Sunday, December 1, 2013

Multimedia Forensics

6:49 PM


This publication describes techniques and theories involved in binary image AW. The authentication of  binary  images is necessary in practice because most of scanned and computer-generated document images are binary. These documents must be protected against fraudulent alterations and impersonations. one or non-halftone. Halftone images are binary representations of grayscale images. Halftoning techniques simulate  shades of gray by scat-tering proper amounts of black and white pixels. 


On the other hand, non-halftone binary images may be composed of characters, drawings, schematics, diagrams, cartoons, equations, and so forth. In many cases, a watermarking algorithm developed for  halftone images cannot be applied to non-halftone images and vice versa. DH or steganography is a technique used to embed a sequence of bits in a cover image with small visual deterioration and the means to extract it afterwards. Most DH techniques in the literature are designed for grayscale and color images and they cannot be directly applied to binary images. Many of continuous-tone DHs modify the quantization index (Chen& Wornell, 2001)

Written by

We are Creative Blogger Theme Wavers which provides user friendly, effective and easy to use themes. Each support has free and providing HD support screen casting.

0 comments:

Post a Comment

 

© 2013 Personal Computers. All rights resevered. Designed by Templateism

Back To Top