The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Minimization of perceptual and statistical distortions is one of the main challenges facing steganographic schemes. The most common approach to minimizing perceptual distortion is Least Significant Bit embedding. However, the statistical features (e.g., histogram) of the stego-images may be changed significantly even with selection of the regions of interest in the embedding process. This opens security...
Face recognition (FR) systems in real-world applications need to deal with a wide range of interferences, such as occlusions and disguises in face images. Compared with other forms of interferences such as nonuniform illumination and pose changes, face with occlusions has not attracted enough attention yet. A novel approach, coined dynamic image-to-class warping (DICW), is proposed in this work to...
This paper proposes a new audio authenticity detection algorithm based on the max offset for cross correlation (MOCC) between the extracted ENF (Electric Network Frequency) signal and the reference signal. We first extract the ENF signal from a query audio signal. And then we partition it into overlapping blocks for forgery detection. The MOCC between the extracted ENF and the reference signal is...
In this work we propose a random index modulation (RIM) based fragile watermarking scheme for authenticating RGB colour images. To thwart counterfeiting attacks, block-wise dependence neighbourhood is established, under the control of a secret key, and a content-dependent watermark is created by picking a certain number of bits from the dependence neighbourhood after scrambling its members. To minimise...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.