-
4
-
-
0034444578
-
Robust image hashing
-
Vancouver, BC, Canada, Sep.
-
R. Venkatesan, S. M. Koon, M. H. Jakubowski, and P. Moulin, "Robust image hashing," in Proc. IEEE Int. Conf. Image Processing, Vancouver, BC, Canada, Sep. 2000, vol. 3, pp. 664-666.
-
(2000)
Proc. IEEE Int. Conf. Image Processing
, vol.3
, pp. 664-666
-
-
Venkatesan, R.1
Koon, S.M.2
Jakubowski, M.H.3
Moulin, P.4
-
5
-
-
0010800239
-
A tool for robust audio information hiding: A perceptual audio hashing algorithm
-
Pittsburgh, PA, Apr.
-
M. K. Mihçak and R. Venkatesan, "A tool for robust audio information hiding: A perceptual audio hashing algorithm," in Proc. 4th Int. Information Hiding Workshop, Pittsburgh, PA, Apr. 2001.
-
(2001)
Proc. 4th Int. Information Hiding Workshop
-
-
Mihçak, M.K.1
Venkatesan, R.2
-
6
-
-
20444458213
-
Image authentication surviving acceptable modifications
-
Baltimore, MD, Jun.
-
C. Kailasanathan, R. S. Naini, and P. Ogunbona, "Image authentication surviving acceptable modifications," in Proc. IEEE-EURASIP Workshop on Nonlinear Signal Image Processing, Baltimore, MD, Jun. 2001.
-
(2001)
Proc. IEEE-EURASIP Workshop on Nonlinear Signal Image Processing
-
-
Kailasanathan, C.1
Naini, R.S.2
Ogunbona, P.3
-
7
-
-
18744436068
-
Multimedia content authentication: Fundamental limits
-
Rochester, NY, Sep.
-
E. Martinen and G. W. Wornell, "Multimedia content authentication: fundamental limits," in Proc. IEEE Int. Conf. Image Processing, Rochester, NY, Sep. 2002, vol. 2, pp. 17-20.
-
(2002)
Proc. IEEE Int. Conf. Image Processing
, vol.2
, pp. 17-20
-
-
Martinen, E.1
Wornell, G.W.2
-
8
-
-
84944325291
-
An extendible hash for multi-precision similarity querying of image databases
-
Roma, Italy
-
S. Lin, M. T. Ozsu, V. Oria, and R. Ng, "An extendible hash for multi-precision similarity querying of image databases," in Proc. 27th Very Large. Data Bases (VLDB) Conf., Roma, Italy, 2001.
-
(2001)
Proc. 27th Very Large. Data Bases (VLDB) Conf.
-
-
Lin, S.1
Ozsu, M.T.2
Oria, V.3
Ng, R.4
-
9
-
-
0003302360
-
Public watermarks and resistance to tampering
-
Santa Barbara, CA, Oct.
-
I. J. Cox and J.-P. M. G. Linnartz, "Public watermarks and resistance to tampering," in Proc. IEEE Int. Conf. Image Processing, Santa Barbara, CA, Oct. 1997, vol. 3, pp. 3-6.
-
(1997)
Proc. IEEE Int. Conf. Image Processing
, vol.3
, pp. 3-6
-
-
Cox, I.J.1
Linnartz, J.-P.M.G.2
-
10
-
-
4544313881
-
Design and statistical analysis of a hashaided image watermarking system
-
Oct.
-
J. Cannons and P. Moulin, "Design and statistical analysis of a hashaided image watermarking system," IEEE Trans. Image Process., vol. 13, no. 10, pp. 1393-1408, Oct. 2004.
-
(2004)
IEEE Trans. Image Process.
, vol.13
, Issue.10
, pp. 1393-1408
-
-
Cannons, J.1
Moulin, P.2
-
11
-
-
0005060102
-
On the need for image dependent keys for watermarking
-
Newark, NJ, May
-
M. Holliman, N. Memon, and M. M. Yeung, "On the need for image dependent keys for watermarking," in Proc. Content Security and Data Hiding in Digital Media, Newark, NJ, May 1999.
-
(1999)
Proc. Content Security and Data Hiding in Digital Media
-
-
Holliman, M.1
Memon, N.2
Yeung, M.M.3
-
12
-
-
13144275283
-
Statistical invisibility for collusion-resistant digital video watermarking
-
Feb.
-
K. Su, D. Kundur, and D. Hatzinakos, "Statistical invisibility for collusion-resistant digital video watermarking," IEEE Trans. Multimedia, vol. 7, no. 1, pp. 43-51, Feb. 2004.
-
(2004)
IEEE Trans. Multimedia
, vol.7
, Issue.1
, pp. 43-51
-
-
Su, K.1
Kundur, D.2
Hatzinakos, D.3
-
14
-
-
13344259923
-
Image hashing resilient to geometric and filtering operations
-
Siena, Italy, Sep.
-
A. Swaminathan, Y. Mao, and M. Wu, "Image hashing resilient to geometric and filtering operations," in Proc. IEEE Workshop on Multimedia Signal Processing, Siena, Italy, Sep. 2004.
-
(2004)
Proc. IEEE Workshop on Multimedia Signal Processing
-
-
Swaminathan, A.1
Mao, Y.2
Wu, M.3
-
15
-
-
33744719212
-
Security of feature extraction in image hashing
-
Philadelphia, PA, Mar.
-
_, "Security of feature extraction in image hashing," in Proc. IEEE Int. Conf. Acoustic, Speech Signal Processing, Philadelphia, PA, Mar. 2005.
