UM

Browse/Search Results:  1-3 of 3 Help

Selected(0)Clear Items/Page:    Sort:
A DCT-based information hiding method for network authentication Conference paper
ACM International Conference Proceeding Series
Authors:  Song W.;  Zou S.;  Tian Y.;  Li C.;  Sun S.;  Fong S.
Favorite  |  View/Download:1/0  |  Submit date:2019/02/13
Discrete cosine transform  Image processing  Information hiding  Network authentication  
Robust image hashing using progressive feature selection for tampering detection Journal article
MULTIMEDIA TOOLS AND APPLICATIONS, 2017,Volume: 77,Issue: 10,Page: 11609-11633
Authors:  Pun, Chi-Man;  Yan, Cai-Ping;  Yuan, Xiao-Chen
Favorite  |  View/Download:23/0  |  Submit date:2018/10/30
Robust Image Hashing  Progressive Feature Point Selection  Tampering Detection  Image Authentication  Horizontal Location-context Hashing (Hlch)  Vertical Location-context Hashing (Vlch)  
Multi-scale image hashing using adaptive local feature extraction for robust tampering detection Journal article
Signal Processing, 2015,Volume: 121,Page: 1-16
Authors:  Yan C.-P.;  Pun C.-M.;  Yuan X.-C.
Favorite  |  View/Download:4/0  |  Submit date:2019/02/14
Adaptive Feature Point Detection  Image Authentication  Multi-scale Image Hashing  Tampering Detection