The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Despite being originally inspired by the central nervous system, artificial neural networks have diverged from their biological archetypes as they have been remodeled to fit, particular tasks. In this paper, we review several possibilites to reverse map these architectures to biologically more realistic spiking networks with the aim of emulating them on fast, low-power neuromorphic hardware. Since...
In this paper, a new system is presented for authenticating image content using digital watermark embedding in the DWT-domain of JPEG2000. A semi-fragile signature, generated from the host signal, is embedded into the image for content verification. Generation as well as embedding of the signature is adapted to the image content for performance improvement. The system is tested extensively and performance...
In this paper, we propose a new robust image hashing approach to be used for semi-fragile image authentication. We use a texture-based feature, the so-called gray-level blob in Gaussian scale-space, which is invariant to scaling, rotation, and translation. It is associated with the image content and thus independent of image geometry. Furthermore, we show that our new approach is robust against a...
In this paper, we propose a blind geometric warping-based watermarking for images and videos. We put emphasis on high robustness and security as well as decreased complexity. Our previous works have shown that the geometric structure of images and videos is a suitable embedding domain for watermark information. To describe the geometric structure, detection or segmentation methods are used, which...
The recognition of digital audio data manipulation is a challenge addressed by various fragile and content-fragile watermarking algorithms. But so far none of the approaches provides satisfying results with respect to manipulation detection. Especially distinguishing malicious attacks from allowed post production operations is still an open issue. In this paper we present an improvement of our content-based...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.