A Stevels - … on Environmentally Conscious Design and Inverse …, 2001 - ieeexplore.ieee.org
The paper describes the development of Applied EcoDesign (design for environment) from its initial stage in the early nineties to its present form and explores further developments in …
A Tiwari, M Sharma - Journal of Information Security, 2012 - scirp.org
Technology has no limits today; we have lots of software available in the market by which we can alter any image. People usually copies image from the internet and after some changes …
S Ghosh, S Talapatra, N Chatterjee… - … Journal of Advances …, 2012 - researchgate.net
With the increasing influence of digital network and communication, armour from perilous intrusion and corruption of information (eg image, video, speech etc) during transmission is …
A Tiwari, M Sharma - Journal of The Institution of Engineers (India): Series …, 2012 - Springer
Image authentication is key research area for researchers' world over due to its important function in multimedia content authentication. Hence it's essential to check integrity of …
DM Uliyan, MAF Al-Husainy - International Journal Of Advanced …, 2017 - researchgate.net
Due to the availability of powerful image editing softwares, forgers can tamper the image content easily. There are various types of image forgery, such as image splicing and region …
This article presents a semifragile color image watermarking technique for content authentication. The proposed technique can be implemented with color images and embeds …
Manipulation of digital images is not considered a new thing nowadays. For as long as cameras have existed, photographers have been staged and images have been forged and …
S Ghosh, S Talapatra, D Mondal… - … on Advances in …, 2012 - ieeexplore.ieee.org
In recent time protection of intellectual properties is a concern. To protect the image and video from the unauthenticated access or tampering, watermarking is adopted as a solution …