-
1
-
-
0034765589
-
Invertible authentication
-
San Jose, Calif, USA, January
-
J. Fridrich, M. Goljan, and R. Du, "Invertible authentication," in Proc. SPIE Conf. Security and Watermarking of Multimedia Contents III, vol. 4314, pp. 197-208, San Jose, Calif, USA, January 2001.
-
(2001)
Proc. SPIE Conf. Security and Watermarking of Multimedia Contents III
, vol.4314
, pp. 197-208
-
-
Fridrich, J.1
Goljan, M.2
Du, R.3
-
2
-
-
0012776033
-
Strict integrity control of biomedical images
-
G. Coatrieux, B. Sankur, and H. Maître, "Strict integrity control of biomedical images," in Security and Watermarking of Multimedia Contents III, vol. 4314 of SPIE Proceedings, San Jose, Calif, USA, January 2001.
-
Security and Watermarking of Multimedia Contents III, Vol. 4314 of SPIE Proceedings, San Jose, Calif, USA, January 2001
-
-
Coatrieux, G.1
Sankur, B.2
Maître, H.3
-
3
-
-
0032292342
-
Watermarking for image authentication
-
Chicago, Ill, USA, October
-
M. Wu and B. Liu, "Watermarking for image authentication," in Proc. IEEE International Conference on Image Processing, vol. 2, pp. 437-441, Chicago, Ill, USA, October 1998.
-
(1998)
Proc. IEEE International Conference on Image Processing
, vol.2
, pp. 437-441
-
-
Wu, M.1
Liu, B.2
-
4
-
-
0033688392
-
Semi-fragile watermarking for authenticating JPEG visual content
-
San Jose, Calif, USA, January
-
C.-Y. Lin and S.-F. Chang, "Semi-fragile watermarking for authenticating JPEG visual content," in Proc. SPIE International Conf. on Security and Watermarking of Multimedia Contents II, vol. 3971, San Jose, Calif, USA, January 2000.
-
(2000)
Proc. SPIE International Conf. on Security and Watermarking of Multimedia Contents II
, vol.3971
-
-
Lin, C.-Y.1
Chang, S.-F.2
-
5
-
-
0003629991
-
Secure hash standard (SHS)
-
SHA-1; specification (FIPS 180-1), April
-
SHA-1, "Secure hash standard (SHS)," specification (FIPS 180-1), April 1995, http://www.itl.nist.gov/fipspubs/fip180-1.htm.
-
(1995)
-
-
-
6
-
-
0032308292
-
Compression tolerant image authentication
-
Chicago, Ill, USA, October
-
S. Bhattacharjee and M. Kutter, "Compression tolerant image authentication," in Proc. 5th IEEE International Conference on Image Processing (ICIP '98), pp. 435-439, Chicago, Ill, USA, October 1998.
-
(1998)
Proc. 5th IEEE International Conference on Image Processing (ICIP '98)
, pp. 435-439
-
-
Bhattacharjee, S.1
Kutter, M.2
-
7
-
-
6344278566
-
Generating robust digital signature for image/video authentication
-
C.-Y. Lin and S.-F. Chang, "Generating robust digital signature for image/video authentication," in Proc. Multimedia and Security Workshop at ACM Multimedia '98, Bristol, UK, September 1998.
-
Proc. Multimedia and Security Workshop at ACM Multimedia '98, Bristol, UK, September 1998
-
-
Lin, C.-Y.1
Chang, S.-F.2
-
8
-
-
0032223822
-
A robust image authentication method surviving JPEG lossy compression
-
San Jose, Calif, USA, January
-
C.-Y. Lin and S.-F. Chang, "A robust image authentication method surviving JPEG lossy compression," in Proc. SPIE Storage and Retrieval of Image/Video Database, vol. 3312, pp. 296-307, San Jose, Calif, USA, January 1998.
-
(1998)
Proc. SPIE Storage and Retrieval of Image/Video Database
, vol.3312
, pp. 296-307
-
-
Lin, C.-Y.1
Chang, S.-F.2
-
9
-
-
0030387424
-
A watermark for digital images
-
Lausanne, Switzerland, September
-
R. B. Wolfgang and E. J. Delp, "A watermark for digital images," in Proc. 1996 IEEE International Conference on Image Processing, vol. 3, pp. 219-222, Lausanne, Switzerland, September 1996.
-
(1996)
Proc. 1996 IEEE International Conference on Image Processing
, vol.3
, pp. 219-222
-
-
Wolfgang, R.B.1
Delp, E.J.2
-
10
-
-
0001890905
-
Fragile watermarking using the VW2D watermark
-
San Jose, Calif, USA, January
-
R. B. Wolfgang and E. J. Delp, "Fragile watermarking using the VW2D watermark," in Security and Watermarking of Multimedia Contents, vol. 3657 of SPIE Proceedings, pp. 40-51, San Jose, Calif, USA, January 1999.
