Đang chuẩn bị liên kết để tải về tài liệu:
Báo cáo hóa học: "Research Article Time-Frequency and Time-Scale-Based Fragile Watermarking Methods for Image Authentication Braham Barkat1 and Farook Sattar (EURASIP Member)2 1 Department 2 Faculty"
Đang chuẩn bị nút TẢI XUỐNG, xin hãy chờ
Tải xuống
Tuyển tập báo cáo các nghiên cứu khoa học quốc tế ngành hóa học dành cho các bạn yêu hóa học tham khảo đề tài: Research Article Time-Frequency and Time-Scale-Based Fragile Watermarking Methods for Image Authentication Braham Barkat1 and Farook Sattar (EURASIP Member)2 1 Department 2 Faculty | Hindawi Publishing Corporation EURASIP Journal on Advances in Signal Processing Volume 2010 Article ID 408109 14 pages doi 10.1155 2010 408109 Research Article Time-Frequency and Time-Scale-Based Fragile Watermarking Methods for Image Authentication Braham Barkat1 and Farook Sattar EURASIP Member 2 1 Department of Electrical Engineering The Petroleum Institute P O. Box 2533 Abu Dhabi UAE 2 Faculty of Computer Science and Information Technology University of Malaya 50603 Kuala Lumpur Malaysia Correspondence should be addressed to Farook Sattar farook_sattar@um.edu.my Received 14 February 2010 Revised 29 June 2010 Accepted 30 July 2010 Academic Editor Bijan Mobasseri Copyright 2010 B. Barkat and F. Sattar. This is an open access article distributed under the Creative Commons Attribution License which permits unrestricted use distribution and reproduction in any medium provided the original work is properly cited. 1. Introduction Watermarking techniques are developed for the protection of intellectual property rights. They can be used in various areas including broadcast monitoring proof of ownership transaction tracking content authentication and copy control 1 . In the last two decades a number of watermarking techniques have been developed 2-10 . The requirement s that a particular watermarking scheme needs to fulfill depend s on the application purpose s . In this paper we focus on the authentication of images. In image authentication there are basically two main objectives i the verification of the image ownership and ii the detection of any forgery of the original data. Specifically in the authentication we check whether the embedded information i.e. the invisible watermark has been altered or not in the receiver side. Fragile watermarking is a powerful image content authentication tool 1 7 8 11 . It is used to detect any possible change that may have occurred in the original image. A fragile watermark is readily destroyed if the watermarked image has been .