Please use this identifier to cite or link to this item:
|Title:||Authentication for document management||Authors:||Kot, Alex Chichung.||Keywords:||DRNTU::Engineering::Electrical and electronic engineering::Electronic systems::Signal processing||Issue Date:||2006||Abstract:||The advancement in digital technology and multimedia has made it easy to duplicate, manipulate and illegally distribute the multimedia content. In addition, it is easy to forge an image with the availability of the powerful image editing software and digital cameras. In this report, we present five data hiding techniques for binary images authentication and tampering localization. In addition, to accurately evaluate the amount of distortions caused by flipping pixels in binary images, we propose an objective distortion measure. Ensuring the authenticity and integrity facilitates the management of digital documents. The relationship of two typical type of data hiding methods, i.e., pixel pattern and key-weight methods are discussed. Finally, two steganalysis methods to detect data hiding on binary cartoon and text images are presented such that secret communication can be monitored.||URI:||http://hdl.handle.net/10356/14532||Fulltext Permission:||restricted||Fulltext Availability:||With Fulltext|
|Appears in Collections:||EEE Research Reports (Staff & Graduate Students)|
Items in DR-NTU are protected by copyright, with all rights reserved, unless otherwise indicated.