-
1
-
-
0034775562
-
Strict integrity control of biomedical images
-
G. Coatrieux, B. Sankur, and H. Maitre, "Strict integrity control of biomedical images," Proc. SPIE 4314, 229-240 (2001).
-
(2001)
Proc. SPIE
, vol.4314
, pp. 229-240
-
-
Coatrieux, G.1
Sankur, B.2
Maitre, H.3
-
2
-
-
0032117545
-
Invisible watermarking for image verification
-
July
-
M. M. Yeung and F. C. Mintzer, "Invisible watermarking for image verification," J. Electron. Imaging 7(3), 578-591 (July 1998).
-
(1998)
J. Electron. Imaging
, vol.7
, Issue.3
, pp. 578-591
-
-
Yeung, M.M.1
Mintzer, F.C.2
-
4
-
-
0002321371
-
Methods for tamper detection in digital images
-
Orlando, FL, October 30-31
-
J. Fridrich, "Methods for tamper detection in digital images," Proc. ACM Workshop on Multimedia and Security, pp. 19-23, Orlando, FL, October 30-31, 1999.
-
(1999)
Proc. ACM Workshop on Multimedia and Security
, pp. 19-23
-
-
Fridrich, J.1
-
5
-
-
0032682054
-
Spread spectrum image steganography
-
Aug.
-
L. M. Marvel, C. Boncelet, Jr., and C. T. Retter, "Spread spectrum image steganography," IEEE Trans. Image Process. 8(8), 1075-1083 (Aug. 1999).
-
(1999)
IEEE Trans. Image Process.
, vol.8
, Issue.8
, pp. 1075-1083
-
-
Marvel, L.M.1
Boncelet Jr., C.2
Retter, C.T.3
-
6
-
-
0033706181
-
Compression compatible fragile and semifragile tamper detection
-
L. M. Marvel, G. W. Hartwig, Jr., and C. Boncelet, Jr., "Compression compatible fragile and semifragile tamper detection," Proc. SPIE 3971, 131-139 (2000).
-
(2000)
Proc. SPIE
, vol.3971
, pp. 131-139
-
-
Marvel, L.M.1
Hartwig Jr., G.W.2
Boncelet Jr., C.3
-
7
-
-
6344232029
-
A blind watermarking scheme based on structured codebooks
-
London, April 10
-
J. J. Eggers, J. K. Su, and B. Girod, "A blind watermarking scheme based on structured codebooks," IEEE Conf. Secure Images and Image Authentication, London, April 10, 2000.
-
(2000)
IEEE Conf. Secure Images and Image Authentication
-
-
Eggers, J.J.1
Su, J.K.2
Girod, B.3
-
8
-
-
1842546197
-
Robust digital watermarking based on key-dependent basis functions
-
Portland, Oregon, April 15-27
-
J. Fridrich, "Robust digital watermarking based on key-dependent basis functions," 2nd Information Hiding Workshop, Portland, Oregon, April 15-27, 1998.
-
(1998)
2nd Information Hiding Workshop
-
-
Fridrich, J.1
-
9
-
-
0033717154
-
Detection of image alterations using semi-fragile watermarks
-
E. T. Lin, C. I. Podilchuk, and E. J. Delp, "Detection of image alterations using semi-fragile watermarks," Proc. SPIE 3971, 152-163 (2000).
-
(2000)
Proc. SPIE
, vol.3971
, pp. 152-163
-
-
Lin, E.T.1
Podilchuk, C.I.2
Delp, E.J.3
-
10
-
-
0033688392
-
Semifragile watermarking for authentication JPEG visual content
-
C. Y. Lin and S. F. Chang, "Semifragile watermarking for authentication JPEG visual content," Proc. SPIE 3971, 140-151 (2000).
-
(2000)
Proc. SPIE
, vol.3971
, pp. 140-151
-
-
Lin, C.Y.1
Chang, S.F.2
-
11
-
-
0033601667
-
Content-based integrity protection of digital images
-
Security and Watermarking of Multimedia Contents, P. W. Wong and E. J. Delp, Eds.
-
M. P. Queluz, "Content-based integrity protection of digital images," in Security and Watermarking of Multimedia Contents, P. W. Wong and E. J. Delp, Eds., Proc. SPIE 3657, 85-93 (1999).
-
(1999)
Proc. SPIE
, vol.3657
, pp. 85-93
-
-
Queluz, M.P.1
-
13
-
-
84914815743
-
Fraud detection and self embedding
-
T.-H. Lan and A. H. Tewfik, "Fraud detection and self embedding," ACM Multimedia 2, 33-36 (1999).
