A Study of Image Authentication and Recovery
碩士 === 國立中興大學 === 資訊管理學系所 === 97 === Today’s watermarking techniques can be divided into two types. The first type is robust watermarking technique which can resist malicious attacks better. The second type is fragile watermarking technique, also called image authentication, can verify whether the i...
Main Authors: | Chun-Wei Yang, 楊竣崴 |
---|---|
Other Authors: | Jau-Ji Shen |
Format: | Others |
Language: | en_US |
Published: |
2009
|
Online Access: | http://ndltd.ncl.edu.tw/handle/51294241094860137641 |
Similar Items
-
Study of Image Authentication and Recovery of ROI
by: Tsung-Lin Wu, et al.
Published: (2013) -
A Study on Image Hiding, Authentication, and Recovery
by: 張御傑
Published: (2009) -
A Study of Image Authentication Scheme with Self-Recovery
by: Chung-Wei Huang, et al.
Published: (2013) -
Fragile Watermarking For Image Authentication with Localization and Recovery
by: An-Wei Peng, et al.
Published: (2004) -
Multipurpose Watermarking for Image Authentication and Recovery
by: Ming-yuan Syue, et al.
Published: (2011)