An optimized hierarchical encryption technique for tamper recognition.
Sudharshan ChakravarthyMadhav Anand JagannathanJ. Jennifer RanjaniBalamurugan BaluswamySeifedine Nimer KadryPublished in: Multim. Tools Appl. (2019)
Keyphrases
- recognition rate
- recognition accuracy
- object recognition
- pattern recognition
- feature extraction
- security properties
- recognition process
- recognition algorithm
- visual recognition
- image authentication
- handwritten characters
- automatic recognition
- image recognition
- action recognition
- character recognition
- human activities
- secret key
- digital watermarking
- jpeg images
- unsupervised learning
- multiresolution
- computer vision