透過您的圖書館登入
IP:216.73.216.114

並列摘要


This paper introduces an enhanced image authentication technique providing greater security with uncompromising visual quality. To augment data security, the authenticating information is diffused into the transformed coefficients of both the levels after a two level Discrete Haar Wavelet Transform. In addition a bit level noise reduction algorithm increases the imperceptibility of the added noise. The extraction algorithm is completely blind and authenticity is verified by regenerating a message digest at the receiving end. The algorithm has been tested against some related attacks and is appropriate in smart card design. Performance comparisons exhibit significant growth over other similar techniques.

並列關鍵字

Copy attack DWT image authentication MD SSIM

被引用紀錄


Wu, S. C. (2009). 《楞伽經》精神生態學之研究 [doctoral dissertation, Tamkang University]. Airiti Library. https://doi.org/10.6846/TKU.2009.00871
張澤清(2014)。以資料驅動的火焰合成與設計〔碩士論文,國立交通大學〕。華藝線上圖書館。https://doi.org/10.6842/NCTU.2014.00094
Dutta, B. (2014). Assessing the Attitudes of Current Smokers towards Technology Based and Traditional Based Smoking Cessation Programs at Kolkata, in India [master's thesis, Taipei Medical University]. Airiti Library. https://doi.org/10.6831/TMU.2014.00043
盧兆慶(2010)。雙足機器人之步態規劃與感測系統建置〔碩士論文,國立臺灣大學〕。華藝線上圖書館。https://doi.org/10.6342/NTU.2010.01687

延伸閱讀