Authentication for document management
The advancement in digital technology and multimedia has made it easy to duplicate, manipulate and illegally distribute the multimedia content. In addition, it is easy to forge an image with the availability of the powerful image editing software and digital cameras. In this report, we present fi...
Saved in:
Main Author: | |
---|---|
Other Authors: | |
Format: | Research Report |
Language: | English |
Published: |
2008
|
Subjects: | |
Online Access: | http://hdl.handle.net/10356/14532 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | Nanyang Technological University |
Language: | English |
id |
sg-ntu-dr.10356-14532 |
---|---|
record_format |
dspace |
spelling |
sg-ntu-dr.10356-145322023-03-04T03:21:58Z Authentication for document management Kot, Alex Chichung. School of Electrical and Electronic Engineering DRNTU::Engineering::Electrical and electronic engineering::Electronic systems::Signal processing The advancement in digital technology and multimedia has made it easy to duplicate, manipulate and illegally distribute the multimedia content. In addition, it is easy to forge an image with the availability of the powerful image editing software and digital cameras. In this report, we present five data hiding techniques for binary images authentication and tampering localization. In addition, to accurately evaluate the amount of distortions caused by flipping pixels in binary images, we propose an objective distortion measure. Ensuring the authenticity and integrity facilitates the management of digital documents. The relationship of two typical type of data hiding methods, i.e., pixel pattern and key-weight methods are discussed. Finally, two steganalysis methods to detect data hiding on binary cartoon and text images are presented such that secret communication can be monitored. 2008-11-27T05:52:45Z 2008-11-27T05:52:45Z 2006 2006 Research Report http://hdl.handle.net/10356/14532 en 194 p. application/pdf |
institution |
Nanyang Technological University |
building |
NTU Library |
continent |
Asia |
country |
Singapore Singapore |
content_provider |
NTU Library |
collection |
DR-NTU |
language |
English |
topic |
DRNTU::Engineering::Electrical and electronic engineering::Electronic systems::Signal processing |
spellingShingle |
DRNTU::Engineering::Electrical and electronic engineering::Electronic systems::Signal processing Kot, Alex Chichung. Authentication for document management |
description |
The advancement in digital technology and multimedia has made it easy to
duplicate, manipulate and illegally distribute the multimedia content. In addition,
it is easy to forge an image with the availability of the powerful image
editing software and digital cameras. In this report, we present five data
hiding techniques for binary images authentication and tampering localization.
In addition, to accurately evaluate the amount of distortions caused by
flipping pixels in binary images, we propose an objective distortion measure.
Ensuring the authenticity and integrity facilitates the management of digital
documents. The relationship of two typical type of data hiding methods, i.e.,
pixel pattern and key-weight methods are discussed. Finally, two steganalysis
methods to detect data hiding on binary cartoon and text images are
presented such that secret communication can be monitored. |
author2 |
School of Electrical and Electronic Engineering |
author_facet |
School of Electrical and Electronic Engineering Kot, Alex Chichung. |
format |
Research Report |
author |
Kot, Alex Chichung. |
author_sort |
Kot, Alex Chichung. |
title |
Authentication for document management |
title_short |
Authentication for document management |
title_full |
Authentication for document management |
title_fullStr |
Authentication for document management |
title_full_unstemmed |
Authentication for document management |
title_sort |
authentication for document management |
publishDate |
2008 |
url |
http://hdl.handle.net/10356/14532 |
_version_ |
1759855267773677568 |