Techniques for content-based graph authentication
2001
In addition to images and text, more and more documents use graphs for system and idea illustration. Compared to grayscale images, graphs are more difficult to watermark because of their binary nature. We propose two methodologies for digital graph authentication, at the object and pixel levels, that detect and localize alterations.
Keywords:
- Correction
- Source
- Cite
- Save
- Machine Reading By IdeaReader
12
References
4
Citations
NaN
KQI