In multimedia communication, compression of data is essential to improve transmission rate, and minimize storage space. At the same time, authentication of transmitted data is equally important to justify all these activities. The drawback of compression is that the compressed data are vulnerable to channel noise. In this paper, error concealment methodologies with ability of error detection and concealment are investigated for integration with image authentication in JPEG2000.The image authentication includes digital signature extraction and its diffusion as a watermark. To tackle noise, the error concealment technologies are modified to include edge information of the original image.This edge_image is transmitted along with JPEG2000 compr...
The necessity for copyright protection, ownership verification, and other issues for digital data ar...
The necessity for copyright protection, ownership verification, and other issues for digital data ar...
Wireless communication technology has provided increased opportunity for applications such as teleme...
In multimedia communication and data storage, compression of data is essential to speed up the trans...
Abstract: JPEG2000 image compression standard provides good compression efficiency in image coding. ...
Whenever media contents transmitted through the network, compressed and encrypted media data is used...
[[abstract]]Computer network and digitized information, which bring the convenience of spreading and...
Images transmitted over unreliable channels are highly prone to errors. This produces severe distort...
This paper presents an authentication algorithm based on robust watermarking techniques. In particul...
Due to the ease with which digital multimedia content can be mod-ified, a number of techniques to fo...
A robust error concealment scheme using data hiding which aims at achieving high perceptual quality ...
In this paper, a watermarking technique for JPEG2000 compressed image is proposed. Scrambling of sec...
Abstract. Image authentication is becoming very important for certifying data integrity. A key issue...
This book addresses the problems that hinder image authentication in the presence of noise. It consi...
The necessity for copyright protection,ownership v erification,and other issues for digital data are...
The necessity for copyright protection, ownership verification, and other issues for digital data ar...
The necessity for copyright protection, ownership verification, and other issues for digital data ar...
Wireless communication technology has provided increased opportunity for applications such as teleme...
In multimedia communication and data storage, compression of data is essential to speed up the trans...
Abstract: JPEG2000 image compression standard provides good compression efficiency in image coding. ...
Whenever media contents transmitted through the network, compressed and encrypted media data is used...
[[abstract]]Computer network and digitized information, which bring the convenience of spreading and...
Images transmitted over unreliable channels are highly prone to errors. This produces severe distort...
This paper presents an authentication algorithm based on robust watermarking techniques. In particul...
Due to the ease with which digital multimedia content can be mod-ified, a number of techniques to fo...
A robust error concealment scheme using data hiding which aims at achieving high perceptual quality ...
In this paper, a watermarking technique for JPEG2000 compressed image is proposed. Scrambling of sec...
Abstract. Image authentication is becoming very important for certifying data integrity. A key issue...
This book addresses the problems that hinder image authentication in the presence of noise. It consi...
The necessity for copyright protection,ownership v erification,and other issues for digital data are...
The necessity for copyright protection, ownership verification, and other issues for digital data ar...
The necessity for copyright protection, ownership verification, and other issues for digital data ar...
Wireless communication technology has provided increased opportunity for applications such as teleme...