A New Binary Image Authentication Scheme with Small Distortion and Low False Negative Rates(Fundamental Theories for Communications)
スポンサーリンク
概要
- 論文の詳細を見る
In this study, a novel binary image authentication scheme is proposed, which can be used to detect any alteration of the host image. In the proposed scheme, the watermark is embedded into a host image using a Hamming-code-based embedding algorithm. A performance analysis shows that the proposed scheme achieves both smaller distortion and lower false negative rates than the previous schemes.
- 社団法人電子情報通信学会の論文
- 2007-11-01
著者
-
Hur Junbeom
Kaist Kor
-
Yoon Hyunsoo
Korea Advanced Inst. Of Sci. And Technol. (kaist) Kor
-
Yoon Hyunsoo
Cs Division At Kaist
-
LEE Younho
EECS Department at KAIST
-
PARK Yongsu
College of Information and Communications at Hanyang Univ.
-
LEE Younho
CS Division at KAIST
-
HUR Junbeom
CS Division at KAIST
-
KIM Heeyoul
CS Division at KAIST
-
Park Yongsu
College Of Information And Communications Hanyang University
-
Kim Heeyoul
Cs Division Kaist
-
Yoon Hyunsoo
Eecs Department At Kaist
関連論文
- VAMSD : Voronoi Diagram Based Autonomous Mobile Sensor Deployment for Maximizing Coverage
- A Velocity-Based Bicasting Handover Scheme for 4G Mobile Systems
- Improving Handover Quality in 4G Mobile Systems
- Efficient and Secure Self-Organized Public Key Management for Mobile Ad Hoc Networks
- A New Binary Image Authentication Scheme with Small Distortion and Low False Negative Rates(Fundamental Theories for Communications)
- Reactive Key Management Scheme for Access Control in Group Communications(Fundamental Theories for Communications)
- Rogue Public Key Registration Attack and the Importance of 'Proof of Possession' in the PKI Environment(Application Information Security)
- Handoff Procedure for Seamless Service in IP and OFDM Based 4G Mobile Systems(Mobile Communication, Wireless Technologies and Computational Electromagnetics)
- Securing Mobile Agents by Integrity-Based Encryption(Software Agent and Its Applications)
- Autonomous Clustering Scheme for Wireless Sensor Networks Using Coverage Estimation-Based Self-Pruning(Network, Ubiquitous Networks)
- A Resilient and Efficient Replication Attack Detection Scheme for Wireless Sensor Networks
- A New MAC Protocol for Improving the End-to-End Performance in Multi-Hop Wireless Ad Hoc Networks(Ad Hoc Network)(Networking Technologies for Mobile Internet Systems)
- A Decentralized Multi-Group Key Management Scheme
- An Efficient Mobile Code Authentication Scheme that Permits Overlapping of Execution and Downloading(Networks)
- Sensor Node Localization by Three Mobile Anchors in the Wireless Sensor Networks