-
1
-
-
0036544390
-
Toward secure public-key blockwise fragile authentication watermarking
-
P.S.L.M. Barreto, H.Y. Kim, and V. Rijmen Toward secure public-key blockwise fragile authentication watermarking IEE Proc. Vision, Image Signal Process. 149 2 2002 57 62
-
(2002)
IEE Proc. Vision, Image Signal Process.
, vol.149
, Issue.2
, pp. 57-62
-
-
Barreto, P.S.L.M.1
Kim, H.Y.2
Rijmen, V.3
-
2
-
-
0036611838
-
Hierarchical watermarking for secure image authentication with localization
-
M.U. Celik, G. Sharma, E. Saber, and A.M. Tekalp Hierarchical watermarking for secure image authentication with localization IEEE Trans. Image Process. 11 6 2002 585 595
-
(2002)
IEEE Trans. Image Process.
, vol.11
, Issue.6
, pp. 585-595
-
-
Celik, M.U.1
Sharma, G.2
Saber, E.3
Tekalp, A.M.4
-
3
-
-
0036489322
-
A data-hiding technique with authentication, integration, and confidentiality for electronic patient records
-
H.M. Chao, C.M. Hsu, and S.G. Miaou A data-hiding technique with authentication, integration, and confidentiality for electronic patient records IEEE Trans. Inf. Technol. Biomed. 6 1 2002 46 53
-
(2002)
IEEE Trans. Inf. Technol. Biomed.
, vol.6
, Issue.1
, pp. 46-53
-
-
Chao, H.M.1
Hsu, C.M.2
Miaou, S.G.3
-
4
-
-
0034848594
-
Blind watermarking applied to image authentication
-
Salt Lake City, UT
-
Eggers, J., Girod, B., 2001. Blind watermarking applied to image authentication. In: Proceedings of IEEE International Conference on Acoustics, Speech and Signal Processing, Salt Lake City, UT, 3, pp. 1977-1980.
-
(2001)
Proceedings of IEEE International Conference on Acoustics, Speech and Signal Processing
, vol.3
, pp. 1977-1980
-
-
Eggers, J.1
Girod, B.2
-
5
-
-
1542752845
-
Applying projection and B-spline to image authentication and remedy
-
C.H. Lin, and W.S. Hsieh Applying projection and B-spline to image authentication and remedy IEEE Trans. Consumer Electron. 49 4 2003 1234 1239
-
(2003)
IEEE Trans. Consumer Electron.
, vol.49
, Issue.4
, pp. 1234-1239
-
-
Lin, C.H.1
Hsieh, W.S.2
-
6
-
-
0035248504
-
A robust image authentication method distinguishing JPEG compression from malicious manipulation
-
C.Y. Lin, and S.F. Chang A robust image authentication method distinguishing JPEG compression from malicious manipulation IEEE Trans. Circ. Systems Video Technol. 11 2 2001 153 168
-
(2001)
IEEE Trans. Circ. Systems Video Technol.
, vol.11
, Issue.2
, pp. 153-168
-
-
Lin, C.Y.1
Chang, S.F.2
-
7
-
-
0037818310
-
Structural digital signature for image authentication: An incidental distortion resistant scheme
-
C.S. Lu, and H.Y.M. Liao Structural digital signature for image authentication: An incidental distortion resistant scheme IEEE Trans. Multimedia 5 2 2003 161 173
-
(2003)
IEEE Trans. Multimedia
, vol.5
, Issue.2
, pp. 161-173
-
-
Lu, C.S.1
Liao, H.Y.M.2
-
8
-
-
0035372202
-
Lossless image compression and encryption using SCAN
-
S.S. Maniccam, and N. Bourbakis Lossless image compression and encryption using SCAN Pattern Recognition 34 6 2001 1229 1245
-
(2001)
Pattern Recognition
, vol.34
, Issue.6
, pp. 1229-1245
-
-
Maniccam, S.S.1
Bourbakis, N.2
-
9
-
-
0348108146
-
Lossless compression and information hiding in images
-
S.S. Maniccam, and N. Bourbakis Lossless compression and information hiding in images Pattern Recognition 37 3 2004 475 486
-
(2004)
Pattern Recognition
, vol.37
, Issue.3
, pp. 475-486
-
-
Maniccam, S.S.1
Bourbakis, N.2
-
10
-
-
0035097432
-
Authentication of digital images and video: Generic models and a new contribution
-
M.P. Queluz Authentication of digital images and video: Generic models and a new contribution Signal Process.: Image Comm. 16 5 2001 461 475
-
(2001)
Signal Process.: Image Comm.
, vol.16
, Issue.5
, pp. 461-475
-
-
Queluz, M.P.1
-
12
-
-
84997769409
-
A digital watermark
-
Austin, Texas
-
Schyndel, R.G., Tirkel, A.Z., Osbome, C.F., 1994. A digital watermark. In: Proceedings of the IEEE International Conference on Image Processing, Austin, Texas, vol. 2, pp. 86-90.
-
(1994)
Proceedings of the IEEE International Conference on Image Processing
, vol.2
, pp. 86-90
-
-
Schyndel, R.G.1
Tirkel, A.Z.2
Osbome, C.F.3
-
13
-
-
0142029533
-
Using set partitioning in hierarchical tree to authenticate digital images
-
P. Tsai, Y.C. Hu, and C.C. Chang Using set partitioning in hierarchical tree to authenticate digital images Signal Process.: Image Comm. 18 9 2003 813 822
-
(2003)
Signal Process.: Image Comm.
, vol.18
, Issue.9
, pp. 813-822
-
-
Tsai, P.1
Hu, Y.C.2
Chang, C.C.3
-
14
-
-
0029292158
-
Information authentication for a slippery new age
-
S. Walton Information authentication for a slippery new age Dr. Dobbs J. 20 4 1995 18 26
-
(1995)
Dr. Dobbs J.
, vol.20
, Issue.4
, pp. 18-26
-
-
Walton, S.1
-
15
-
-
0030387424
-
A watermark for digital images
-
Lausanne, Switzerland
-
Wolfgang, R.B., Delp, E.J., 1996. A watermark for digital images. In: Proceedings of IEEE International Conference on Image Processing, Lausanne, Switzerland, vol. 3, pp. 219-222.
-
(1996)
Proceedings of IEEE International Conference on Image Processing
, vol.3
, pp. 219-222
-
-
Wolfgang, R.B.1
Delp, E.J.2
-
16
-
-
0032312612
-
A public key watermark for image verification and authentication
-
Chicago, IL
-
Wong, P.W., 1998. A public key watermark for image verification and authentication. In: Proceedings of IEEE International Conference on Image Processing, Chicago, IL, vol. 1, pp. 425-429.
-
(1998)
Proceedings of IEEE International Conference on Image Processing
, vol.1
, pp. 425-429
-
-
Wong, P.W.1
-
17
-
-
0035473831
-
Secret and public key image watermarking schemes for image authentication and ownership verification
-
P.W. Wong, and N. Memon Secret and public key image watermarking schemes for image authentication and ownership verification IEEE Trans. Image Process. 10 10 2001 1593 1601
-
(2001)
IEEE Trans. Image Process.
, vol.10
, Issue.10
, pp. 1593-1601
-
-
Wong, P.W.1
Memon, N.2
-
18
-
-
0036755019
-
On the design of content-based multimedia authentication systems
-
C.W. Wu On the design of content-based multimedia authentication systems IEEE Trans. Multimedia 4 3 2002 385 393
-
(2002)
IEEE Trans. Multimedia
, vol.4
, Issue.3
, pp. 385-393
-
-
Wu, C.W.1
|