-
(1999)
Security and Watermarking of Multimedia Contents, Vol. 3657 of SPIE Proceedings
, pp. 40-51
-
-
Wolfgang, R.B.1
Delp, E.J.2
-
11
-
-
0031378592
-
An invisible watermarking technique for image verification
-
Santa Barbara, Calif, USA, October
-
M. M. Yeung and F. Mintzer, "An invisible watermarking technique for image verification," in Proc. IEEE International Conference on Image Processing, vol. 2, pp. 680-683, Santa Barbara, Calif, USA, October 1997.
-
(1997)
Proc. IEEE International Conference on Image Processing
, pp. 680-683
-
-
Yeung, M.M.1
Mintzer, F.2
-
12
-
-
0029292158
-
Information authentification for a slippery new age
-
S. Walton, "Information authentification for a slippery new age," Dr. Dobbs Journal, vol. 20, no. 4, pp. 18-26, 1995.
-
(1995)
Dr. Dobbs Journal
, vol.20
, Issue.4
, pp. 18-26
-
-
Walton, S.1
-
13
-
-
0032667318
-
Robust bit extraction form images
-
Florence, Italy, June
-
J. Fridrich, "Robust bit extraction form images," in Proc. IEEE International Conference on Multimedia Computing and Systems, vol. 2, pp. 536-540, Florence, Italy, June 1999.
-
(1999)
Proc. IEEE International Conference on Multimedia Computing and Systems
, vol.2
, pp. 536-540
-
-
Fridrich, J.1
-
14
-
-
0038324638
-
Protection of digital images using self embedding
-
J. Fridrich and M. Goljan, "Protection of digital images using self embedding," in Symposium on Content Security and Data Hiding in Digital Media, New Jersey Institute of Technology, Newark, NJ, USA, May 1999.
-
Symposium on Content Security and Data Hiding in Digital Media, New Jersey Institute of Technology, Newark, NJ, USA, May 1999
-
-
Fridrich, J.1
Goljan, M.2
-
15
-
-
84997769409
-
A digital watermark
-
Austin, Texas, USA, November
-
R. G. Van Schyndel, A. Z. Tirkel, and C. F. Osborne, "A digital watermark," in Proc. IEEE International Conference on Image Processing, vol. 2, pp. 86-90, Austin, Texas, USA, November 1994.
-
(1994)
Proc. IEEE International Conference on Image Processing
, vol.2
, pp. 86-90
-
-
Van Schyndel, R.G.1
Tirkel, A.Z.2
Osborne, C.F.3
-
16
-
-
0004082156
-
-
McGraw-Hill, New York, NY, USA, 3rd edition
-
J. G. Proakis, Digital Communications, McGraw-Hill, New York, NY, USA, 3rd edition, 1995.
-
(1995)
Digital Communications
-
-
Proakis, J.G.1
-
17
-
-
0032292847
-
Image watermarking for tamper detection
-
Chicago, Ill, USA, October
-
J. Fridrich, "Image watermarking for tamper detection," in Proc. IEEE International Conference on Image Processing, vol. 2, pp. 404-408, Chicago, Ill, USA, October 1998.
-
(1998)
Proc. IEEE International Conference on Image Processing
, vol.2
, pp. 404-408
-
-
Fridrich, J.1
-
18
-
-
0012776034
-
Methods for detecting changes in digital images
-
J. Fridrich, "Methods for detecting changes in digital images," in Proc. IEEE International Conference on Image Processing, Chicago, Ill, USA, October 1998.
-
Proc. IEEE International Conference on Image Processing, Chicago, Ill, USA, October 1998
-
-
Fridrich, J.1
-
19
-
-
0031365813
-
Rotation, scale and translation invariant digital image watermarking
-
Santa Barbara, Calif, USA, October
-
J. J. K. Ó Ruanaidh and T. Pun, "Rotation, scale and translation invariant digital image watermarking," in Proc. IEEE International Conference on Image Processing, vol. 1, pp. 536-539, Santa Barbara, Calif, USA, October 1997.
-
(1997)
Proc. IEEE International Conference on Image Processing
, vol.1
, pp. 536-539
-
-
Ó Ruanaidh, J.J.K.1
Pun, T.2
-
20
-
-
0012834246
-
Process for marking a multimedia document, such an image, by generating mark
-
Pending patent EP 99480075.3, EUROCOM 11/12 EP, July
-
J.-L. Dugelay and S. Roche, "Process for marking a multimedia document, such an image, by generating mark," Pending patent EP 99480075.3, EUROCOM 11/12 EP, July 1999.
-
(1999)
-
-
Dugelay, J.-L.1
Roche, S.2
-
21
-
-
6344232028
-
Blind detection of malicious alterations on still images using robust watermarks
-
IEE Electronics & Communications, London, UK
-
C. Rey and J.-L. Dugelay, "Blind detection of malicious alterations on still images using robust watermarks," in Secure Images and Image Authentication Colloquium, IEE Electronics & Communications, London, UK, 2000.
