Share This Author
Context-based, adaptive, lossless image coding
The CALIC obtains higher lossless compression of continuous-tone images than other lossless image coding techniques in the literature and can afford a large number of modeling contexts without suffering from the context dilution problem of insufficient counting statistics as in the latter approach.
PassPoints: Design and longitudinal evaluation of a graphical password system
A buyer-seller watermarking protocol
This paper proposes an interactive buyer-seller protocol for invisible watermarking in which the seller does not get to know the exact watermarked copy that the buyer receives and the seller cannot create copies of the original content containing the buyers watermark.
Counterfeiting attacks on oblivious block-wise independent invisible watermarking schemes
It is shown that oblivious watermarking techniques that embed information into a host image in a block-wise independent fashion are vulnerable to a counterfeiting attack.
Authentication using graphical passwords: effects of tolerance and image choice
- S. Wiedenbeck, J. Waters, J. Birget, A. Brodskiy, N. Memon
- Computer ScienceSymposium On Usable Privacy and Security
- 6 July 2005
Results show that accurate memory for the password is strongly reduced when using a small tolerance around the user's password points, which suggests that many images may support memorability in graphical password systems.
Steganalysis using image quality metrics
Simulation results with the chosen feature set and well-known watermarking and steganographic techniques indicate that the proposed approach is able with reasonable accuracy to distinguish between cover and stego images.
Spatio–Temporal Transform Based Video Hashing
It is found that these hash functions are resistant to signal processing and transmission impairments, and therefore can be instrumental in building database search, broadcast monitoring and watermarking applications for video.
An efficient and robust method for detecting copy-move forgery
- Sevinc Bayram, H. Sencar, N. Memon
- Computer ScienceIEEE International Conference on Acoustics…
- 19 April 2009
The proposed features can detect duplicated region in the images very accurately, even when the copied region was undergone severe image manipulations and use of counting bloom filters offers a considerable improvement in time efficiency at the expense of a slight reduction in the robustness.
Resolving rightful ownerships with invisible watermarking techniques: limitations, attacks, and implications
It is shown that, in certain applications, rightful ownership cannot be resolved by current watermarking schemes alone, and existing techniques are attacked by providing counterfeit water marking schemes that can be performed on a watermarked image to allow multiple claims of rightful ownership.
CALIC-a context based adaptive lossless image codec
This work proposes a context-based, adaptive, lossless image codec (CALIC), which obtains higher lossless compression of continuous-tone images than other techniques reported in the literature and has relatively low time and space complexities.