Proceedings International Conference on Information Technology: Coding and Computing
DOI: 10.1109/itcc.2001.918766
|View full text |Cite
|
Sign up to set email alerts
|

Hologram watermarks for document authentications

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
6
0

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 12 publications
(6 citation statements)
references
References 3 publications
0
6
0
Order By: Relevance
“…This figure shows as the Fragile Image Watermarking by Computer Generated Holograms method can be applied either to Gray Scale hosting image, or to RGB Color one, working on each color channel. Different procedures to create and insert holographic watermarking can be found in literature [11][12][13][14][15]. The proposed one has the advantage to be a fragile watermarking schema more performing, due to the high quality of the inserted synthetic hologram.…”
Section: Watermarking Technique -Cgh Insertion Proceduresmentioning
confidence: 99%
See 1 more Smart Citation
“…This figure shows as the Fragile Image Watermarking by Computer Generated Holograms method can be applied either to Gray Scale hosting image, or to RGB Color one, working on each color channel. Different procedures to create and insert holographic watermarking can be found in literature [11][12][13][14][15]. The proposed one has the advantage to be a fragile watermarking schema more performing, due to the high quality of the inserted synthetic hologram.…”
Section: Watermarking Technique -Cgh Insertion Proceduresmentioning
confidence: 99%
“…In the first case, a JPEG compression will not affect the perception of the image, whereas in the second case it may discard some of the fine details which would render the image totally useless. Recently many authors have proposed Computer Generated Hologram Watermarking (CGH Watermarking) [11][12][13][14][15]. From this works emerge of potentiality about the possibility to use the CGH watermarking as fragile watermarking for images authentication [16,17].…”
Section: Introductionmentioning
confidence: 99%
“…We made this manipulation to simulate an off-axis holography. It is not within the scope of this paper to explain the realization of such a type of CGH, for which references can be found in the literature [8][9][10][11][12][13][14].…”
Section: Content Fragile Watermarking Based On Computer Generated Holmentioning
confidence: 99%
“…They have to make sure that their trademark is adequately protected against the menace. A myriad of technologies [1], such as holograms [2], RFID [3]- [5] ou NFC tags [6], [7], biometric markers or inks [8],. .…”
Section: Introduction and State Of Artmentioning
confidence: 99%