VLSI architecture and FPGA prototyping of a digital camera for image security and authentication

Author(s):  
Oluwayomi Adamo ◽  
Saraju P. Mohanty ◽  
Elias Kougianos ◽  
Murali Varanasi ◽  
Wei Cai
2002 ◽  
Vol 12 (4) ◽  
pp. 145-146
Author(s):  
Steven C. Chang
Keyword(s):  

2019 ◽  
Vol 2019 (1) ◽  
pp. 80-85
Author(s):  
Pooshpanjan Roy Biswas ◽  
Alessandro Beltrami ◽  
Joan Saez Gomez

To reproduce colors in one system which differs from another system in terms of the color gamut, it is necessary to use a color gamut mapping process. This color gamut mapping is a method to translate a specific color from a medium (screen, digital camera, scanner, digital file, etc) into another system having a difference in gamut volume. There are different rendering intent options defined by the International Color Consortium [5] to use the different reproduction goals of the user [19]. Any rendering intent used to reproduce colors, includes profile engine decisions to do it, i.e. looking for color accuracy, vivid colors or pleasing reproduction of images. Using the same decisions on different profile engines, the final visual output can look different (more than one Just Noticeable Difference[16]) depending on the profile engine used and the color algorithms that they implement. Profile performance substantially depends on the profiler engine used to create them. Different profilers provide the user with varying levels of liberty to design a profile for their color management needs and preference. The motivation of this study is to rank the performance of various market leading profiler engines on the basis of different metrics designed specifically to report the performance of particular aspects of these profiles. The study helped us take valuable decisions regarding profile performance without any visual assessment to decide on the best profiler engine.


Author(s):  
Ali Saleh Al Najjar

Absolute protection is a difficult issue to maintain the confidentiality of images through their transmission over open channels such as internet or networks and is a major concern in the media, so image Cryptography becomes an area of attraction and interest of research in the field of information security. The paper will offer proposed system that provides a special kinds of image Encryption image security, Cryptography using RSA algorithm for encrypted images by HEX function to extract HEX Code and using RSA public key algorithm, to generate cipher image text. This approach provides high security and it will be suitable for secured transmission of images over the networks or Internet.


2019 ◽  
Vol 4 (3) ◽  
pp. 365-374
Author(s):  
Edy Purwanto ◽  
Aryo Wibisono

This study aims to test the influence of country of origin image and word of mouth on perceived quality. Then, the country of origin image and word of mouth and perceived quality on purchase intention of digital camera from Japan. The number of samples in this research are 230 respondents taken by purposive sampling method. Analysis of Structural Equation Modeling (SEM) is used to test the hypothesis. The results of this study showed that country of origin image and word of mouth have a positive and significant effect on perceived quality. Then, Word of mouth and perceived quality have a positive and significant effect on purchase intention but a country of origin image has no significant effect on purchase intention. 


Sign in / Sign up

Export Citation Format

Share Document