-
1
-
-
85032752228
-
When seeing isn't believing
-
March
-
B. B. Zhu, M. D. Swanson, and A. H. Tewfik, "When Seeing Isn't Believing," IEEE Signal Processing, vol. 21, no. 2, pp. 40-49, March 2004.
-
(2004)
IEEE Signal Processing
, vol.21
, Issue.2
, pp. 40-49
-
-
Zhu, B.B.1
Swanson, M.D.2
Tewfik, A.H.3
-
2
-
-
8644240462
-
Multimedia authentication and watermarking
-
D. Feng, W. C. Siu, and H. Zhang, Eds., Springer-Verlag, Berlin, Heidelberg, New York, chap. 7
-
B. B. Zhu and M. D. Swanson, "Multimedia Authentication and Watermarking," Multimedia Information Retrieval and Management, D. Feng, W. C. Siu, and H. Zhang, Eds., Springer-Verlag, Berlin, Heidelberg, New York, 2003, chap. 7, pp. 148-177.
-
(2003)
Multimedia Information Retrieval and Management
, pp. 148-177
-
-
Zhu, B.B.1
Swanson, M.D.2
-
3
-
-
0031378592
-
An invisible watermarking technique for image verification
-
M. M. Yeung and F. C. Mintzer, "An Invisible Watermarking Technique for Image Verification," IEEE Int. Conf. Image Processing, 1997, vol. 2, pp. 680-683.
-
(1997)
IEEE Int. Conf. Image Processing
, vol.2
, pp. 680-683
-
-
Yeung, M.M.1
Mintzer, F.C.2
-
4
-
-
0032117545
-
Invisible watermarking for image verification
-
July
-
M. M. Yeung and F. C. Mintzer. "Invisible Watermarking for Image Verification," J. Electronic Imaging, vol. 7, no. 3, pp. 578-591, July 1998.
-
(1998)
J. Electronic Imaging
, vol.7
, Issue.3
, pp. 578-591
-
-
Yeung, M.M.1
Mintzer, F.C.2
-
5
-
-
1542363253
-
On the security of the yeung-mintzer authentication watermark
-
Savannah, Georgia, March
-
N. Memon, S. Shende, and P. Wong, "On the Security of the Yeung-Mintzer Authentication Watermark," Proc. IS&T PICS Symp., Savannah, Georgia, March 1999, pp. 301-306.
-
(1999)
Proc. IS&T PICS Symp.
, pp. 301-306
-
-
Memon, N.1
Shende, S.2
Wong, P.3
-
6
-
-
0033703669
-
Further attacks on yeung-mintzer fragile watermarking scheme
-
San Jose, CA, Jan.
-
J. Fridrich, M. Goljan, and N. Memon, "Further Attacks on Yeung-Mintzer Fragile Watermarking Scheme," Proc. SPIE vol. 3971 Security and Watermarking of Multimedia Contents II, San Jose, CA, Jan. 2000, pp.428-437.
-
(2000)
Proc. SPIE Vol. 3971 Security and Watermarking of Multimedia Contents II
, vol.3971
, pp. 428-437
-
-
Fridrich, J.1
Goljan, M.2
Memon, N.3
-
7
-
-
0033872149
-
Counterfeiting attacks on oblivious block-wise independent invisible watermarking schemes
-
March
-
M. Holliman and N. Memon, "Counterfeiting Attacks on Oblivious Block-wise Independent Invisible Watermarking Schemes," IEEE Trans. Image Processing, vol.9, no.3, March 2000, pp. 432-441.
-
(2000)
IEEE Trans. Image Processing
, vol.9
, Issue.3
, pp. 432-441
-
-
Holliman, M.1
Memon, N.2
-
8
-
-
0036530306
-
Cryptanalysis of the yeung-mintzer fragile watermarking technique
-
J. Fridrich, M. Goljan, and N. Memon, "Cryptanalysis of the Yeung-Mintzer Fragile Watermarking Technique," J. Electronic Imaging, vol. 11, pp.262-274, 2002.
-
(2002)
J. Electronic Imaging
, vol.11
, pp. 262-274
-
-
Fridrich, J.1
Goljan, M.2
Memon, N.3
-
9
-
-
11244341366
-
Efficient oracle attacks on yeung-mintzer and variant authentication schemes
-
Taiwan, Jun
-
J. Wu, B. Zhu, S. Li, and F. Lin, "Efficient Oracle Attacks on Yeung-Mintzer and Variant Authentication Schemes," IEEE Int. Conf. Multimedia & Expo, Taiwan, Jun 2004.
-
(2004)
IEEE Int. Conf. Multimedia & Expo
-
-
Wu, J.1
Zhu, B.2
Li, S.3
Lin, F.4
-
10
-
-
0034443602
-
New fragile authentication watermark for images
-
Vancouver, Canada, Sept.
-
J. Fridrich, M. Goljan, and A. C. Baldoza, "New Fragile Authentication Watermark for Images," IEEE Int. Conf. Image Processing, Vancouver, Canada, Sept., 2000, vol. 1, pp. 446-449.
-
(2000)
IEEE Int. Conf. Image Processing
, vol.1
, pp. 446-449
-
-
Fridrich, J.1
Goljan, M.2
Baldoza, A.C.3
-
11
-
-
8644267842
-
Oblivious fragile watermarking scheme for image authentication
-
Orlando, FL, USA, May
-
C. T. Li, F. M. Yang, and C. S. Lee, "Oblivious Fragile Watermarking Scheme for Image Authentication," IEEE Int. Conf. Acoustics, Speech, & Signal Processing, Orlando, FL, USA, May 2002, vol. VI, pp 3445-3448.
-
(2002)
IEEE Int. Conf. Acoustics, Speech, & Signal Processing
, vol.6
, pp. 3445-3448
-
-
Li, C.T.1
Yang, F.M.2
Lee, C.S.3
-
12
-
-
84949499709
-
A new fragile watermarking technique for image authentication
-
Aug. Beijing
-
H. Zhong, F. Liu, and L. C. Jiao, "A New Fragile Watermarking Technique for Image Authentication," Int. Conf. Signal Processing, Aug. 2002, Beijing, vol. 1, pp. 792-795.
-
(2002)
Int. Conf. Signal Processing
, vol.1
, pp. 792-795
-
-
Zhong, H.1
Liu, F.2
Jiao, L.C.3
-
13
-
-
0037869332
-
Fragile watermarking scheme for image authentication
-
June
-
H. Lu, R. Shen, and F. Chung, "Fragile Watermarking Scheme for Image Authentication," Electronics Letters, vol. 39, no. 12, June 2003, pp. 898-900.
-
(2003)
Electronics Letters
, vol.39
, Issue.12
, pp. 898-900
-
-
Lu, H.1
Shen, R.2
Chung, F.3
|