-
1
-
-
11244300145
-
A brief review on fragile watermarking based image authentication
-
2003
-
Tieniu Tan Yujie Song, "A brief review on fragile watermarking based image authentication," 2003, CIPT. Vol.8(A), No.1, pp.1-7, 2003.
-
(2003)
CIPT
, vol.8
, Issue.1 A
, pp. 1-7
-
-
Song, T.T.Y.1
-
2
-
-
0031378592
-
An invisible watermarking technique for image verification
-
1997
-
M. M. Yeung and F. Mintzer, "An invisible watermarking technique for image verification," 1997, Proc.ICIP'97 N0.97CB36144. 1997: 680-3 vol.2.
-
(1997)
Proc.ICIP'97
, vol.2
, Issue.97 CB36144
, pp. 680-683
-
-
Yeung, M.M.1
Mintzer, F.2
-
3
-
-
0033688392
-
Semi-fragile watermarking for authenticating jpeg visual content
-
2000
-
Lin Ching Yung and Chang Shih Fu, "Semi-fragile watermarking for authenticating jpeg visual content," 2000, Proc. SPIE. 2000; 3971:140-51.
-
(2000)
Proc. SPIE
, vol.3971
, pp. 140-151
-
-
Lin Ching Yung1
Chang Shih Fu2
-
4
-
-
0032223822
-
A robust image authentication method surviving jpeg lossy compression
-
1997
-
Lin Ching Yung and Chang Shih Fu, "A robust image authentication method surviving jpeg lossy compression," 1997, Proc. ICIP. 1997; 3312: 296-307.
-
(1997)
Proc. ICIP
, vol.3312
, pp. 296-307
-
-
Lin Ching Yung1
Chang Shih Fu2
-
5
-
-
0035248504
-
A robust image authentication method distinguishing jpeg compression from malicious manipulation
-
2001, Feb.
-
Lin Ching Yung and Chang Shih Fu, "A robust image authentication method distinguishing jpeg compression from malicious manipulation," 2001, IEEE-Transactions-on-Circuits-and-Systemsfor-Video-Technology. Feb. 2001; 11(2): 153-68.
-
(2001)
IEEE-transactions-on-circuits-and-systemsfor-video-technology
, vol.11
, Issue.2
, pp. 153-168
-
-
Lin Ching Yung1
Chang Shih Fu2
-
6
-
-
0005469295
-
An image authenticator surviving dct-based variable quantization table compressions
-
CY Lin and SF Chang, "An image authenticator surviving dct-based variable quantization table compressions," 1997, CU/CTR Technical Report 49098 -24.
-
(1997)
CU/CTR Technical Report 49098 -24
-
-
Lin, C.Y.1
Chang, S.F.2
-
7
-
-
0033717154
-
Detection of image alterations using semi-fragile watermarks
-
E. T. Lin, C. I. Podilchuk, and E. J. Delp, "Detection of image alterations using semi-fragile watermarks," 2000, Proc. SPIE'2000; 3971: 152-63.
-
(2000)
Proc. SPIE'2000
, vol.3971
, pp. 152-163
-
-
Lin, E.T.1
Podilchuk, C.I.2
Delp, E.J.3
-
8
-
-
0033706181
-
Compression compatible fragile and semi-fragile tamper detection
-
C. G. Boncelet Jr. L. M. Marvel, G. Hartwig, "Compression compatible fragile and semi-fragile tamper detection," 2000, SPIE vol. 3971, No. 12.
-
(2000)
SPIE
, vol.3971
, Issue.12
-
-
Boncelet Jr., C.G.1
Marvel, L.M.2
Hartwig, G.3
-
9
-
-
0033601667
-
Content based integrity protection of digital images
-
M. P. Queluz, "Content based integrity protection of digital images," 1999, SPIE vol. 3657, No. 09.
-
(1999)
SPIE
, vol.3657
, Issue.9
-
-
Queluz, M.P.1
-
10
-
-
0021892282
-
Fuzzy identification of systems and its application to modeling and control
-
1985
-
T. Takagi and M. Sugcno, "Fuzzy identification of systems and its application to modeling and control," 1985, IEEE Trans. Syst., Man. Cybern., vol. SMC-15, no. 1, pp. 116-132, 1985
-
(1985)
IEEE Trans. Syst., Man. Cybern.
, vol.SMC-15
, Issue.1
, pp. 116-132
-
-
Takagi, T.1
Sugcno, M.2
|