Publication | Closed Access
Hidden signatures in images
106
Citations
3
References
2002
Year
Unknown Venue
EngineeringInformation SecurityBiometricsInformation ForensicsUnauthorized CopyingImage ForensicsHardware SecurityImage AnalysisPattern RecognitionJpeg Lossy CompressionHidden SignaturesImage Authentication TechniqueComputational ImagingData HidingMachine VisionIdentity-based SecurityComputer ScienceData SecurityComputer VisionCryptographyDigital WatermarkingMultimedia Security
An image authentication technique by embedding each image with a signature so as to discourage unauthorized copying is proposed. The proposed technique could actually survive several kinds of image processing and the JPEG lossy compression.
| Year | Citations | |
|---|---|---|
Page 1
Page 1