A DCT-Based Image Authentication Approach with Attack Recovery
碩士 === 玄奘大學 === 資訊科學學系碩士班 === 95 === Image authentication techniques verify the integrity of an image from malicious manipulations. Most image authentication methods treat all types of manipulation equally. However, with the increasing demand of JPEG images, a need arise in image authentication whic...
Main Authors: | Hsuan-An Ke, 柯炫安 |
---|---|
Other Authors: | Chien-Chang Chen |
Format: | Others |
Language: | zh-TW |
Published: |
2007
|
Online Access: | http://ndltd.ncl.edu.tw/handle/60485867621787108372 |
Similar Items
-
A DCT Quantization-Based Image Authentication System for Digital Forensics
by: I-Chuan Chang, et al.
Published: (2005) -
Image Tamper Detection and Recovery based on DWT and DCT
by: Yi-min Hsu, et al.
Published: (2007) -
Image Tamper Detection and Recovery based on DWT and DCT
by: Yi-min Hsu, et al. -
Digital Images Authentication Technique Based on DWT, DCT and Local Binary Patterns
by: Esteban Alejandro Armas Vega, et al.
Published: (2018-10-01) -
CONTRIBUTIONS TO THE SA-DCT AND BLOCK-BASED DCT APPROACHES FOR OBJECT-ORIENTED IMAGE CODING
by: FLAVIA MAGALHAES FREITAS FERREIRA
Published: (2004)