We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.
Filters applied:

Search Results

Showing 1-20 of 10,000 results
  1. Blind image—variant based authentication method

    There is a plethora of image authentication techniques in the literature. Almost all of these methods use either a form of watermarking or data...

    Saif alZahir, Wahedul Islam in Multimedia Tools and Applications
    Article 15 November 2023
  2. A perceptual entanglement-based image authentication with tamper localisation

    With the recent development in image editing tools the content of digital images can be easily manipulated. Research efforts are being deployed to...

    Article 03 October 2023
  3. Public key based bidirectional shadow image authentication without pixel expansion in image secret sharing

    Image secret sharing (ISS) is gaining popularity due to the importance of digital images and its wide application to cloud-based distributed storage...

    Xuehu Yan, Longlong Li, ... Lei Sun in Frontiers of Information Technology & Electronic Engineering
    Article 23 January 2023
  4. Reversible image authentication using a central folding strategy with two images

    In reversible image authentication (RIA) methods, it is common to use a reversible hiding method to embed the authentication code (AC) bits into each...

    Van-At Pham, Ngoc-Hung Nguyen, ... Minh-Thai Pham in Multimedia Tools and Applications
    Article 15 January 2024
  5. A reversible watermarking for image content authentication based on wavelet transform

    In the special field of anti-counterfeit authentication, such as medical archive protection, there is a problem of copyright infringement. To protect...

    De Li, **anlong Dai, ... Xun ** in Signal, Image and Video Processing
    Article 11 January 2024
  6. Stabilized Performance Maximization for GAN-based Real-Time Authentication Image Generation over Internet

    Providing the completely automated public test to tell computers and humans apart (CAPTCHA) services that are not vulnerable to learning is an...

    Joo Yong Shim, Soyi Jung, ... Jong-Kook Kim in Multimedia Tools and Applications
    Article Open access 15 July 2023
  7. A secure DWT-based dual watermarking scheme for image authentication and copyright protection

    Digital watermarking mechanisms have become an essential tool for guaranteeing copyright protection and content authentication. However, most...

    A. Hernández-Joaquín, G. Melendez-Melendez, R. Cumplido in Multimedia Tools and Applications
    Article 21 April 2023
  8. Image authentication and recovery: Sudoku puzzle and MD5 hash algorithm based self-embedding fragile image watermarking method

    In recent years, image forgery has become an important issue with the use of images in many important areas. Several self-embedding fragile...

    Ayhan Renklier, Serkan Öztürk in Multimedia Tools and Applications
    Article 11 July 2023
  9. A double-embedding hidden image encryption and authentication scheme based on compressed sensing and double random phase encoding

    The image may be maliciously tampered when transmitted on the shared platform, and the receiver cannot determine whether the received image is a true...

    Nana Ren, Guihua Cheng, ... Boyu Li in Multimedia Tools and Applications
    Article 16 September 2023
  10. Binary Wavelet Transform-Based Financial Text Image Authentication Algorithm

    Abstract

    This paper presents a novel financial text image security authentication algorithm based on binary wavelet transform. Initially, the...

    Wen** Wang, Miaomiao Lu, ... ** Jiang in Automatic Control and Computer Sciences
    Article 27 June 2024
  11. Multiple image watermarking with dual authentication for smart and safe city environment

    The drastic advancement in medical data volume is a big concern for researchers to prevent it from forgery. The presented dual image watermarking...

    Divyanshu Awasthi, Vinay Kumar Srivastava in Multimedia Tools and Applications
    Article 25 August 2023
  12. Integer wavelet transform based watermarking scheme for medical image authentication

    In this work, a blind watermarking scheme has been proposed for medical image authentication. The scheme can embed patients’ records in digital...

    Ashis Dey, Partha Chowdhuri, Pabitra Pal in Multimedia Tools and Applications
    Article 24 February 2024
  13. A secure secret image sharing with steganography and authentication by Hamming code (15,11) for compressed images

    The impressive increase in the rate of image transmission via internet has, more than ever, highlighted the importance of image securing techniques....

    Sara Charoghchi, Samaneh Mashhadi in Multimedia Tools and Applications
    Article 19 September 2023
  14. An effective compressed image authentication scheme based on N-variant AMBTC

    Image authentication is one technique that provides integrity protection for digital images, making them sensitive to any slight modification....

    Guo-Dong Su, Chin-Chen Chang, Chia-Chen Lin in Multimedia Tools and Applications
    Article 20 May 2023
  15. LWT-DCT based image hashing for image authentication via blind geometric correction

    Image authentication based on robust image hashing has been paid large attention by researchers. However, most of the existing methods are unable to...

    Article 13 June 2022
  16. A comprehensive survey on image authentication for tamper detection with localization

    The data that is stored or transmitted in digital form is susceptible to be attacked. Digital images are particularly vulnerable to unauthorized...

    H R Chennamma, B Madhushree in Multimedia Tools and Applications
    Article 14 June 2022
  17. Image perceptual hashing for content authentication based on Watson’s visual model and LLE

    Image perceptual hashing has been widely used in image content authentication. In order to extract hashing sequences that are more consistent with...

    Huifen **ng, Hui Che, ... Honghai Wang in Journal of Real-Time Image Processing
    Article 02 February 2023
  18. An efficient self-embedding fragile watermarking scheme for image authentication with two chances for recovery capability

    A self-embedding block-wise fragile image watermarking scheme is proposed in this paper for authentication, localization, and recovery with enhanced...

    Durgesh Singh, Sanjay K Singh, Sandeep Sambhaji Udmale in Multimedia Tools and Applications
    Article 11 June 2022
  19. WSOMedMark: Robust and optimized dual image watermarking using RDWT and its authentication using BRISK and MSER features for smart healthcare system

    Information contained in digital medical images is beneficial for patient’s diagnosis. Medical Image Watermarking (MIW) provides precise patient...

    Ranjana Dwivedi, Divyanshu Awasthi, Vinay Kumar Srivastava in Multimedia Tools and Applications
    Article 12 June 2024
  20. Applying homogeneity index modification to high-capacity high-dynamic-range image authentication with distortion tolerance

    Distortion-free data hiding algorithms for high-dynamic-range (HDR) images use homogeneity index modification for data embedding. No distortion is...

    Yuan-Yu Tsai, Hong-Lin Liu, Cheng-You Ying in Multimedia Tools and Applications
    Article 22 March 2022
Did you find what you were looking for? Share feedback.