-
1
-
-
0036709226
-
Geometrically invariant watermarking using feature point
-
P. Bas, J.M. Chassery, B. Macq, "Geometrically Invariant Watermarking Using Feature Point", IEEE TRansactions on Image Processing, vol 11, no 9, pp 1014-1028, 2002.
-
(2002)
IEEE TRansactions on Image Processing
, vol.11
, Issue.9
, pp. 1014-1028
-
-
Bas, P.1
Chassery, J.M.2
Macq, B.3
-
2
-
-
0026990175
-
Fast parallel discrete approximation algorithms for the radon transform
-
Martin L. Brady and Whanki Yong, "Fast Parallel Discrete Approximation Algorithms for the Radon Transform", SPAA, 1992, pp.91-99.
-
(1992)
SPAA
, pp. 91-99
-
-
Brady, M.L.1
Yong, W.2
-
3
-
-
0032308292
-
Compression tolerant image authentication
-
Chicago, USA, October
-
S. Bhattacharjee, M. Kutter, "Compression Tolerant Image Authentication", in the proceedings of the 5th IEEE International Conference on Image Processing, pp 435439, Chicago, USA, October 1998.
-
(1998)
Proceedings of the 5th IEEE International Conference on Image Processing
, pp. 435439
-
-
Bhattacharjee, S.1
Kutter, M.2
-
4
-
-
84962762130
-
Robust hash functions for digital watermarking
-
Las Vegas, USA
-
J. Fridrich, M. Goljan, "Robust Hash Functions for Digital Watermarking," in the proceedings of/TTC 2000, Las Vegas, USA, 2000.
-
(2000)
Proceedings Of/TTC 2000
-
-
Fridrich, J.1
Goljan, M.2
-
5
-
-
0033704682
-
Visual hash for oblivious watermarking
-
San Jose, CA, USA
-
J. Fridrich, M. Goljan, "Visual Hash for Oblivious Watermarking", in the proceedings of SPIE 2000, Security and Watermarking of Multimedia Content, pp 286-294, San Jose, CA, USA, 2000.
-
(2000)
Proceedings of SPIE 2000, Security and Watermarking of Multimedia Content
, pp. 286-294
-
-
Fridrich, J.1
Goljan, M.2
-
6
-
-
85032751217
-
Why watermarking is nonsense?
-
September
-
C. Herley, "Why Watermarking is Nonsense?", IEEE Signal Processing Magazine, no 5, pp 1011, September 2002.
-
(2002)
IEEE Signal Processing Magazine
, Issue.5
, pp. 1011
-
-
Herley, C.1
-
8
-
-
6344278566
-
Generating robust digital signature for image/video authentication
-
ACM Multimedia, Bristol, UK, September
-
C. Lin, S. Chang, "Generating Robust Digital Signature for Image/Video Authentication", in the proceedings of Multimedia and Security Workshop, ACM Multimedia, Bristol, UK, September 1998.
-
(1998)
Proceedings of Multimedia and Security Workshop
-
-
Lin, C.1
Chang, S.2
-
9
-
-
0035248504
-
A robust image authentication method distinguishing JPEG compression from malicious manipulation
-
February
-
C. Lin, S. Chang, "A Robust Image Authentication Method Distinguishing JPEG Compression from Malicious Manipulation", IEEE Transactions on Circuits and Systems for Video Technology, February 2001.
-
(2001)
IEEE Transactions on Circuits and Systems for Video Technology
-
-
Lin, C.1
Chang, S.2
-
11
-
-
0035765566
-
Visual hashing of digital video: Applications and techniques
-
SAn Diego, USA, August
-
J. Oostveen, T. Kalker, J. Haitsma, "Visual Hashing of Digital Video: applications and techniques", SPIE Applications of Digital Image Processing, SAn Diego, USA, August 2001.
-
(2001)
SPIE Applications of Digital Image Processing
-
-
Oostveen, J.1
Kalker, T.2
Haitsma, J.3
-
12
-
-
0012057427
-
-
"USC-SIPI image database", available at http://sipi.usc.edu/ services/database/Database.html
-
USC-SIPI Image Database
-
-
-
13
-
-
0034444578
-
Robust image hashing
-
R. Venkatesan, S.M. Koon, M.H. Jakubowski, P. Moulin, "Robust image hashing", Proceedings of the International Conference on Image Processing (ICIP), 2000.
-
(2000)
Proceedings of the International Conference on Image Processing (ICIP)
-
-
Venkatesan, R.1
Koon, S.M.2
Jakubowski, M.H.3
Moulin, P.4
|