This Article 
   
 Share 
   
 Bibliographic References 
   
 Add to: 
 
Digg
Furl
Spurl
Blink
Simpy
Google
Del.icio.us
Y!MyWeb
 
 Search 
   
Techniques for Content-Based Graph Authentication
October-December 2001 (vol. 8 no. 4)
pp. 38-45

In addition to images and text, more and more documents use graphs for system and idea illustration. Compared to gray-scale images, graphs are more difficult to watermark because of their binary nature. We propose two methodologies for digital graph authentication, at the object and pixel levels, that detect and localize alterations.

Citation:
Heather Yu, Xiangyang Kong, Wayne Wolf, "Techniques for Content-Based Graph Authentication," IEEE Multimedia, vol. 8, no. 4, pp. 38-45, Oct.-Dec. 2001, doi:10.1109/93.959101
Usage of this product signifies your acceptance of the Terms of Use.