-
3
-
-
0027697301
-
"The trustworthy camera: Restoring credibility to the photographic image"
-
Jun
-
G. Friedman, "The trustworthy camera: Restoring credibility to the photographic image," IEEE Trans. Consumer Electron., vol. 39, no. 3, pp. 905-910, Jun. 1993.
-
(1993)
IEEE Trans. Consumer Electron.
, vol.39
, Issue.3
, pp. 905-910
-
-
Friedman, G.1
-
4
-
-
0030409375
-
"A robust content-based digital signature for image authentication"
-
M. Schneider and S.-F. Chang, "A robust content-based digital signature for image authentication," in Proc. IEEE Int. Conf. Image Processing vol. 2, 1996, pp. 227-230.
-
(1996)
Proc. IEEE Int. Conf. Image Processing
, vol.2
, pp. 227-230
-
-
Schneider, M.1
Chang, S.-F.2
-
5
-
-
33750096298
-
"A new approach to integrity of digital images"
-
D. Storck, "A new approach to integrity of digital images," in Proc. IFIP Conf. Mobile Communication, 1996, pp. 309-316.
-
(1996)
Proc. IFIP Conf. Mobile Communication
, pp. 309-316
-
-
Storck, D.1
-
6
-
-
84936892450
-
"Cryptology for digital tv broadcasting"
-
Jun
-
B. Macq and J.-J. Quisquater, "Cryptology for digital tv broadcasting," Proc. IEEE, vol. 83, no. 6, pp. 944-957, Jun. 1995.
-
(1995)
Proc. IEEE
, vol.83
, Issue.6
, pp. 944-957
-
-
Macq, B.1
Quisquater, J.-J.2
-
8
-
-
0003966349
-
"Lossless Recovery of an Original Image Containing Embedded Data"
-
U.S. patent Application, Docket/E-D
-
C. Honsinger, P. Jones, M. Rabbani, and J. Stoffel, "Lossless Recovery of an Original Image Containing Embedded Data," U.S. patent Application, Docket/E-D, 1999.
-
(1999)
-
-
Honsinger, C.1
Jones, P.2
Rabbani, M.3
Stoffel, J.4
-
9
-
-
0034765589
-
"Invertible authentication"
-
Security and Watermarking of Multimedia Contents
-
J. Fridrich, M. Goljan, and M. Du, "Invertible authentication," in Proc. SPIE, Security and Watermarking of Multimedia Contents, 2001.
-
(2001)
Proc. SPIE
-
-
Fridrich, J.1
Goljan, M.2
Du, M.3
-
10
-
-
0033717154
-
"Detection of image alterations using semi-fragile watermarks"
-
Security and Watermarking of Multimedia Contents II
-
E. Lin, C. Podilchuk, and E. Delp, "Detection of image alterations using semi-fragile watermarks," in Proc. SPIE, vol. 3971, Security and Watermarking of Multimedia Contents II, 2000, pp. 52-163.
-
(2000)
Proc. SPIE
, vol.3971
, pp. 52-163
-
-
Lin, E.1
Podilchuk, C.2
Delp, E.3
-
12
-
-
0034444435
-
"Mean quantization blind watermarking for image authentication"
-
G.-J. Yu, C.-S. Lu, H.-Y. Liao, and J.-P. Sheu, "Mean quantization blind watermarking for image authentication," in Proc. IEEE Int. Conf. Image Processing, vol. 3, 2000, pp. 706-709.
-
(2000)
Proc. IEEE Int. Conf. Image Processing
, vol.3
, pp. 706-709
-
-
Yu, G.-J.1
Lu, C.-S.2
Liao, H.-Y.3
Sheu, J.-P.4
-
13
-
-
0032223822
-
"A robust image authentication algorithm surviving jpeg lossy compression"
-
Storage and Retrieval of Image/Video Databases
-
C.-Y. Lin and S.-F. Chang, "A robust image authentication algorithm surviving jpeg lossy compression," in Proc. SPIE, vol. 3312, Storage and Retrieval of Image/Video Databases, 1998, pp. 296-307.
-
(1998)
Proc. SPIE
, vol.3312
, pp. 296-307
-
-
Lin, C.-Y.1
Chang, S.-F.2
-
14
-
-
0031378592
-
"An invisible watermarking technique for image verification"
-
M. Yeung and F. Mintzer, "An invisible watermarking technique for image verification," in Proc. Int. Conf. Image Processing, vol. 1, 1997, pp. 680-683.
-
(1997)
Proc. Int. Conf. Image Processing
, vol.1
, pp. 680-683
-
-
Yeung, M.1
Mintzer, F.2
-
15
-
-
0032648596
-
"Digital watermarking for tell-tale tamper proofing and authentication"
-
Jul
-
D. Kundur and D. Hatzinakos, "Digital watermarking for tell-tale tamper proofing and authentication," Proc. IEEE, vol. 87, no. 7, pp. 1167-1180, Jul. 1999.
-
(1999)
Proc. IEEE
, vol.87
, Issue.7
, pp. 1167-1180
-
-
Kundur, D.1
Hatzinakos, D.2
-
16
-
-
0036611838
-
"Hierarchical watermarking for secure image authentication with localization"
-
Apr
-
M. U. Celik, G. Sharma, E. Saber, and A. M. Tekalp, "Hierarchical watermarking for secure image authentication with localization," IEEE Trans. Image Processing, vol. 11, no. 4, pp. 585-595, Apr. 2002.
-
(2002)
IEEE Trans. Image Processing
, vol.11
, Issue.4
, pp. 585-595
-
-
Celik, M.U.1
Sharma, G.2
Saber, E.3
Tekalp, A.M.4
-
17
-
-
0036030626
-
"Security of fragile authentication watermarks with localization"
-
Electronic Imaging
-
J. Fridrich, "Security of fragile authentication watermarks with localization," in Proc. SPIE, vol. 4675, Electronic Imaging, 2002, pp. 691-700.
-
(2002)
Proc. SPIE
, vol.4675
, pp. 691-700
-
-
Fridrich, J.1
-
19
-
-
85084163188
-
"Reading between the lines: Lessons from the SDMI challenge"
-
Washington, DC
-
S. Craver, M. Wu, B. Liu, A. Stubblefield, B. Swartzlander, and D. Wallach, "Reading between the lines: Lessons from the SDMI challenge," in Proc. 10th USENIX Security Symp., Washington, DC, 2001.
-
(2001)
Proc. 10th USENIX Security Symp.
-
-
Craver, S.1
Wu, M.2
Liu, B.3
Stubblefield, A.4
Swartzlander, B.5
Wallach, D.6
-
21
-
-
0002629270
-
"Maximum lilelihood from incomplete data via the EM algorithm"
-
A. Dempster, N. Laird, and D. Rubin, "Maximum lilelihood from incomplete data via the EM algorithm," J. Roy. Statist. Soc., vol. 99, no. 1, pp. 1-38, 1977.
-
(1977)
J. Roy. Statist. Soc.
, vol.99
, Issue.1
, pp. 1-38
-
-
Dempster, A.1
Laird, N.2
Rubin, D.3
|