[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
Reflects downloads up to 03 Mar 2025Bibliometrics
Skip Table Of Content Section
research-article
Double-Sided Watermark Embedding and Detection

Spread-spectrum schemes embed additive or multiplicative watermarks into the host contents for copyright protection. However, their performances are reduced by the interference from the host contents. Thus, in this work, we introduce a simple double-...

research-article
Reversible Data-Hiding Scheme for 2-D Vector Maps Based on Difference Expansion

Reversible watermarking is suitable for hiding data in 2-D vector maps because the distortions induced by data embedding can be removed after extracting the hidden bits. In this paper, two reversible data-hiding schemes are explored based on the idea of ...

research-article
Reversible Image Watermarking Based on Integer-to-Integer Wavelet Transform

This paper proposes a high capacity reversible image watermarking scheme based on integer-to-integer wavelet transforms. The proposed scheme divides an input image into nonoverlapping blocks and embeds a watermark into the high-frequency wavelet ...

research-article
Robust Wireless Transmission of Compressed Latent Fingerprint Images

Maximizing the potential of latent fingerprints from crime scenes in the identification of suspects requires the rapid transfer of the latent from the scene to a remote fingerprint bureau. Transmission over restricted-bandwidth cellular wireless ...

research-article
Lossless Data Embedding With High Embedding Capacity Based on Declustering for VQ-Compressed Codes

The purpose of data hiding with reversibility property is to recover the original cover media after extracting the hidden data from the stegomedia. In this paper, we propose a reversible data-hiding scheme for embedding secret data in VQ-compressed ...

research-article
Watermarking Protocol for Web Context

Digital watermarking is considered to be a main technology for the copyright protection of multimedia digital content distributed on the Internet. However, watermarking procedures can effectively support copyright protection processes only if they are ...

research-article
Channel Identification: Secret Sharing Using Reciprocity in Ultrawideband Channels

To establish a secure communications link between any two transceivers, the communicating parties require some shared secret, or key, with which to encrypt the message so that it cannot be understood by an enemy observer. Using the theory of reciprocity ...

research-article
Robust and Secure Image Hashing via Non-Negative Matrix Factorizations

In this paper, we propose the use of non-negative matrix factorization (NMF) for image hashing. In particular, we view images as matrices and the goal of hashing as a randomized dimensionality reduction that retains the essence of the original image ...

research-article
Statistical Models for Assessing the Individuality of Fingerprints

Following the Daubert ruling in 1993, forensic evidence based on fingerprints was first challenged in the 1999 case of the U.S. versus Byron C. Mitchell and, subsequently, in 20 other cases involving fingerprint evidence. The main concern with the ...

research-article
A Memetic Fingerprint Matching Algorithm

Minutiae point pattern matching is the most common approach for fingerprint verification. Although many minutiae point pattern matching algorithms have been proposed, reliable automatic fingerprint verification remains as a challenging problem, both ...

research-article
Toward Pose-Invariant 2-D Face Recognition Through Point Distribution Models and Facial Symmetry

This paper proposes novel ways to deal with pose variations in a 2-D face recognition scenario. Using a training set of sparse face meshes, we built a point distribution model and identified the parameters which are responsible for controlling the ...

research-article
Warping-Based Offline Signature Recognition

Offline signature recognition is an important form of biometric identification that can be used for various purposes. Similar to other biometric measures, signatures have inherent variability and so pose a difficult recognition problem. In this paper, ...

research-article
Exposing Digital Forgeries in Interlaced and Deinterlaced Video

With the advent of high-quality digital video cameras and sophisticated video editing software, it is becoming increasingly easier to tamper with digital video. A growing number of video surveillance cameras are also giving rise to an enormous amount of ...

research-article
Exposing Digital Forgeries in Complex Lighting Environments

The availability of sophisticated digital imaging technology has given rise to digital forgeries that are increasing in sophistication and frequency. We describe a technique for exposing such fakes by detecting inconsistencies in lighting. We show how ...

research-article
Unicity Distance of Robust Image Hashing

An image hash is a randomized compact representation of image content and finds applications in image authentication, image and video watermarking, and image similarity comparison. Usually, an image-hashing scheme is required to be robust and secure, ...

research-article
Multimodal Wireless Networks: Communication and Surveillance on the Same Infrastructure

In this paper, we propose a new family of wireless networks-the multimodal wireless networks. These networks offer multiple functionalities realized on the same infrastructure. A multimodal wireless network has two modes of operation: 1) the ...

Comments

Please enable JavaScript to view thecomments powered by Disqus.