-
1
-
-
0035927557
-
Efficient and robust water-marking algorithm with vector quantisation
-
(June)
-
H. C. Huang, F. H. Wang, and J. S. Pan, "Efficient and robust water-marking algorithm with vector quantisation," Electron. Lett. 37(13), 826-828 (June 2001).
-
(2001)
Electron. Lett.
, vol.37
, Issue.13
, pp. 826-828
-
-
Huang, H.C.1
Wang, F.H.2
Pan, J.S.3
-
2
-
-
0034442841
-
Efficient detection of a spatial spread-spectrum watermark in MPEG vedio streams
-
T. Kalker and J. Haitsma, "Efficient detection of a spatial spread-spectrum watermark in MPEG vedio streams," Proc. IEEE Int. Conf. Image Process. 1, 434-437 (2000).
-
(2000)
Proc. IEEE Int. Conf. Image Process.
, vol.1
, pp. 434-437
-
-
Kalker, T.1
Haitsma, J.2
-
3
-
-
0034483631
-
Cocktail water-marking for digital image protection
-
C. S. Lu, S. K. Huang, C. J. Sze, and H. Y. Liao, "Cocktail water-marking for digital image protection," IEEE Trans. Multimedia 2(4), (2000).
-
(2000)
IEEE Trans. Multimedia
, vol.2
, Issue.4
-
-
Lu, C.S.1
Huang, S.K.2
Sze, C.J.3
Liao, H.Y.4
-
4
-
-
0032223822
-
A robust image authentication method surviving JPEG lossy compression
-
C. Y. Lin and S. F. Chang, "A robust image authentication method surviving JPEG lossy compression," Proc. SPIE 3312, 296-307 (1998).
-
(1998)
Proc. SPIE
, vol.3312
, pp. 296-307
-
-
Lin, C.Y.1
Chang, S.F.2
-
5
-
-
0035509773
-
A class of authentication digital watermarks for secure multimedia communication
-
L. Xie and G. R. Arce, "A class of authentication digital watermarks for secure multimedia communication," IEEE Trans. Image Process. 10(11), 1754-1764 (2001).
-
(2001)
IEEE Trans. Image Process.
, vol.10
, Issue.11
, pp. 1754-1764
-
-
Xie, L.1
Arce, G.R.2
-
6
-
-
0035169533
-
Toward a secure public-key blockwise fragile authentication watermarking
-
P. S. L. M. Barreto, H. Y. Kim, and V. Rijmen, "Toward a secure public-key blockwise fragile authentication watermarking," Proc. IEEE Intl. Conf. Image Process. 2, 494-497 (2001).
-
(2001)
Proc. IEEE Intl. Conf. Image Process.
, vol.2
, pp. 494-497
-
-
Barreto, P.S.L.M.1
Kim, H.Y.2
Rijmen, V.3
-
7
-
-
0034443602
-
New fragile authentication watermark for images
-
J. Fridrich, M. Goljan, and A. C. Baldoza, "New fragile authentication watermark for images," Proc. IEEE Int. Conf. Image Process. 1, 446-449 (2000).
-
(2000)
Proc. IEEE Int. Conf. Image Process.
, vol.1
, pp. 446-449
-
-
Fridrich, J.1
Goljan, M.2
Baldoza, A.C.3
-
8
-
-
0034442403
-
Image authenticity and integrity verification via content-based watermarks and a public key cryptosystem
-
C. T. Li, D. C. Lou, and T. H. Chen, "Image authenticity and integrity verification via content-based watermarks and a public key cryptosystem," Proc. IEEE Int. Conf. Image Process. 3, 694-697 (2000).
-
(2000)
Proc. IEEE Int. Conf. Image Process.
, vol.3
, pp. 694-697
-
-
Li, C.T.1
Lou, D.C.2
Chen, T.H.3
-
9
-
-
0031378592
-
An invisible watermarking technique for image verification
-
M. Yeung and F. Minzter, "An invisible watermarking technique for image verification," Proc. IEEE Intl. Conf. Image Process. 1, 680-683 (1997).
