2006
DOI: 10.1007/11833529_82
|View full text |Cite
|
Sign up to set email alerts
|

A Novel Steganographic Technique Based on Image Morphing

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
18
0

Year Published

2011
2011
2014
2014

Publication Types

Select...
5
1

Relationship

3
3

Authors

Journals

citations
Cited by 13 publications
(18 citation statements)
references
References 6 publications
0
18
0
Order By: Relevance
“…This technology has been used mainly for producing moving pictures. In our study, we use it for hiding the face image of the true card holder [9].…”
Section: B Image Morphingmentioning
confidence: 99%
See 3 more Smart Citations
“…This technology has been used mainly for producing moving pictures. In our study, we use it for hiding the face image of the true card holder [9].…”
Section: B Image Morphingmentioning
confidence: 99%
“…In the l terminal with a pose that the key lows: (1) The user shows the card to the (2) The card and the terminal auth (3) If the authentication fails, stop (1) The terminal encrypts the card information and the public key public key of the server, and s (4) The server decrypts the data r and authenticates the card as w (5) If the authentication fails, stop (6) The server encrypts K 3 -K 5 and and K 2 using the public key o to the terminal; (7) The terminal decrypts the info server using its private key; the encrypted K 2 from its own memory, and decrypts them using the key obtained from the server. (9) The terminal restores the original face image, and shows it on the screen.…”
Section: Card User Authentication Based On Imagementioning
confidence: 99%
See 2 more Smart Citations
“…Most of materials presented here have been published in (Hsieh et al, 2008;Hsieh et al, 2010;Kondo and Zhao, 2006). Apparently, image enhancement, image morphing, and image hiding are completely different technologies for different applications, they can actually be unified under the core of LIF, and this unification can be helpful in other related researches.…”
Section: Introductionmentioning
confidence: 99%