-
1
-
-
0036290727
-
A new semi-fragile image authentication framework combining ECC and PKI infrastructure
-
Phoneix, USA
-
Q. Sun, S.-F. Chang, K. Maeno, and M. Suto, "A New Semi-Fragile Image Authentication Framework Combining ECC and PKI Infrastructure," in International Symposium on Circuits and Systems (ISCAS02), Phoneix, USA, 2002.
-
(2002)
International Symposium on Circuits and Systems (ISCAS02)
-
-
Sun, Q.1
Chang, S.-F.2
Maeno, K.3
Suto, M.4
-
2
-
-
0036451808
-
A quantitive semi-fragile JPEG2000 image authentication system
-
Rochester, USA
-
Q. Sun, S.-F. Chang, M. Kurato, and M. Suto, "A Quantitive Semi-Fragile JPEG2000 Image Authentication System," in International Conference on Image Processing (ICIP02), Rochester, USA, 2002.
-
(2002)
International Conference on Image Processing (ICIP02)
-
-
Sun, Q.1
Chang, S.-F.2
Kurato, M.3
Suto, M.4
-
3
-
-
0036448095
-
Semi-fragile image authentication using generic wavelet domain features and ECC
-
Rochester, USA
-
Q. Sun and S.-F. Chang, "Semi-fragile Image Authentication Using Generic Wavelet Domain Features and ECC," in International Conference on Image Processing (ICIP02), Rochester, USA, 2002.
-
(2002)
International Conference on Image Processing (ICIP02)
-
-
Sun, Q.1
Chang, S.-F.2
-
4
-
-
0035473831
-
Secret and public image watermarking schemes for image authentication and ownership verification
-
P.W. Wong and N. Memon, "Secret and Public Image Watermarking Schemes for Image Authentication and Ownership Verification," in IEEE Transactions on Image Processing, vol. 10, no. 10, 2001, pp. 1593-1601.
-
(2001)
IEEE Transactions on Image Processing
, vol.10
, Issue.10
, pp. 1593-1601
-
-
Wong, P.W.1
Memon, N.2
-
7
-
-
0027697301
-
The trustworthy digital camera: Restoring credibility to the photographic image
-
G.L. Friedman, "The Trustworthy Digital Camera: Restoring Credibility to the Photographic Image," in IEEE Transactions on Consumer Electronics, vol. 39, no. 4, 1993, pp. 905-910.
-
(1993)
IEEE Transactions on Consumer Electronics
, vol.39
, Issue.4
, pp. 905-910
-
-
Friedman, G.L.1
-
8
-
-
0029292158
-
Image authentication for aslippery new age
-
S. Walton, "Image Authentication for Aslippery New Age," in Dr. Dobb's Journal, 1995, pp. 18-26.
-
(1995)
Dr. Dobb's Journal
, pp. 18-26
-
-
Walton, S.1
-
13
-
-
0035248504
-
A robust image authentication method distinguishing JPEG compression from MaliciousManipulation
-
C.-Y. Lin and S.-F. Chang, "A Robust Image Authentication Method Distinguishing JPEG Compression from MaliciousManipulation," in IEEE Transactions on Circuits and Systems for Video Technology, vol. 11, no. 2, 2001, pp. 153-168.
-
(2001)
IEEE Transactions on Circuits and Systems for Video Technology
, vol.11
, Issue.2
, pp. 153-168
-
-
Lin, C.-Y.1
Chang, S.-F.2
-
14
-
-
0037818310
-
Structural digital signature for image authentication: An incidental distortion resistant scheme
-
C.-S. Lu and H.-Y. Mark Liao, "Structural Digital Signature for Image Authentication: An Incidental Distortion Resistant Scheme," in IEEE Trans. on Multimedia, vol. 5, no. 2, 2003, pp. 161-173.
-
(2003)
IEEE Trans. on Multimedia
, vol.5
, Issue.2
, pp. 161-173
-
-
Lu, C.-S.1
Liao, H.-Y.M.2
-
15
-
-
0033601667
-
Content based integrity protection of digital images
-
El '99, San Jose, USA
-
M.P. Queluz, "Content Based Integrity Protection of Digital Images," in SPIE International Conf. on Security and Watermarking of Multimedia Contents, vol. 3657, no. 09, El '99, San Jose, USA, 1999.
-
(1999)
SPIE International Conf. on Security and Watermarking of Multimedia Contents
, vol.3657
, Issue.9
-
-
Queluz, M.P.1
-
18
-
-
0035362493
-
Approximate image message authentication codes
-
L. Xie, G.R. Arce, and R.F. Graveman, "Approximate Image Message Authentication Codes," in IEEE Transactions on Multimedia, vol. 3, no. 2, 2001, pp. 242-252.
-
(2001)
IEEE Transactions on Multimedia
, vol.3
, Issue.2
, pp. 242-252
-
-
Xie, L.1
Arce, G.R.2
Graveman, R.F.3
-
19
-
-
0034444578
-
Robust image hashing
-
Vancouver, Canada
-
R. Venkatesan, S.-M. Koon, M.H. Jakubowski, and P. Moulin, "Robust Image Hashing," in International Conference on Image Processing'00, Vancouver, Canada, 2000.
-
(2000)
International Conference on Image Processing'00
-
-
Venkatesan, R.1
Koon, S.-M.2
Jakubowski, M.H.3
Moulin, P.4
-
21
-
-
0033686485
-
Distortion bounded authentication techniques
-
N. Memon, P. Vora, B. Yeo, and M. Yeung, "Distortion Bounded Authentication Techniques," in Proceedings of the SPIE, Security and Watermarking of Multimedia Content II, vol. 3971, 2000, pp. 164-174.
-
(2000)
Proceedings of the SPIE, Security and Watermarking of Multimedia Content II
, vol.3971
, pp. 164-174
-
-
Memon, N.1
Vora, P.2
Yeo, B.3
Yeung, M.4
-
24
-
-
33751536764
-
A content-based image authentication system with lossless data hiding
-
D. Zou, C.W. Wu, G. Xuan, and Y.Q. Shi, "A Content-Based Image Authentication System with Lossless Data Hiding," in IEEE International conference on Multimedia and Expo, 2003, pp. 213-216.
-
(2003)
IEEE International Conference on Multimedia and Expo
, pp. 213-216
-
-
Zou, D.1
Wu, C.W.2
Xuan, G.3
Shi, Y.Q.4
|