-
(1997)
Proc. IEEE Intl. Conf. Image Process.
, vol.1
, pp. 680-683
-
-
Yeung, M.1
Minzter, F.2
-
10
-
-
0033682895
-
Secret and public key authentication watermarking schemes that resist vector quantization attack
-
P. W. Wong and N. Memom, "Secret and public key authentication watermarking schemes that resist vector quantization attack," Proc. SPIE 3971, 417-427 (2000).
-
(2000)
Proc. SPIE
, vol.3971
, pp. 417-427
-
-
Wong, P.W.1
Memom, N.2
-
11
-
-
29144534942
-
Futhur attack on Yeung-Mintzer watermarking scheme
-
J. Fridrich, M. Goljan, and N. Memom, "Futhur attack on Yeung-Mintzer watermarking scheme," Proc. SPIE, (2000).
-
(2000)
Proc. SPIE
-
-
Fridrich, J.1
Goljan, M.2
Memom, N.3
-
12
-
-
0033872149
-
Counterfeiting attacks on oblivious block-wise independent invisible watermarking schemes
-
(Mar.)
-
M. Holliman and N. Memon, "Counterfeiting attacks on oblivious block-wise independent invisible watermarking schemes," IEEE Trans. Image Process. 9, 432-441 (Mar. 2000).
-
(2000)
IEEE Trans. Image Process.
, vol.9
, pp. 432-441
-
-
Holliman, M.1
Memon, N.2
-
14
-
-
1542363253
-
On the security of the Yeung-Mintzer authentication watermark
-
(March)
-
N. Memon, S. Shende, and P. W. Wong, "On the security of the Yeung-Mintzer authentication watermark," Proc. IS & T PICS Symp., Savannah, Georgia (March 1999).
-
(1999)
Proc. IS & T PICS Symp., Savannah, Georgia
-
-
Memon, N.1
Shende, S.2
Wong, P.W.3
-
15
-
-
0032312612
-
A public key watermark for image verification and authentication
-
P. W. Wong, "A public key watermark for image verification and authentication," Proc. IEEE Intl. Conf. Image Process. 1, 455-459 (1998).
-
(1998)
Proc. IEEE Intl. Conf. Image Process.
, vol.1
, pp. 455-459
-
-
Wong, P.W.1
-
16
-
-
0017930809
-
A method for obtaining digital signatures and public key cryptosystems
-
R. L. Rivest, A. Shamir, and L. Adleman, "A method for obtaining digital signatures and public key cryptosystems," Commun. ACM 21, 120-126 (1978).
-
(1978)
Commun. ACM
, vol.21
, pp. 120-126
-
-
Rivest, R.L.1
Shamir, A.2
Adleman, L.3
-
17
-
-
0035159824
-
A hierarchical image authentication watermark with improved localization and security
-
M. U. Celik, G. Sharma, E. Saber, and A. M. Tekalp, "A hierarchical image authentication watermark with improved localization and security," Proc. IEEE Int. Conf. Image Process. 2, 502-505 (2001).
-
(2001)
Proc. IEEE Int. Conf. Image Process.
, vol.2
, pp. 502-505
-
-
Celik, M.U.1
Sharma, G.2
Saber, E.3
Tekalp, A.M.4
-
18
-
-
0033601660
-
Fragile imperceptible digital watermark with privacy control
-
D. Coppersmith, F. Mintzer, C. Tresser, C. W. Wu, and M. Yeung, "Fragile imperceptible digital watermark with privacy control," Proc. SPIE 3657, 79-84 (1999).
-
(1999)
Proc. SPIE
, vol.3657
, pp. 79-84
-
-
Coppersmith, D.1
Mintzer, F.2
Tresser, C.3
Wu, C.W.4
Yeung, M.5
|