-
1
-
-
11244266383
-
The trustworthy digital camera: Restoring credibility to the photographic image
-
Chicago, IL, USA, October
-
G.I. Friedman, The trustworthy digital camera: restoring credibility to the photographic image, in: Proceedings of the IEEE International Conference on Image Processing, vol. II, Chicago, IL, USA, October 1998, pp. 409-413.
-
(1998)
Proceedings of the IEEE International Conference on Image Processing
, vol.2
, pp. 409-413
-
-
Friedman, G.I.1
-
3
-
-
0032223822
-
A robust image authentication method surviving JPEG lossy compression
-
C.Y. Lin, and S.F. Chang A robust image authentication method surviving JPEG lossy compression Proc. SPIE 3312 1998 296 307
-
(1998)
Proc. SPIE
, vol.3312
, pp. 296-307
-
-
Lin, C.Y.1
Chang, S.F.2
-
6
-
-
0032292847
-
Image watermarking for tamper detection
-
Chicago, IL, USA, October
-
J. Fridrich, Image watermarking for tamper detection, in: Proceedings of the IEEE International Conference on Image Processing, vol. II, Chicago, IL, USA, October 1998, pp. 404-408.
-
(1998)
Proceedings of the IEEE International Conference on Image Processing
, vol.2
, pp. 404-408
-
-
Fridrich, J.1
-
7
-
-
0034443602
-
New fragile authentication watermark for images
-
Vancouver, BC, Canada
-
J. Fridrich, M. Goljan, and A.C. Baldoza New fragile authentication watermark for images Proceedings of the IEEE International Conference on Image Processing Vancouver, BC, Canada September 2000 10 13
-
(2000)
Proceedings of the IEEE International Conference on Image Processing
, pp. 10-13
-
-
Fridrich, J.1
Goljan, M.2
Baldoza, A.C.3
-
8
-
-
0032304995
-
Toward a telltale watermarking technique for tamper-proofing
-
D. Kundur, D. Hatzinakos, Toward a telltale watermarking technique for tamper-proofing, in: Proceedings of the IEEE International Conference on Image Processing, vol. 2, 1998, pp. 409-413.
-
(1998)
Proceedings of the IEEE International Conference on Image Processing
, vol.2
, pp. 409-413
-
-
Kundur, D.1
Hatzinakos, D.2
-
10
-
-
0033601667
-
Content-based integrity protection of digital image
-
Bellingham, WA
-
M.P. Queluz, Content-based integrity protection of digital image, Proceedings of the SPIE, Security and Watermarking of Multimedia Contents II, vol. 3971, Bellingham, WA, 2000, pp. 85-93.
-
(2000)
Proceedings of the SPIE, Security and Watermarking of Multimedia Contents II
, vol.3971
, pp. 85-93
-
-
Queluz, M.P.1
-
11
-
-
0030409375
-
A robust content based digital signature for image authentication
-
Lausanne, Switzerland, September
-
M. Schneider, S.F. Chang, A robust content based digital signature for image authentication, in: Proceedings of the IEEE International Conference on Image Processing, vol. III, Lausanne, Switzerland, September 1996, pp. 227-230.
-
(1996)
Proceedings of the IEEE International Conference on Image Processing
, vol.3
, pp. 227-230
-
-
Schneider, M.1
Chang, S.F.2
-
13
-
-
0031378592
-
An invisible watermarking technique for image verification
-
Santa Barbara, CA, October
-
M.M. Yeung, F. Mintizer, An invisible watermarking technique for image verification, in: Proceedings of the IEEE International Conference on Image Processing, vol. I, Santa Barbara, CA, October 1997, pp. 680-683.
