-
1
-
-
0037869332
-
Fragile watermarking scheme for image authentication
-
12 Jun
-
Hongtao Lu, Ruiming Shen and Fu-Lai Chung, "Fragile watermarking scheme for image authentication," Electronics Letters, Volume: 39 Issue: 12, 12 Jun 2003.
-
(2003)
Electronics Letters
, vol.39
, Issue.12
-
-
Lu, H.1
Shen, R.2
Chung, F.-L.3
-
2
-
-
0032650557
-
Content-based digital signature for motion pictures authentication and content-fragile watermarking
-
7-11 June
-
J. Dittmann, A. Steinmetz, and R. Steinmetz, "Content-based digital signature for motion pictures authentication and content-fragile watermarking," Multimedia Computing and Systems, 1999, IEEE International Conference on, Volume: 2, 7-11 June 1999.
-
(1999)
Multimedia Computing and Systems, 1999, IEEE International Conference on
, vol.2
-
-
Dittmann, J.1
Steinmetz, A.2
Steinmetz, R.3
-
3
-
-
0036755019
-
On the design of content-based multimedia authentication systems
-
Sept.
-
Chai Wah Wu, "On the design of content-based multimedia authentication systems," Multimedia, IEEE Transactions on, Volume: 4 Issue: 3, Sept. 2002.
-
(2002)
Multimedia, IEEE Transactions on
, vol.4
, Issue.3
-
-
Wu, C.W.1
-
4
-
-
0037818310
-
Structural digital signature for image authentication: An incidental distortion resistant scheme
-
June
-
Chun-Shien Lu and H. Y. M. Liao, 'Structural digital signature for image authentication: an incidental distortion resistant scheme," Multimedia, IEEE Transactions on, Volume: 5 Issue: 2, June 2003.
-
(2003)
Multimedia, IEEE Transactions on
, vol.5
, Issue.2
-
-
Lu, C.-S.1
Liao, H.Y.M.2
-
6
-
-
0035473830
-
Multipurpose watermarking for image authentication and protection
-
Oct.
-
Chun-Shien Lu; and H. Y. M Liao, "Multipurpose watermarking for image authentication and protection," Image Processing, IEEE Transactions on, Volume: 10 Issue: 10, Oct. 2001.
-
(2001)
Image Processing, IEEE Transactions on
, vol.10
, Issue.10
-
-
Lu, C.-S.1
Liao, H.Y.M.2
-
7
-
-
0035473831
-
Secret and public key image-watermarking schemes for image authentication and ownership verification
-
Oct.
-
Ping Wah Wong and N. Memon, "Secret and public key image-watermarking schemes for image authentication and ownership verification," Image Processing, IEEE Transactions on, Volume: 10 Issue: 10, Oct. 2001.
-
(2001)
Image Processing, IEEE Transactions on
, vol.10
, Issue.10
-
-
Wong, P.W.1
Memon, N.2
-
8
-
-
0033872149
-
Counterfeiting attacks on oblivious block-wise independent invisible watermarking schemes
-
March
-
M. Holliman and N. Memon, "Counterfeiting attacks on oblivious block-wise independent invisible watermarking schemes," Image Processing, IEEE Transactions on, Volume: 9 Issue: 3, March 2000.
-
(2000)
Image Processing, IEEE Transactions on
, vol.9
, Issue.3
-
-
Holliman, M.1
Memon, N.2
-
9
-
-
0036544390
-
Toward secure public-key blockwise fragile authentication watermarking
-
April
-
P.S.L.M Barreto, H. Y. Kim, and V. Rijmen, "Toward secure public-key blockwise fragile authentication watermarking," Vision, Image and Signal Processing, IEE Proceedings, Volume: 149 Issue: 2, April 2002.