-
(1999)
ACM Multimedia
, vol.2
, pp. 33-36
-
-
Lan, T.-H.1
Tewfik, A.H.2
-
14
-
-
0036488304
-
Video error correction using steganography
-
Feb.
-
D. L. Robie and R. M. Mersereau, "Video error correction using steganography," Appl. Signal Processing 2002(2), 164-173 (Feb. 2002).
-
(2002)
Appl. Signal Processing
, vol.2002
, Issue.2
, pp. 164-173
-
-
Robie, D.L.1
Mersereau, R.M.2
-
15
-
-
0032223822
-
A robust image authentication algorithm surviving JPEG compression
-
C.-Y. Lin and S.-F. Chang, "A robust image authentication algorithm surviving JPEG compression," Proc. SPIE 3312, 296-307 (1997).
-
(1997)
Proc. SPIE
, vol.3312
, pp. 296-307
-
-
Lin, C.-Y.1
Chang, S.-F.2
-
16
-
-
0038636389
-
Combining low frequency and spread spectrum watermarking
-
J. Fridrich, "Combining low frequency and spread spectrum watermarking," Proc. SPIE 3456, 2-12 (1998).
-
(1998)
Proc. SPIE
, vol.3456
, pp. 2-12
-
-
Fridrich, J.1
-
17
-
-
0036030626
-
Security of fragile authentication watermarks with localization
-
J. Fridrich, "Security of fragile authentication watermarks with localization," Proc. SPIE 4675, 691-700 (2002).
-
(2002)
Proc. SPIE
, vol.4675
, pp. 691-700
-
-
Fridrich, J.1
-
18
-
-
84904413817
-
A hybrid watermark for tamper detection in digital images
-
Brisbane, Australia, August 22-25
-
J. Fridrich, "A hybrid watermark for tamper detection in digital images," ISSPA'99 Conf., pp. 301-304, Brisbane, Australia, August 22-25, 1999.
-
(1999)
ISSPA'99 Conf.
, pp. 301-304
-
-
Fridrich, J.1
-
19
-
-
0035362493
-
Approximate message authentication codes
-
June
-
L. Xie, G. R. Arce, and R. F. Graverman, "Approximate message authentication codes," IEEE Trans. Multimedia 3, 242-252 (June 2001).
-
(2001)
IEEE Trans. Multimedia
, vol.3
, pp. 242-252
-
-
Xie, L.1
Arce, G.R.2
Graverman, R.F.3
-
20
-
-
0035454036
-
Secure discrete cosine transform based technique for recoverable tamper proofing
-
Sep.
-
K. L. Hung, C. C. Cheng, and T. S. Chen, "Secure discrete cosine transform based technique for recoverable tamper proofing," Opt. Eng. 40(9), 1950-1958 (Sep. 2001).
-
(2001)
Opt. Eng.
, vol.40
, Issue.9
, pp. 1950-1958
-
-
Hung, K.L.1
Cheng, C.C.2
Chen, T.S.3
-
21
-
-
0034848594
-
Blind watermarking applied to image authentication
-
Salt Lake City, USA, May 7-11
-
J. J. Eggers and B. Girod, "Blind watermarking applied to image authentication," ICASSP'2001: Intern. Conference on Acoustics, Speech and Signal Processing, Salt Lake City, USA, May 7-11, 2001.
-
(2001)
ICASSP'2001: Intern. Conference on Acoustics, Speech and Signal Processing
-
-
Eggers, J.J.1
Girod, B.2
-
22
-
-
0033723294
-
Spatial watermark for image verification
-
M. P. Queluz and P. Lamy, "Spatial watermark for image verification," Proc. SPIE 3971, 120-130 (2000).
-
(2000)
Proc. SPIE
, vol.3971
, pp. 120-130
-
-
Queluz, M.P.1
Lamy, P.2
-
23
-
-
0036530224
-
Spatial watermark for image content authentication
-
April
-
M. P. Queluz, "Spatial watermark for image content authentication," J. Electron. Imaging 11(2), 275-285 (April 2002).
-
(2002)
J. Electron. Imaging
, vol.11
, Issue.2
, pp. 275-285
-
-
Queluz, M.P.1
-
24
-
-
0032304995
-
Towards a telltale watermarking technique for tamper-proofing
-
Oct.
-
D. Kundur and D. Hatzinakos, "Towards a telltale watermarking technique for tamper-proofing," Proc. IEEE Int. Conf. On Image Processing, 2,409-413 (Oct. 1998).
