Authentication for document management

The advancement in digital technology and multimedia has made it easy to duplicate, manipulate and illegally distribute the multimedia content. In addition, it is easy to forge an image with the availability of the powerful image editing software and digital cameras. In this report, we present fi...

Full description

Saved in:
Bibliographic Details
Main Author: Kot, Alex Chichung.
Other Authors: School of Electrical and Electronic Engineering
Format: Research Report
Language:English
Published: 2008
Subjects:
Online Access:http://hdl.handle.net/10356/14532
Tags: Add Tag
No Tags, Be the first to tag this record!
Institution: Nanyang Technological University
Language: English
id sg-ntu-dr.10356-14532
record_format dspace
spelling sg-ntu-dr.10356-145322023-03-04T03:21:58Z Authentication for document management Kot, Alex Chichung. School of Electrical and Electronic Engineering DRNTU::Engineering::Electrical and electronic engineering::Electronic systems::Signal processing The advancement in digital technology and multimedia has made it easy to duplicate, manipulate and illegally distribute the multimedia content. In addition, it is easy to forge an image with the availability of the powerful image editing software and digital cameras. In this report, we present five data hiding techniques for binary images authentication and tampering localization. In addition, to accurately evaluate the amount of distortions caused by flipping pixels in binary images, we propose an objective distortion measure. Ensuring the authenticity and integrity facilitates the management of digital documents. The relationship of two typical type of data hiding methods, i.e., pixel pattern and key-weight methods are discussed. Finally, two steganalysis methods to detect data hiding on binary cartoon and text images are presented such that secret communication can be monitored. 2008-11-27T05:52:45Z 2008-11-27T05:52:45Z 2006 2006 Research Report http://hdl.handle.net/10356/14532 en 194 p. application/pdf
institution Nanyang Technological University
building NTU Library
continent Asia
country Singapore
Singapore
content_provider NTU Library
collection DR-NTU
language English
topic DRNTU::Engineering::Electrical and electronic engineering::Electronic systems::Signal processing
spellingShingle DRNTU::Engineering::Electrical and electronic engineering::Electronic systems::Signal processing
Kot, Alex Chichung.
Authentication for document management
description The advancement in digital technology and multimedia has made it easy to duplicate, manipulate and illegally distribute the multimedia content. In addition, it is easy to forge an image with the availability of the powerful image editing software and digital cameras. In this report, we present five data hiding techniques for binary images authentication and tampering localization. In addition, to accurately evaluate the amount of distortions caused by flipping pixels in binary images, we propose an objective distortion measure. Ensuring the authenticity and integrity facilitates the management of digital documents. The relationship of two typical type of data hiding methods, i.e., pixel pattern and key-weight methods are discussed. Finally, two steganalysis methods to detect data hiding on binary cartoon and text images are presented such that secret communication can be monitored.
author2 School of Electrical and Electronic Engineering
author_facet School of Electrical and Electronic Engineering
Kot, Alex Chichung.
format Research Report
author Kot, Alex Chichung.
author_sort Kot, Alex Chichung.
title Authentication for document management
title_short Authentication for document management
title_full Authentication for document management
title_fullStr Authentication for document management
title_full_unstemmed Authentication for document management
title_sort authentication for document management
publishDate 2008
url http://hdl.handle.net/10356/14532
_version_ 1759855267773677568