• No results found

Content-Based Watermarking for Image Authentication Using Independent Component Analysis

N/A
N/A
Protected

Academic year: 2020

Share "Content-Based Watermarking for Image Authentication Using Independent Component Analysis"

Copied!
8
0
0

Loading.... (view fulltext now)

Full text

Loading

Figure

Figure  1:      Images  after  watermarking  using  the  ICA  technique.
Figure 2:  Robustness of ICA-based technique after  incidental image processing
Table  4:  Results  after  intentional  tamper  of  Lena  using  ICA    Locations of  tamper    Blocks  identified    as tampered    Percentage   difference of  tampered blocks    Top    (1,1) and (1,  2)    55 and36    Hat    (3, 18),  (3,  19),    and (3

References

Related documents

Proprietary Schools are referred to as those classified nonpublic, which sell or offer for sale mostly post- secondary instruction which leads to an occupation..

• Follow up with your employer each reporting period to ensure your hours are reported on a regular basis?. • Discuss your progress with

Field experiments were conducted at Ebonyi State University Research Farm during 2009 and 2010 farming seasons to evaluate the effect of intercropping maize with

Results suggest that the probability of under-educated employment is higher among low skilled recent migrants and that the over-education risk is higher among high skilled

4.1 The Select Committee is asked to consider the proposed development of the Customer Service Function, the recommended service delivery option and the investment required8. It

The corona radiata consists of one or more layers of follicular cells that surround the zona pellucida, the polar body, and the secondary oocyte.. The corona radiata is dispersed

National Conference on Technical Vocational Education, Training and Skills Development: A Roadmap for Empowerment (Dec. 2008): Ministry of Human Resource Development, Department