-
(1998)
Proc. IEEE Int. Conf. On Image Processing
, vol.2
, pp. 409-413
-
-
Kundur, D.1
Hatzinakos, D.2
-
26
-
-
0010812879
-
Robust high capacity data embedding
-
Utah, April
-
T. H. Lan, M. F. Mansour, and A. H. Tewfik, "Robust high capacity data embedding," ICASSP 2001, Utah, April 2001.
-
(2001)
ICASSP 2001
-
-
Lan, T.H.1
Mansour, M.F.2
Tewfik, A.H.3
-
27
-
-
0035388316
-
Mean quantization-based fragile watermarking for image authentication
-
G.-W. Yu, C.-S. Lu, and H.-Y. M. Liao, "Mean quantization-based fragile watermarking for image authentication," Opt. Eng. 40(7), 1396-1408 (2001).
-
(2001)
Opt. Eng.
, vol.40
, Issue.7
, pp. 1396-1408
-
-
Yu, G.-W.1
Lu, C.-S.2
Liao, H.-Y.M.3
-
28
-
-
0035763305
-
Comparative assessment of semifragile watermarking methods
-
Ö. Ekici, B. Coşkun, U. Naci, and B. Sankur, "Comparative assessment of semifragile watermarking methods," Proc. SPIE 4518, 177-188 (2001).
-
(2001)
Proc. SPIE
, vol.4518
, pp. 177-188
-
-
Ekici, Ö.1
Coşkun, B.2
Naci, U.3
Sankur, B.4
-
29
-
-
0005063377
-
Fair evaluation methods for image watermarking systems
-
Oct.
-
M. Kutter and F. A. P. Petitcolas, "Fair evaluation methods for image watermarking systems," J. Electron. Imaging 9(4), 445-455 (Oct. 2000).
-
(2000)
J. Electron. Imaging
, vol.9
, Issue.4
, pp. 445-455
-
-
Kutter, M.1
Petitcolas, F.A.P.2
-
30
-
-
0035248504
-
A robust image authentication method distinguishing JPEG compression from malicious manipulation
-
C. Y. Lin and S. F. Chang, "A robust image authentication method distinguishing JPEG compression from malicious manipulation," IEEE Trans. Circuits Syst. Video Technol. 11(2), 153-168 (2001).
-
(2001)
IEEE Trans. Circuits Syst. Video Technol.
, vol.11
, Issue.2
, pp. 153-168
-
-
Lin, C.Y.1
Chang, S.F.2
-
31
-
-
0035097432
-
Authentication of digital images and video: Generic models and a new contribution
-
M. P. Queluz, "Authentication of digital images and video: generic models and a new contribution," Signal Process. Image Commun. 216(5), 461-475 (2001).
-
(2001)
Signal Process. Image Commun.
, vol.216
, Issue.5
, pp. 461-475
-
-
Queluz, M.P.1
-
32
-
-
0034441183
-
Compression tolerant watermarking for image verification
-
Vancouver, Canada, Sep. 10-13
-
H. Bassali, J. Chugani, S. Agarwal, A. Aggarwal, and P. Dubey, "Compression tolerant watermarking for image verification," Proc. ICIP'2000: International Conf. on Image Processing, Vancouver, Canada, Sep. 10-13, 2000.
-
(2000)
Proc. ICIP'2000: International Conf. on Image Processing
-
-
Bassali, H.1
Chugani, J.2
Agarwal, S.3
Aggarwal, A.4
Dubey, P.5
-
33
-
-
85032751954
-
Watermarking schemes evaluation
-
Sep.
-
F. A. P. Petitcolas, "Watermarking schemes evaluation," IEEE Signal Processing 17(5), 58-64 (Sep. 2000).
-
(2000)
IEEE Signal Processing
, vol.17
, Issue.5
, pp. 58-64
-
-
Petitcolas, F.A.P.1
-
34
-
-
0034444435
-
Mean quantization blind watermarking for image authentication
-
Vancouver, BC, Canada, Sept. 10-13
-
G.-J. Yu, C.-S. Lu, H.-Y. M. Liao, and J.-P. Sheu, "Mean quantization blind watermarking for image authentication," Proc. 7th IEEE Int. Conf. on Image Processing, Vol. III, pp. 706-709, Vancouver, BC, Canada, Sept. 10-13, 2000.
-
(2000)
Proc. 7th IEEE Int. Conf. on Image Processing
, vol.3
, pp. 706-709
-
-
Yu, G.-J.1
Lu, C.-S.2
Liao, H.-Y.M.3
Sheu, J.-P.4
|