Techniques for content-based graph authentication

2001 
In addition to images and text, more and more documents use graphs for system and idea illustration. Compared to grayscale images, graphs are more difficult to watermark because of their binary nature. We propose two methodologies for digital graph authentication, at the object and pixel levels, that detect and localize alterations.
    • Correction
    • Source
    • Cite
    • Save
    • Machine Reading By IdeaReader
    12
    References
    4
    Citations
    NaN
    KQI
    []