning-Based Gait Recognition Using Smartphones in the Wild.  ... 
doi:10.1109/tifs.2021.3053735 fatcat:eforexmnczeqzdj3sc2j4yoige

Verification watermarks on fingerprint recognition and retrieval

Sharath Pankanti
2000 Journal of Electronic Imaging (JEI)  
We shall also describe the watermarking scheme, fingerprint recognition and feature extraction techniques used.  ...  We investigate the effects of watermarking fingerprint images on the recognition and retrieval accuracy using a proposed invisible fragile watermarking technique for image verification applications on  ...  A reliable feature extraction algorithm is critical to the performance of an automatic identity authentication system using fingerprints and consists of complex image processing steps.  ... 
doi:10.1117/1.1287795 fatcat:qk5jnvtcdndqhhoi5rsq6mjkaq

Design and Implementation of Image Watermarking Scheme based on Exponential Function

2019 VOLUME-8 ISSUE-10, AUGUST 2019, REGULAR ISSUE  
In the anticipated approach, the secrete image is first imperiled for compression using exponential function and then entrenched onto the cover data.  ...  Statistical analysis of resultant data proves better robustness in par with other existing methodologies.  ...  INTRODUCTION Digital image watermarking (DIW) is an extensively used mutual technique to code multimedia data with an identifier for the purpose of authentication between source and destination [1] [2  ... 
doi:10.35940/ijitee.k2339.1081219 fatcat:brgf2wlpibbsbkn3vvnb7b2wm4

Verification watermarks on fingerprint recognition and retrieval

Sharatchandra Pankanti, Minerva M. Yeung, Ping W. Wong, Edward J. Delp III
1999 Security and Watermarking of Multimedia Contents  
We shall also describe the watermarking scheme, fingerprint recognition and feature extraction techniques used.  ...  We investigate the effects of watermarking fingerprint images on the recognition and retrieval accuracy using a proposed invisible fragile watermarking technique for image verification applications on  ...  A reliable feature extraction algorithm is critical to the performance of an automatic identity authentication system using fingerprints and consists of complex image processing steps.  ... 
doi:10.1117/12.344704 dblp:conf/sswmc/PankantiY99 fatcat:lqlxegchxraadfcacg7ufw4a4i
« Previous Showing results 1 — 15 out of 3,437 results