-
(2002)
Vision, Image and Signal Processing, IEE Proceedings
, vol.149
, Issue.2
-
-
Barreto, P.S.L.M.1
Kim, H.Y.2
Rijmen, V.3
-
11
-
-
0032648596
-
Digital watermarking for telltale tamper proofing and authentication
-
July
-
D. Kundur and D. Hatzinakos, "Digital watermarking for telltale tamper proofing and authentication," Proceedings of the IEEE, Volume: 87 Issue: 7, July 1999.
-
(1999)
Proceedings of the IEEE
, vol.87
, Issue.7
-
-
Kundur, D.1
Hatzinakos, D.2
-
12
-
-
0035163017
-
On the security of the SARI image authentication system
-
R. Radhakrisnan and N. Memon, "On the Security of the SARI Image Authentication System," Proc. IEEE Int. Conf. on Image Proc., Vol. III, pp. 971-974, 2001.
-
(2001)
Proc. IEEE Int. Conf. on Image Proc.
, vol.3
, pp. 971-974
-
-
Radhakrisnan, R.1
Memon, N.2
-
13
-
-
0035248504
-
A robust image authentication method distinguishing JPEG compression from malicious manipulation
-
Feb
-
Ching-Yung Lin and Shih-Fu Chang, "A robust image authentication method distinguishing JPEG compression from malicious manipulation," Circuits and Systems for Video Technology, IEEE Transactions on, Volume: 11 Issue: 2, Feb 2001.
-
(2001)
Circuits and Systems for Video Technology, IEEE Transactions on
, vol.11
, Issue.2
-
-
Lin, C.-Y.1
Chang, S.-F.2
-
14
-
-
0036611838
-
Hierarchical watermarking for secure image authentication with localization
-
June
-
M. Utku Celik, G. Sharma, E. Saber, and A. Murat Tekalp, "Hierarchical watermarking for secure image authentication with localization," Image Processing, IEEE Transactions on, Volume: 11 Issue: 6, June 2002
-
(2002)
Image Processing, IEEE Transactions on
, vol.11
, Issue.6
-
-
Celik, M.U.1
Sharma, G.2
Saber, E.3
Tekalp, A.M.4
-
15
-
-
0038188743
-
On sequential watermark detection
-
April
-
R. Chandramouli, R. and N. D. Memon, 'On sequential watermark detection," Signal Processing, IEEE Transactions on Volume: 51 Issue: 4, April 2003.
-
(2003)
Signal Processing, IEEE Transactions on
, vol.51
, Issue.4
-
-
Chandramouli, R.1
Memon, N.D.2
-
16
-
-
0036477368
-
Robust authentication scheme for protecting copyrights of images and graphics
-
Feb.
-
C. C. Chang, K. F. Hwang, and M. S. Hwang, "Robust authentication scheme for protecting copyrights of images and graphics," Vision, Image and Signal Processing, IEE Proceedings-, Volume: 149 Issue: 1, Feb. 2002.
-
(2002)
Vision, Image and Signal Processing, IEE Proceedings
, vol.149
, Issue.1
-
-
Chang, C.C.1
Hwang, K.F.2
Hwang, M.S.3
-
17
-
-
0001267508
-
Polynomial codes
-
Nov
-
T. Kasami, Shu Lin, and W. Peterson, "Polynomial codes," Information Theory, IEEE Transactions on, Volume: 14 Issue: 6, Nov 1968.
-
(1968)
Information Theory, IEEE Transactions on
, vol.14
, Issue.6
-
-
Kasami, T.1
Lin, S.2
Peterson, W.3
-
20
-
-
12744271745
-
Applications of toral automorphisms in image watermarking
-
16-19 Sept.
-
G. Voyatzis and I. Pitas, 'Applications of toral automorphisms in image watermarking," Image Processing, 1996, Proceedings, International Conference on, Volume: 1, 16-19 Sept. 1996.
-
(1996)
Image Processing, 1996, Proceedings, International Conference on
, vol.1
-
-
Voyatzis, G.1
Pitas, I.2
|