Yeung - Yeu n g , P a n k a n t i 1 9 9 9 :

Info iconThis preview shows pages 1–2. Sign up to view the full content.

View Full Document Right Arrow Icon
Yeu n g ,   P a n k a n t i 1 9 9 9
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
•Use fragilewatermarking (if the image is altered,  watermark is changed) of fingerprint images to verify  integrity: •The decoded mark can indicate image alteration after it  has been marked by an authorized agent (i.e., a secure  sensor) •Watermark insertion: Merge input image I(i,j) with a  watermark image W(i,j) to produce the watermarked  image I’(i,j): •Each pixel is input to a watermark extraction WX()  function to yield extracted watermark value b(i,j). If b(i,j) is 
Background image of page 2
This is the end of the preview. Sign up to access the rest of the document.

This document was uploaded on 11/03/2011 for the course BIOLOGY BSC1105 at Broward College.

Page1 / 2

Yeung - Yeu n g , P a n k a n t i 1 9 9 9 :

This preview shows document pages 1 - 2. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online