This paper proposes a fragile watermarking method for image authentication.
该文提出了一种用于图像鉴定的脆弱水印方法。
A novel algorithm for image authentication in ridgelet domain is presented.
提出了一种在脊波变换域上进行图像认证的新算法。
Digital signature and watermarking are two main methods of image authentication.
数字图像鉴别的基本方法主要有数字签名和数字水印两种。
Digital image authentication includes active authentication and passive authentication.
数字图像认证技术包括主动与被动两种方法。
This paper presents a novel semi-fragile watermark algorithm for image authentication and recovery.
提出一种新的用于图像认证及恢复的半脆弱水印算法。
From the aspect of image understanding, we also present two classes of image content features for image authentication.
并从图像理解的角度出发,给出了两类图像内容特征提取方法。
Image authentication needs to contrast with the digest and watermark character to confirm whether the content is tampered.
验证图像时需同时通过与摘要的对比以及与水印特征的对比来确定内容是否被篡改。
The original watermark is divided into the robust watermark and the semi-fragile watermark for copyright protection and image authentication.
原始水印分为鲁棒水印和半脆弱水印,分别用于版权保护和图像认证。
The third method is effective integrate the former two algorithms, which proposed dual watermarking algorithm for digital image authentication.
第三种算法是将前两种空域和变换域算法进行有效融合,从而提出了双重多功能性水印数字图像认证算法。
In this dissertation, we mainly study on digital image authentication method in two aspects: complete authentication and content authentication.
本文主要探讨针对数字图像的认证方法,对于图像认证的两大场合:精确认证和内容认证分别进行了研究。
Pointing out the limitation of the image authentication algorithm based on dividing blocks and give the reason why collage attack can be successful.
指出基于分块的图像认证方法存在的缺陷,以及共谋攻击得以成功的原因;
As a branch of multimedia information security technology, digital image authentication is paid close attention by one of a growing number of experts.
数字图像认证技术作为多媒体信息安全技术的分支之一,受到了越来越多专家学者的重视。
In the authentication phase, the same technology is used to the suspect images, then using the image authentication algorithm to achieve integrity certification.
在认证阶段,运用相同的技术处理待检测图像,生成影子,用认证算法实现对图像的完整性认证。
A new invisible watermarking technique which could localize tampered areas for image authentication was proposed, based on image feature and public key cryptography.
提出一种基于图像特征和公钥密码系统的易损水印算法,在图像认证中能够定位图像被篡改的位置。
It has brought us great convenience and a great number of information security problems as well. Such as information theft, copyright protection of multimedia data and image authentication.
它给人们带来种种便利的同时也带来了一系列的信息安全问题,比如信息窃取问题、多媒体信息的版权保护问题、信息篡改问题等。
In this dissertation, the robust watermarking for image copyright protection and the semi-fragile watermarking for image authentication are studied in detail. The main contribution includes.
本论文针对用于图像版权保护的稳健水印和用于图像认证的半脆弱水印进行研究。
One way of doing this is to use image-authentication systems to reveal if someone has tampered with a picture.
一种做法是运用图像鉴定系统来显示是否有人擅自改动了图片。
Double Digital Watermarking Method based on Transform Domain has realized the double aims of the copyright protection and the integrity authentication of image content.
基于变换域的双重数字水印方法,通过嵌入鲁棒水印和脆弱水印实现了图像内容版权保护和完整性认证的双重目的。
This article introduces semi-fragile watermarking technology for digital image anti-counterfeiting authentication.
该文介绍利用半脆弱数字水印技术进行图像的防伪鉴定。
This paper presents a novel recoverable active signature technique of digital images(RADS) , according to the characteristics of image contents and the requirements of multimedia authentication.
本文根据多媒体信息的特点和多媒体认证的具体要求,提出了一种新的数字图象可恢复性主动签名方法(RADS)。
In the authentication message evaluator, the features of the received image are extracted again, and an effective comparison method is used to judge the image's authenticity.
在认证消息评估器中,提取出接收图像的对应特征,并使用一种基于相似度的特征比较方法来判断该图像的可信度。
A new image blind watermarking algorithm based on adaptive quantization step in discrete wavelet transform (DWT) is proposed, which can be used in copyright authentication.
提出了一种可用于版权认证的基于小波变换域自适应量化步长的图像盲水印算法。
Applying the satellite image with good phase and high resolution, adopting the the method of restorative investigation, the certain authentication could be provided for judicial authority.
利用时相性好、高分辨率的卫星影像资料或森林资源档案,采取恢复性调查的方法,可为司法机关提供证据确凿的鉴定意见。
Ear recognition involves many domains such as feature extract, computer vision, image processing, pattern recognition and identity authentication etc.
它涉及到生物特征提取、计算机视觉、图像处理、模式识别和身份认证技术等诸多领域。
A hierarchical semi-fragile digital watermarking algorithm was designed for image content integrality authentication, tamper localization and recovery.
设计并实现了一种基于分层的半脆弱数字水印算法,用于图像内容完整性认证,篡改定位和恢复。
The binary phase-only filter (BPOF) digital watermarking is a semi-fragile watermarking technique used for the image credibility authentication.
二元纯位相滤波器(BPOF)数字水印是一种用于图像真实性认证的半脆弱水印技术。
As a novel biometric authentication technology, human ear recognition needs to solve the problems of image processing such as edge detection and feature extraction.
人耳识别作为新的生物特征识别技术,首先要解决作为基础的边缘检测和特征提取等图像处理方面的问题。
The authentication techniques of image authenticity and integrality are the important research subjects of the multi-media security field.
数字图像的真实性、完整性认证技术是多媒体安全保护的重要研究课题。
The invention provides an image processing device, an image processing method thereof and a personal authentication method.
本发明提供图像处理装置及其图像处理方法、个人认证方法。
The invention provides an image processing device, an image processing method thereof and a personal authentication method.
本发明提供图像处理装置及其图像处理方法、个人认证方法。
应用推荐