-
1
-
-
11244266383
-
The trustworthy digital camera: Restoring credibility to the photographic image
-
Chicago, IL, USA, Oct.
-
G.I. Friedman, "The trustworthy digital camera: restoring credibility to the photographic image," in Proc. IEEE ICIP, vol. II, Chicago, IL, USA, Oct. 1998, pp 409-413
-
(1998)
Proc. IEEE ICIP
, vol.2
, pp. 409-413
-
-
Friedman, G.I.1
-
2
-
-
0013106830
-
Structural digital signature for image authentication: An incidental distortion resistant scheme
-
8th ACM Int. Conf. Multimedia, Los Angeles, C.A
-
C.S. Lu, H.Y.M. Liao, and C.J. Sze, "Structural digital signature for image authentication: An incidental distortion resistant scheme," in Proc. Multimedia Security Workshop, 8th ACM Int. Conf. Multimedia, Los Angeles, C.A., 2000, pp. 115-118
-
(2000)
Proc. Multimedia Security Workshop
, pp. 115-118
-
-
Lu, C.S.1
Liao, H.Y.M.2
Sze, C.J.3
-
3
-
-
0032292847
-
Image watermarking for tamper detection
-
Chicago, IL, USA, Oct.
-
J. Fridrich, "Image watermarking for tamper detection," in Proc. IEEE ICIP, vol. II, Chicago, IL, USA, Oct. 1998, pp.404-408.
-
(1998)
Proc. IEEE ICIP
, vol.2
, pp. 404-408
-
-
Fridrich, J.1
-
4
-
-
11244278221
-
Toward a telltale watermarking technique for tamper-proofing
-
D. Kundur and D. Hatzinakos, "Toward a telltale watermarking technique for tamper-proofing," IEEE Trans. Consum. Electronics, vol. 39, pp. 905-910, 1993.
-
(1993)
IEEE Trans. Consum. Electronics
, vol.39
, pp. 905-910
-
-
Kundur, D.1
Hatzinakos, D.2
-
5
-
-
0003356542
-
A public key watermark for image verification and authentication
-
Santa Barbara, CA, Oct.
-
P. W. Wong, "A public key watermark for image verification and authentication," in Proc. IEEE Int. Conf. Image Processing, Santa Barbara, CA, Oct. 1997, pp. 680-683.
-
(1997)
Proc. IEEE Int. Conf. Image Processing
, pp. 680-683
-
-
Wong, P.W.1
-
6
-
-
11244326177
-
A review watermarking and the importance of perceptual modeling
-
Feb.
-
I.J. Cox and M.I. Miller, "A review watermarking and the importance of perceptual modeling," Proc. IEEE, vol. 3016, Feb. 1999.
-
(1999)
Proc. IEEE
, vol.3016
-
-
Cox, I.J.1
Miller, M.I.2
-
7
-
-
0037508344
-
Invisibility and application functionalities in perceptual watermarking-an overview
-
Jan.
-
Christophe De Vleeschouwer, Jean-Francois Delaigle, and Benoit Macq, "Invisibility and Application Functionalities in Perceptual Watermarking-An Overview", Proceedings of the IEEE, vol. 90, no. 1, Jan. 2002, pp. 64-77.
-
(2002)
Proceedings of the IEEE
, vol.90
, Issue.1
, pp. 64-77
-
-
De Vleeschouwer, C.1
Delaigle, J.-F.2
Macq, B.3
-
8
-
-
0036611838
-
Hierarchical watermarking for secure image authentication with localization
-
Jun.
-
Mehmet Utku Celik, Gaurav Sharma, Eli Saber, and Ahmet Murat Tekalp, "Hierarchical Watermarking for Secure Image Authentication With Localization", IEEE Transactions on Image Processing, vol.11, no. 4, Jun. 2002, pp. 585-594.
-
(2002)
IEEE Transactions on Image Processing
, vol.11
, Issue.4
, pp. 585-594
-
-
Celik, M.U.1
Sharma, G.2
Saber, E.3
Tekalp, A.M.4
-
9
-
-
0033872149
-
Counterfeiting attacks on oblivious block-wise independent invisible watermarking schemes
-
Mar.
-
M. Holliman and N. Memon, "Counterfeiting attacks on oblivious block-wise independent invisible watermarking schemes," IEEE Transactions on Image Processing, vol. 9, pp. 412-441, Mar. 2000.
-
(2000)
IEEE Transactions on Image Processing
, vol.9
, pp. 412-441
-
-
Holliman, M.1
Memon, N.2
-
10
-
-
0000861888
-
Chaotic mixing of digital images and applications to watermarking
-
G. VOYATZIS and I. PITAS, "Chaotic mixing of digital images and applications to watermarking", Proceedings of European conference on Multimedia applications, services and techniques (ECMAST'96), 1996, 2, pp. 687-689
-
(1996)
Proceedings of European Conference on Multimedia Applications Services and Techniques (ECMAST'96)
, vol.2
, pp. 687-689
-
-
Voyatzis, G.1
Pitas, I.2
|