Please use this identifier to cite or link to this item:
Title: Authentication for document management
Authors: Kot, Alex Chichung.
Keywords: DRNTU::Engineering::Electrical and electronic engineering::Electronic systems::Signal processing
Issue Date: 2006
Abstract: The advancement in digital technology and multimedia has made it easy to duplicate, manipulate and illegally distribute the multimedia content. In addition, it is easy to forge an image with the availability of the powerful image editing software and digital cameras. In this report, we present five data hiding techniques for binary images authentication and tampering localization. In addition, to accurately evaluate the amount of distortions caused by flipping pixels in binary images, we propose an objective distortion measure. Ensuring the authenticity and integrity facilitates the management of digital documents. The relationship of two typical type of data hiding methods, i.e., pixel pattern and key-weight methods are discussed. Finally, two steganalysis methods to detect data hiding on binary cartoon and text images are presented such that secret communication can be monitored.
Fulltext Permission: restricted
Fulltext Availability: With Fulltext
Appears in Collections:EEE Research Reports (Staff & Graduate Students)

Files in This Item:
File Description SizeFormat 
RGM6-02 Alex C Kot.pdf
  Restricted Access
2.24 MBAdobe PDFView/Open

Google ScholarTM


Items in DR-NTU are protected by copyright, with all rights reserved, unless otherwise indicated.