This thesis addresses the question of the authenticity of identity photographs, part of the documents required in controlled access. Since sophisticated means of reproduction are publicly available, new methods / techniques should prevent tampering and unauthorized reproduction of the photograph. This thesis proposes a hashing method for the authentication of the identity photographs, robust to print-and-scan. This study focuses also on the effects of digitization at hash level. The developed algorithm performs a dimension reduction, based on independent component analysis (ICA). In the learning stage, the subspace projection is obtained by applying ICA and then reduced according to an original entropic selection strategy. In the extraction...
Image manipulation is subverting the credibility of photographs as a whole. Currently there is ...
Today, media content is both a way of making money and a part of the art. To protect copyright from...
Digital images have become a powerful and effective visual communication tool for delivering message...
This thesis addresses the question of the authenticity of identity photographs, part of the document...
Cette thèse traite de la question de l authenticité des photographies d identité, partie intégrante ...
Cette thèse traite de la question de l’authenticité des photographies d’identité, partie intégrante ...
The authentication of digital image has become more important as these images can be easily manipula...
This disclosure describes techniques to verify the authenticity of digital images using digital sign...
AbstractImage hashing technique constructs a short sequence from the image to represent its contents...
International audienceThis paper studies the classification of identification documents , which is a...
Insider threats are a significant security issue. The last decade has witnessed countless instances ...
The rapid growth in volume over the last decade of personal photos placed online due to the advent o...
With rapid development of hardware devices and software programs, a large amount of graphic data has...
Information and Communication Technology (ICT) are transforming society’s information flows. These n...
L'identité des personnes sur Internet devient un problème de sécurité majeur. Depuis les accords de ...
Image manipulation is subverting the credibility of photographs as a whole. Currently there is ...
Today, media content is both a way of making money and a part of the art. To protect copyright from...
Digital images have become a powerful and effective visual communication tool for delivering message...
This thesis addresses the question of the authenticity of identity photographs, part of the document...
Cette thèse traite de la question de l authenticité des photographies d identité, partie intégrante ...
Cette thèse traite de la question de l’authenticité des photographies d’identité, partie intégrante ...
The authentication of digital image has become more important as these images can be easily manipula...
This disclosure describes techniques to verify the authenticity of digital images using digital sign...
AbstractImage hashing technique constructs a short sequence from the image to represent its contents...
International audienceThis paper studies the classification of identification documents , which is a...
Insider threats are a significant security issue. The last decade has witnessed countless instances ...
The rapid growth in volume over the last decade of personal photos placed online due to the advent o...
With rapid development of hardware devices and software programs, a large amount of graphic data has...
Information and Communication Technology (ICT) are transforming society’s information flows. These n...
L'identité des personnes sur Internet devient un problème de sécurité majeur. Depuis les accords de ...
Image manipulation is subverting the credibility of photographs as a whole. Currently there is ...
Today, media content is both a way of making money and a part of the art. To protect copyright from...
Digital images have become a powerful and effective visual communication tool for delivering message...