The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
A speeding up robust identification scheme for JPEG images is proposed in this paper. The aim of the identification is to robustly identify JPEG images that are generated from the same original image, under various compression conditions such as differences in compression ratios and initial quantization matrices. The conventional scheme that we focus on uses visually protected features to achieve...
A secure identification scheme for JPEG 2000 code-streams is proposed in this paper. The aim is to securely identify JPEG 2000 images generated from the same original image, without decoding images. Features used for the identification are extracted from header parts in a JPEG 2000 codestream. The proposed scheme does not provide any false negative matches under various compression ratios, while most...
A secure identification scheme for JPEG XR images is proposed in this paper. The aim is to securely identify JPEG XR images which are generated from the same original image under various compression levels. A property of the positive and negative signs of lapped biorthogonal transform coefficients is employed to achieve a robust scheme against JPEG XR compression. The proposed scheme is robust against...
A secure identification scheme for JPEG images is proposed in this paper. The aim is to robustly identify JPEG images which are generated from the same original image under various compression levels in security. A property of the positive and negative signs of DCT coefficients is employed to achieve a robust scheme. The proposed scheme is robust against a difference in compression levels, and does...
We focus on the feature transform approach as one methodology for biometric template protection, where the template consists of the features extracted from the biometric trait. This paper considers some properties of the unitary transform-based template protection in particular. It is known that the Euclidean distance between the templates protected by a unitary transform is the same as that between...
A variety of perceptual encryption schemes have been studied to generate visually encrypted images for protecting visual secrecy and privacy while supporting ongoing innovation and growth in the applications of digital imagery. However, typical image quality metrics such as PSNR and SSIM are not suitable to evaluate the invisibility of visually encrypted images. To overcome this issue, this paper...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.