-
(2000)
Secure Images and Image Authentication Colloquium
-
-
Rey, C.1
Dugelay, J.-L.2
-
22
-
-
0032304995
-
Towards a telltale watermarking technique for tamper-proofing
-
Chicago, Ill, USA, October
-
D. Kundur and D. Hatzinakos, "Towards a telltale watermarking technique for Tamper-Proofing," in Proc. IEEE International Conference on Image Processing, vol. 2, pp. 409-413, Chicago, Ill, USA, October 1998.
-
(1998)
Proc. IEEE International Conference on Image Processing
, vol.2
, pp. 409-413
-
-
Kundur, D.1
Hatzinakos, D.2
-
23
-
-
0003973117
-
A watermark-based robust image authentication method using wavelets
-
ADVENT project report, Columbia University, April
-
C.-Y. Lin and S.-F. Chang, "A watermark-based robust image authentication method using wavelets," ADVENT project report, Columbia University, April 1998.
-
(1998)
-
-
Lin, C.-Y.1
Chang, S.-F.2
-
24
-
-
1542273324
-
A watermark for image integrity and ownership verification
-
Savana, Ga, USA, April
-
P. Wong, "A watermark for image integrity and ownership verification," in Proc. Final Program and Proceedings of the IS&T PICS 99, pp. 374-379, Savana, Ga, USA, April 1999.
-
(1999)
Proc. Final Program and Proceedings of the IS&T PICS 99
, pp. 374-379
-
-
Wong, P.1
-
25
-
-
85007375266
-
Towards robust, content based techniques for image authentication
-
Los Angeles, Calif, USA, December
-
M. P. Queluz, "Towards robust, content based techniques for image authentication," in Proc. IEEE Signal Processing Society 1998 Workshop on Multimedia Signal Processing, pp. 297-302, Los Angeles, Calif, USA, December 1998.
-
(1998)
Proc. IEEE Signal Processing Society 1998 Workshop on Multimedia Signal Processing
, pp. 297-302
-
-
Queluz, M.P.1
-
26
-
-
0033703669
-
Further attacks on Yeung-Mintzer fragile watermarking scheme
-
J. Fridrich, M. Goljan, and N. Memon, "Further attacks on Yeung-Mintzer fragile watermarking scheme," in Security and Watermarking of Multimedia Contents II, vol. 3971 of SPIE Proceedings, San Jose, Calif, USA, January 2000.
-
Security and Watermarking of Multimedia Contents II, Vol. 3971 of SPIE Proceedings, San Jose, Calif, USA, January 2000
-
-
Fridrich, J.1
Goljan, M.2
Memon, N.3
-
27
-
-
0035163017
-
On the security of the SARI image authentication system
-
R. Radhakrishnan and N. Memon, "On the security of the SARI image authentication system," in Proc. IEEE International Conference on Image Processing (ICIP01), Thessaloniki, Greece, October 2001.
-
Proc. IEEE International Conference on Image Processing (ICIP01), Thessaloniki, Greece, October 2001
-
-
Radhakrishnan, R.1
Memon, N.2
-
28
-
-
0034787545
-
SARI: Self-authentication-and-recovery image watermarking system
-
C.-Y. Lin and S.-F. Chang, "SARI: Self-authentication-and-recovery image watermarking system," in Proc. 9th ACM International Conference on Multimedia, Ottawa, Canada, 30 September-5 October 2001.
-
Proc. 9th ACM International Conference on Multimedia, Ottawa, Canada, 30 September-5 October 2001
-
-
Lin, C.-Y.1
Chang, S.-F.2
-
29
-
-
0034774708
-
Information theoretic approach to the authentication of multimedia
-
San Jose, Calif, USA, January
-
E. Martinian, B. Chen, and G. W. Wornell, "Information theoretic approach to the authentication of multimedia," in Proc. SPIE Conf. Security and Watermarking of Multimedia Contents III, vol. 4314, pp. 185-196, San Jose, Calif, USA, January 2001.
-
(2001)
Proc. SPIE Conf. Security and Watermarking of Multimedia Contents III
, vol.4314
, pp. 185-196
-
-
Martinian, E.1
Chen, B.2
Wornell, G.W.3
-
30
-
-
0012830907
-
RNRT-AQUAMARS
-
National French project
-
"RNRT-AQUAMARS," National French project (1999-2001), http://www.telecom.gouv.fr/rnrt/wprojets.htm.
-
(1999)
-
-
-
31
-
-
0034440696
-
Image watermarking for owner and content authentication
-
C. Rey and J.-L. Dugelay, "Image watermarking for owner and content authentication," in Proc. ACM Multimedia Technical Demonstration, Los Angeles, Calif, USA, November 2000.
-
Proc. ACM Multimedia Technical Demonstration, Los Angeles, Calif, USA, November 2000
-
-
Rey, C.1
Dugelay, J.-L.2
-
32
-
-
84889084005
-
Understanding and integrating KODAK picture authentication cameras
-
Kodak; White paper
-
Kodak, "Understanding and integrating KODAK picture authentication cameras," http://www.kodak.com/US/en/digital/software/imageAuthentication/ White paper.
-
-
-
|