-
1
-
-
0036709226
-
Geometrically invariant watermarking using feature points
-
P. Bas, J. M. Chassery, and B. Macq, "Geometrically invariant watermarking using feature points," IEEE Trans. Image Processing, Vol. 11, pp. 1014-1028, 2002.
-
(2002)
IEEE Trans. Image Processing
, vol.11
, pp. 1014-1028
-
-
Bas, P.1
Chassery, J.M.2
Macq, B.3
-
2
-
-
0037734214
-
RIME: A replicated image detector for the World-Wide-Web
-
E. Y. Chang, J. Z. Wang, C. Li, and G. Wiederhold, "RIME: A Replicated Image Detector for the World-Wide-Web," Proc. SPIE: Multimedia Storage and Archiving Systems, Vol. III, 1998.
-
(1998)
Proc. SPIE: Multimedia Storage and Archiving Systems
, vol.3
-
-
Chang, E.Y.1
Wang, J.Z.2
Li, C.3
Wiederhold, G.4
-
3
-
-
0033340192
-
Searching near-replicas of images via clustering
-
Boston
-
E. Y. Chang, C. Li, J. Z. Wang, P. Mork, and G. Wiederhold, "Searching Near-Replicas of Images via Clustering," Proc. SPIE Symposium of Voice, Video, and Data Communications, pp. 281-92, Boston, 1999.
-
(1999)
Proc. SPIE Symposium of Voice, Video, and Data Communications
, pp. 281-292
-
-
Chang, E.Y.1
Li, C.2
Wang, J.Z.3
Mork, P.4
Wiederhold, G.5
-
4
-
-
0032650557
-
Content-based digital signature for motion pictures authentication and content-fragile watermarking
-
Italy
-
J. Dittmann, A. Steinmetz, and R. Steinmetz, "Content-based Digital Signature for Motion Pictures Authentication and Content-Fragile Watermarking", Proc. IEEE Int. Conf. Multimedia Computing and Systems, Italy, Vol. II, pp. 209-213, 1999.
-
(1999)
Proc. IEEE Int. Conf. Multimedia Computing and Systems
, vol.2
, pp. 209-213
-
-
Dittmann, J.1
Steinmetz, A.2
Steinmetz, R.3
-
9
-
-
0037372152
-
Content-based image copy detection
-
C. Kim, "Content-based Image Copy Detection," Signal Processing: Image Communication, Vol. 18, pp. 169-184, 2003.
-
(2003)
Signal Processing: Image Communication
, vol.18
, pp. 169-184
-
-
Kim, C.1
-
14
-
-
0035248504
-
A robust image authentication method distinguishing JPEG compression from malicious manipulation
-
C. Y. Lin and S. F. Chang, "A Robust Image Authentication Method Distinguishing JPEG Compression from Malicious Manipulation," IEEE Trans. on Circuits and Systems for Video Tech., Vol. 11, No. 2, pp. 153-168, 2001.
-
(2001)
IEEE Trans. on Circuits and Systems for Video Tech.
, vol.11
, Issue.2
, pp. 153-168
-
-
Lin, C.Y.1
Chang, S.F.2
-
15
-
-
0037818310
-
Structural digital signature for image authentication: An incidental distortion resistant scheme
-
C. S. Lu and H. Y. Mark Liao, "Structural Digital Signature for Image Authentication: An Incidental Distortion Resistant Scheme," IEEE Trans. on Multimedia, Vol. 5, No. 2, pp. 161-173, 2003.
-
(2003)
IEEE Trans. on Multimedia
, vol.5
, Issue.2
, pp. 161-173
-
-
Lu, C.S.1
Liao, H.Y.M.2
-
16
-
-
4344670344
-
On the security of structural information extraction/embedding for images
-
Vancouver, Canada
-
C. S. Lu, "On the Security of Structural Information Extraction/Embedding for Images," Proc. IEEE Int. Symposium on Circuits and Systems, Vancouver, Canada, 2004.
-
(2004)
Proc. IEEE Int. Symposium on Circuits and Systems
-
-
Lu, C.S.1
-
17
-
-
11244351627
-
Robust mesh-based hashing for copy detection and tracing of images
-
Taipei, Taiwan
-
C. S. Lu, C. Y. Hsu, S. W. Sun, and P. C. Chang, "Robust Mesh-based Hashing for Copy Detection and Tracing of Images," Proc. IEEE Int. Conf. on Multimedia and Expo: special session on Media Identification, Taipei, Taiwan, 2004.
-
(2004)
Proc. IEEE Int. Conf. on Multimedia and Expo: Special Session on Media Identification
-
-
Lu, C.S.1
Hsu, C.Y.2
Sun, S.W.3
Chang, P.C.4
-
18
-
-
84898785264
-
Characterization of signals from multiscale edges
-
S. Mallat and S. Zhong, "Characterization of Signals from Multiscale Edges," IEEE Trans. on Pattern Anal. and Machine Intell., Vol. 14, No. 7, pp. 710-732, 1992.
-
(1992)
IEEE Trans. on Pattern Anal. and Machine Intell.
, vol.14
, Issue.7
, pp. 710-732
-
-
Mallat, S.1
Zhong, S.2
-
22
-
-
0000230675
-
Attacks on copyright marking systems
-
LNCS 1575
-
F. Petitcolas, R. J. Anderson, and M. G. Kuhn, "Attacks on Copyright Marking Systems," Proc. Int. Workshop on Information Hiding, LNCS 1575, pp. 219-239, 1998.
-
(1998)
Proc. Int. Workshop on Information Hiding
, pp. 219-239
-
-
Petitcolas, F.1
Anderson, R.J.2
Kuhn, M.G.3
-
23
-
-
85032751954
-
Watermarking schemes evaluation
-
F. Petitcolas, "Watermarking Schemes Evaluation," IEEE Signal Processing Magazine, Vol. 17, No. 5, pp. 58-64, 2000.
-
(2000)
IEEE Signal Processing Magazine
, vol.17
, Issue.5
, pp. 58-64
-
-
Petitcolas, F.1
-
24
-
-
1542529865
-
A robust image fingerprinting system using the radon transform
-
J. S. Seo, J. Haitsma, T. Kalker, and C. D. Yoo, "A Robust Image fingerprinting system Using the Radon Transform," Signal Processing: Image Communication, Vol. 19, pp. 325-339, 2004.
-
(2004)
Signal Processing: Image Communication
, vol.19
, pp. 325-339
-
-
Seo, J.S.1
Haitsma, J.2
Kalker, T.3
Yoo, C.D.4
-
25
-
-
0034444578
-
Robust image hashing
-
R. Venkatesan, S. M. Koon, M. H. Jakubowski, and P. Moulin, "Robust Image Hashing," Proc. IEEE Int. Conf. Image Processing, 2000.
-
(2000)
Proc. IEEE Int. Conf. Image Processing
-
-
Venkatesan, R.1
Koon, S.M.2
Jakubowski, M.H.3
Moulin, P.4
-
26
-
-
1942436689
-
Image quality assessment: From error visibility to structural similarity
-
Z. Wang, A. C. Bovik, H. R. Sheikh, and E. P. Simoncelli, "Image Quality Assessment: From Error Visibility to Structural Similarity," IEEE Trans. on Image Processing, Vol. 13, No. 4, pp. 600-612, 2004.
-
(2004)
IEEE Trans. on Image Processing
, vol.13
, Issue.4
, pp. 600-612
-
-
Wang, Z.1
Bovik, A.C.2
Sheikh, H.R.3
Simoncelli, E.P.4
|