-
(1997)
Proceedings of the IEEE International Conference on Image Processing
, vol.1
, pp. 680-683
-
-
Yeung, M.M.1
Mintizer, F.2
-
15
-
-
0032634857
-
Multimedia watermarking techniques
-
F. Hartung, and M. Kutter Multimedia watermarking techniques Proc. IEEE 87 1999 1079 1107
-
(1999)
Proc. IEEE
, vol.87
, pp. 1079-1107
-
-
Hartung, F.1
Kutter, M.2
-
16
-
-
0032095654
-
Multimedia data embedding and watermarking technologies
-
M.D. Swanson, M. Kobayashi, and A.H. Tewfik Multimedia data embedding and watermarking technologies Proc. IEEE 86 1988 1064 1087
-
(1988)
Proc. IEEE
, vol.86
, pp. 1064-1087
-
-
Swanson, M.D.1
Kobayashi, M.2
Tewfik, A.H.3
-
17
-
-
0032625842
-
Watermarking as communications with side information
-
I.J. Cox, M.I. Miller, and A.L. Mckellips Watermarking as communications with side information Proc. IEEE 87 1999 1127 1147
-
(1999)
Proc. IEEE
, vol.87
, pp. 1127-1147
-
-
Cox, I.J.1
Miller, M.I.2
McKellips, A.L.3
-
18
-
-
0037508344
-
Invisibility and application functionalities in perceptual watermarking - An overview
-
C.De. Vleeschouwer, J.F. Delaigle, and B. Macq Invisibility and application functionalities in perceptual watermarking - an overview Proc. IEEE 90 1 2002 64 77
-
(2002)
Proc. IEEE
, vol.90
, Issue.1
, pp. 64-77
-
-
Vleeschouwer, C.De.1
Delaigle, J.F.2
Macq, B.3
-
19
-
-
0033601660
-
Fragile imperceptible digital watermark and privacy control
-
January
-
C.W. Wu, D. Coppersmith, F.C. Mintizer, C.P. Tresser, M.M. Mueng, Fragile imperceptible digital watermark and privacy control, Proceedings of the SPIE, Security and Watermarking of Multimedia Contents, vol. 3657, January 1999, pp.79-84.
-
(1999)
Proceedings of the SPIE, Security and Watermarking of Multimedia Contents
, vol.3657
, pp. 79-84
-
-
Wu, C.W.1
Coppersmith, D.2
Mintizer, F.C.3
Tresser, C.P.4
Mueng, M.M.5
-
20
-
-
0036611838
-
Hierarchical watermarking for secure image authentication with localization
-
M.U. Celik, G. Sharma, E. Saber, and A.M. Tekalp Hierarchical watermarking for secure image authentication with localization IEEE Trans. Image Process. 11 6 2002 585 594
-
(2002)
IEEE Trans. Image Process.
, vol.11
, Issue.6
, pp. 585-594
-
-
Celik, M.U.1
Sharma, G.2
Saber, E.3
Tekalp, A.M.4
-
21
-
-
0032648596
-
Digital watermarking for telltale tamper proofing and authentication
-
D. Kundur, and D. Hatzinakos Digital watermarking for telltale tamper proofing and authentication Proc. IEEE 87 1999 1167 1180
-
(1999)
Proc. IEEE
, vol.87
, pp. 1167-1180
-
-
Kundur, D.1
Hatzinakos, D.2
-
22
-
-
0034848594
-
Blind watermarking applied to image authentication
-
Salt Lake City, UT
-
J. Eggers, and B. Girod Blind watermarking applied to image authentication Proceedings of the IEEE ICASSP Salt Lake City, UT May 2001 1977 1980
-
(2001)
Proceedings of the IEEE ICASSP
, pp. 1977-1980
-
-
Eggers, J.1
Girod, B.2
-
24
-
-
0035473830
-
Multipurpose watermarking for image authentication and protection
-
C.S. Lu, and H.Y. Liao Multipurpose watermarking for image authentication and protection IEEE Trans. Image Process. 10 2001 1579 1592
-
(2001)
IEEE Trans. Image Process.
, vol.10
, pp. 1579-1592
-
-
Lu, C.S.1
Liao, H.Y.2
-
25
-
-
0033872149
-
Counterfeiting attacks on oblivious block-wise independent invisible watermarking schemes
-
M. Holliman, and N. Memon Counterfeiting attacks on oblivious block-wise independent invisible watermarking schemes IEEE Trans. Image Process. 9 2000 432 441
-
(2000)
IEEE Trans. Image Process.
, vol.9
, pp. 432-441
-
-
Holliman, M.1
Memon, N.2
-
27
-
-
0033682895
-
Secret and public key authentication schemes that resist vector quantization attack
-
P.W. Wong, and N. Memon Secret and public key authentication schemes that resist vector quantization attack Proc. SPIE 3971 75 2002 417 427
-
(2002)
Proc. SPIE
, vol.3971
, Issue.75
, pp. 417-427
-
-
Wong, P.W.1
Memon, N.2
-
28
-
-
0030386584
-
Applications of toral automorphisms in image watermarking
-
G. Voyatzis, I. Pitas, Applications of toral automorphisms in image watermarking, in: Proceedings of the International Conference on Image Processing, vol. II, 1996, pp. 237-240.
-
(1996)
Proceedings of the International Conference on Image Processing
, vol.2
, pp. 237-240
-
-
Voyatzis, G.1
Pitas, I.2
|