We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.

Search Results

Showing 1-20 of 10,000 results
  1. Blind image—variant based authentication method

    There is a plethora of image authentication techniques in the literature. Almost all of these methods use either a form of watermarking or data...

    Saif alZahir, Wahedul Islam in Multimedia Tools and Applications
    Article 15 November 2023
  2. A perceptual entanglement-based image authentication with tamper localisation

    With the recent development in image editing tools the content of digital images can be easily manipulated. Research efforts are being deployed to...

    Article 03 October 2023
  3. Public key based bidirectional shadow image authentication without pixel expansion in image secret sharing

    Image secret sharing (ISS) is gaining popularity due to the importance of digital images and its wide application to cloud-based distributed storage...

    Xuehu Yan, Longlong Li, ... Lei Sun in Frontiers of Information Technology & Electronic Engineering
    Article 23 January 2023
  4. Asymmetric image authentication algorithm using double random modulus decomposition and CGI

    In this paper, we have proposed asymmetric image encryption cum authentication cryptosystem based on double random modulus decomposition using...

    Raman Yadav, Phool Singh in Computational and Applied Mathematics
    Article 12 September 2023
  5. Reversible image authentication using a central folding strategy with two images

    In reversible image authentication (RIA) methods, it is common to use a reversible hiding method to embed the authentication code (AC) bits into each...

    Van-At Pham, Ngoc-Hung Nguyen, ... Minh-Thai Pham in Multimedia Tools and Applications
    Article 15 January 2024
  6. A reversible watermarking for image content authentication based on wavelet transform

    In the special field of anti-counterfeit authentication, such as medical archive protection, there is a problem of copyright infringement. To protect...

    De Li, **anlong Dai, ... Xun ** in Signal, Image and Video Processing
    Article 11 January 2024
  7. Stabilized Performance Maximization for GAN-based Real-Time Authentication Image Generation over Internet

    Providing the completely automated public test to tell computers and humans apart (CAPTCHA) services that are not vulnerable to learning is an...

    Joo Yong Shim, Soyi Jung, ... Jong-Kook Kim in Multimedia Tools and Applications
    Article Open access 15 July 2023
  8. Image authentication and recovery: Sudoku puzzle and MD5 hash algorithm based self-embedding fragile image watermarking method

    In recent years, image forgery has become an important issue with the use of images in many important areas. Several self-embedding fragile...

    Ayhan Renklier, Serkan Öztürk in Multimedia Tools and Applications
    Article 11 July 2023
  9. A double-embedding hidden image encryption and authentication scheme based on compressed sensing and double random phase encoding

    The image may be maliciously tampered when transmitted on the shared platform, and the receiver cannot determine whether the received image is a true...

    Nana Ren, Guihua Cheng, ... Boyu Li in Multimedia Tools and Applications
    Article 16 September 2023
  10. Binary Wavelet Transform-Based Financial Text Image Authentication Algorithm

    Abstract

    This paper presents a novel financial text image security authentication algorithm based on binary wavelet transform. Initially, the...

    Wen** Wang, Miaomiao Lu, ... ** Jiang in Automatic Control and Computer Sciences
    Article 27 June 2024
  11. A secure DWT-based dual watermarking scheme for image authentication and copyright protection

    Digital watermarking mechanisms have become an essential tool for guaranteeing copyright protection and content authentication. However, most...

    A. Hernández-Joaquín, G. Melendez-Melendez, R. Cumplido in Multimedia Tools and Applications
    Article 21 April 2023
  12. Nonlinear image authentication algorithm based on double fractional Mellin domain

    In this paper, we propose a novel dual-user image authentication algorithm based on the double fractional Mellin transform. We perform a security...

    Sachin, Phool Singh, Kehar Singh in Nonlinear Dynamics
    Article 09 May 2023
  13. A novel strict color image authentication scheme based on dual-complex LU decomposition

    In this paper, we construct the dual-complex Gauss transformation and propose novel algorithms for LU decomposition and partial pivoting LU...

    Wenxv Ding, Yimeng **, Ying Li in Computational and Applied Mathematics
    Article 23 April 2024
  14. Integer wavelet transform based watermarking scheme for medical image authentication

    In this work, a blind watermarking scheme has been proposed for medical image authentication. The scheme can embed patients’ records in digital...

    Ashis Dey, Partha Chowdhuri, Pabitra Pal in Multimedia Tools and Applications
    Article 24 February 2024
  15. A secure secret image sharing with steganography and authentication by Hamming code (15,11) for compressed images

    The impressive increase in the rate of image transmission via internet has, more than ever, highlighted the importance of image securing techniques....

    Sara Charoghchi, Samaneh Mashhadi in Multimedia Tools and Applications
    Article 19 September 2023
  16. Multiple image watermarking with dual authentication for smart and safe city environment

    The drastic advancement in medical data volume is a big concern for researchers to prevent it from forgery. The presented dual image watermarking...

    Divyanshu Awasthi, Vinay Kumar Srivastava in Multimedia Tools and Applications
    Article 25 August 2023
  17. An effective compressed image authentication scheme based on N-variant AMBTC

    Image authentication is one technique that provides integrity protection for digital images, making them sensitive to any slight modification....

    Guo-Dong Su, Chin-Chen Chang, Chia-Chen Lin in Multimedia Tools and Applications
    Article 20 May 2023
  18. LWT-DCT based image hashing for image authentication via blind geometric correction

    Image authentication based on robust image hashing has been paid large attention by researchers. However, most of the existing methods are unable to...

    Article 13 June 2022
  19. Real-time and secure identity authentication transmission mechanism for artificial intelligence generated image content

    The rapid development of generative artificial intelligence technology and large-scale pre-training models has led to the emergence of artificial...

    **ao Feng, Zheng Yuan in Journal of Real-Time Image Processing
    Article 10 July 2024
  20. A comprehensive survey on image authentication for tamper detection with localization

    The data that is stored or transmitted in digital form is susceptible to be attacked. Digital images are particularly vulnerable to unauthorized...

    H R Chennamma, B Madhushree in Multimedia Tools and Applications
    Article 14 June 2022
Did you find what you were looking for? Share feedback.