It is very crucial to design efficient methods to provide authentication to document images mainly for images whose security must be protected. In digital media the authentication, tampering detection and repairing of the tampered data is main concern. Nowadays many digital documents are transferred on the internet regularly e.g. circuit diagrams, scanned cheques, signed documents, drawings, design drafts etc. Here the method of image authentication, tampering detection and repairing is explained. The grayscale image document image authentication with self repair method is provided. The authentication signal is calculated from binary image of the original document image. Secret sharing scheme is used to calculate this authentication signal....
The advancement in digital technology and multimedia has made it easy to duplicate, manipulate and ...
Abstract — In this paper we proposed a new authentication method which is based on secret sharing te...
Numerous image authentication techniques have been devised to address the potential security issue o...
It is very necessary to design effective methods to solve image authentication problem, particularly...
Abstract-Digital image authentication is difficult for binary images because of its simple binary na...
Abstract- With fast advance digital technology image processing is fastest and secure area of resear...
An authentication method for grayscale document images, based on the secret sharing technique with a...
This paper attempts to propose a novel technique of blind authentication based on the method of secr...
This is new authentication scheme based on the secret sharing method with a data repair capability f...
[[abstract]]This paper presents a blind image authentication technique. It reports on several proces...
Abstract—It is very necessary to design effective methods to solve image authentication problem, par...
[[abstract]]Image authentication is an important research topic of maintaining the integrity of digi...
[[abstract]]This study presents an authentication method with self-recovery ability. The hidden wate...
Many recent technologies in the field of image processing have necessitated the attention to the fie...
The advancement in digital technology and multimedia has made it easy to duplicate, manipulate and ...
The advancement in digital technology and multimedia has made it easy to duplicate, manipulate and ...
Abstract — In this paper we proposed a new authentication method which is based on secret sharing te...
Numerous image authentication techniques have been devised to address the potential security issue o...
It is very necessary to design effective methods to solve image authentication problem, particularly...
Abstract-Digital image authentication is difficult for binary images because of its simple binary na...
Abstract- With fast advance digital technology image processing is fastest and secure area of resear...
An authentication method for grayscale document images, based on the secret sharing technique with a...
This paper attempts to propose a novel technique of blind authentication based on the method of secr...
This is new authentication scheme based on the secret sharing method with a data repair capability f...
[[abstract]]This paper presents a blind image authentication technique. It reports on several proces...
Abstract—It is very necessary to design effective methods to solve image authentication problem, par...
[[abstract]]Image authentication is an important research topic of maintaining the integrity of digi...
[[abstract]]This study presents an authentication method with self-recovery ability. The hidden wate...
Many recent technologies in the field of image processing have necessitated the attention to the fie...
The advancement in digital technology and multimedia has made it easy to duplicate, manipulate and ...
The advancement in digital technology and multimedia has made it easy to duplicate, manipulate and ...
Abstract — In this paper we proposed a new authentication method which is based on secret sharing te...
Numerous image authentication techniques have been devised to address the potential security issue o...