|
|
|
Aliya Rexit, Mahpirat Muhammat, Xuebin Xu, Wenxiong Kang, Alimjan Aysa and Kurban Ubul
Handwritten signatures have traditionally been used as a common form of recognition and authentication in tasks such as financial transactions and document authentication. However, there are few studies on minority languages such as Uyghur and Kazakh use...
ver más
|
|
|
|
|
|
Rogelio Reyes-Reyes, Clara Cruz-Ramos, Volodymyr Ponomaryov, Beatriz P. Garcia-Salgado and Javier Molina-Garcia
In this paper, a fragile watermarking scheme for color image authentication and self-recovery with high tampering rates is proposed. The original image is sub-sampled and divided into non-overlapping blocks, where a watermark used for recovery purposes i...
ver más
|
|
|
|
|
|
Laxmisha Rai,Zhiyuan Wang,Amila Rodrigo,Zhaopeng Deng,Haiqing Liu
Pág. pp. 103 - 120
With the rapid use of Android OS in mobile devices and related products, face recognition technology is an essential feature, so that mobile devices have a strong personal identity authentication. In this paper, we propose Android based software developm...
ver más
|
|
|
|
|
|
Ling Du, Zehong He, Yijing Wang, Xiaochao Wang and Anthony T. S. Ho
Image hashing-based authentication methods have been widely studied with continuous advancements owing to the speed and memory efficiency. However, reference hash generation and threshold setting, which are used for similarity measures between original i...
ver más
|
|
|
|
|
|
Mahbuba Begum and Mohammad Shorif Uddin
Digital image authentication is an extremely significant concern for the digital revolution, as it is easy to tamper with any image. In the last few decades, it has been an urgent concern for researchers to ensure the authenticity of digital images. Base...
ver más
|
|
|