Authentication for document management
The advancement in digital technology and multimedia has made it easy to duplicate, manipulate and illegally distribute the multimedia content. In addition, it is easy to forge an image with the availability of the powerful image editing software and digital cameras. In this report, we present fi...
Saved in:
Main Author: | Kot, Alex Chichung. |
---|---|
Other Authors: | School of Electrical and Electronic Engineering |
Format: | Research Report |
Language: | English |
Published: |
2008
|
Subjects: | |
Online Access: | http://hdl.handle.net/10356/14532 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | Nanyang Technological University |
Language: | English |
Similar Items
-
Suppression of interference in spread-spectrum systems using signal processing techniques
by: Kot, Alex Chichung.
Published: (2008) -
Secure fingerprint authentication
by: Lim, Wen Jun.
Published: (2010) -
Document image processing
by: Chan, Kap Luk, et al.
Published: (2008) -
Document image segmentation and classification
by: Chang, Kim Wah.
Published: (2009) -
Data hiding for authentication of binary images
by: Yang, Huijuan
Published: (2008)