-
(2005)
Proc. IEEE Int. Conf. Acoustic, Speech Signal Processing
-
-
-
17
-
-
13344261646
-
RASH: RAdon soft hash algorithm
-
Toulouse, France
-
F. Lefbvre, B. Macq, and J.-D. Legat, "RASH: RAdon Soft Hash algorithm," in Proc. EUSIPCO, Toulouse, France, 2002.
-
(2002)
Proc. EUSIPCO
-
-
Lefbvre, F.1
Macq, B.2
Legat, J.-D.3
-
18
-
-
0035362493
-
Approximate image message authentication codes
-
Jun.
-
L. Xie, G. R. Arce, and R. F. Graveman, "Approximate image message authentication codes," IEEE Trans. Multimedia, vol. 3, no. 2, pp. 242-252, Jun. 2001.
-
(2001)
IEEE Trans. Multimedia
, vol.3
, Issue.2
, pp. 242-252
-
-
Xie, L.1
Arce, G.R.2
Graveman, R.F.3
-
19
-
-
0344703991
-
A robust soft hash algorithm or digital image signature
-
Barcelona, Spain, Sep.
-
F. Lefbvre, J. Czyz, and B. Macq, "A robust soft hash algorithm or digital image signature," in Proc. IEEE Int. Conf. Image Processing, Barcelona, Spain, Sep. 2003, vol. 2, pp. 495-498.
-
(2003)
Proc. IEEE Int. Conf. Image Processing
, vol.2
, pp. 495-498
-
-
Lefbvre, F.1
Czyz, J.2
Macq, B.3
-
20
-
-
20444500587
-
Robust perceptual image hashing via matrix invariants
-
Singapore, Oct.
-
S. S. Kozat, R. Venkatesan, and M. K. Mihçak, "Robust perceptual image hashing via matrix invariants," in Proc. IEEE Int. Conf. Image Processing, Singapore, Oct. 2004, vol. 5, pp. 3443-3446.
-
(2004)
Proc. IEEE Int. Conf. Image Processing
, vol.5
, pp. 3443-3446
-
-
Kozat, S.S.1
Venkatesan, R.2
Mihçak, M.K.3
-
21
-
-
33744760329
-
The randlet transform: Applications to universal perceptual hashing and image authentication
-
Monticello, IL
-
M. Malkin and R. Venkatesan, "The randlet transform: Applications to universal perceptual hashing and image authentication," in Proc. Allerton Conf., Monticello, IL, 2004.
-
(2004)
Proc. Allerton Conf.
-
-
Malkin, M.1
Venkatesan, R.2
-
22
-
-
0033704682
-
Visual hash for oblivious watermarking
-
San Jose, CA, Jan.
-
J. Fridrich, "Visual hash for oblivious watermarking," in Proc. IS&T/SPIE 12th Annu. Symp., Electmnic Imaging, Security and Watermarking of Multimedia Content II, San Jose, CA, Jan. 2000, vol. 3971.
-
(2000)
Proc. IS&T/SPIE 12th Annu. Symp., Electmnic Imaging, Security and Watermarking of Multimedia Content II
, vol.3971
-
-
Fridrich, J.1
-
24
-
-
0030409375
-
A robust content based digital signature for image authentication
-
Lausanne, Switzerland, Sep.
-
M. Schneider and S.-F. Chang, "A robust content based digital signature for image authentication," in Proc. IEEE Int. Conf. Image Processing, Lausanne, Switzerland, Sep. 1996, vol. 3, pp. 227-230.
-
(1996)
Proc. IEEE Int. Conf. Image Processing
, vol.3
, pp. 227-230
-
-
Schneider, M.1
Chang, S.-F.2
-
25
-
-
0036563560
-
Robust color histogram descriptors for video segment retrieval and identification
-
May
-
A. M. Ferman, A. M. Tekalp, and R. Mehrotra, "Robust color histogram descriptors for video segment retrieval and identification," IEEE Trans. Image Process., vol. 11, no. 5, pp. 497-508, May 2002.
-
(2002)
IEEE Trans. Image Process.
, vol.11
, Issue.5
, pp. 497-508
-
-
Ferman, A.M.1
Tekalp, A.M.2
Mehrotra, R.3
-
26
-
-
2442604338
-
An efficient and effective region-based image retrieval framework
-
May
-
F. Jing, M. Li, H.-J. Zhang, and B. Zhang, "An efficient and effective region-based image retrieval framework," IEEE Trans. Image Process., vol. 13, no. 5, pp. 699-709, May 2004.
-
(2004)
IEEE Trans. Image Process.
, vol.13
, Issue.5
, pp. 699-709
-
-
Jing, F.1
Li, M.2
Zhang, H.-J.3
Zhang, B.4
-
28
-
-
0035248504
-
A robust image authentication method distinguishing JPEG compression from malicious manipulation
-
Feb.
-
C.-Y. Lin and S.-F. Chang, "A robust image authentication method distinguishing JPEG compression from malicious manipulation," IEEE Trans. Circuits Syst. Video Technology, vol. 11, no. 2, pp. 153-168, Feb. 2001.
-
(2001)
IEEE Trans. Circuits Syst. Video Technology
, vol.11
, Issue.2
, pp. 153-168
-
-
Lin, C.-Y.1
Chang, S.-F.2
-
29
-
-
0032308292
-
Compression tolerant image authentication
-
Chicago, IL, Oct.
-
S. Bhattacharjee and M. Kutter, "Compression tolerant image authentication," in Proc. IEEE Int. Conf. Image Processing, Chicago, IL, Oct. 1998, vol. 1, pp. 435-439.
-
(1998)
Proc. IEEE Int. Conf. Image Processing
, vol.1
, pp. 435-439
-
-
Bhattacharjee, S.1
Kutter, M.2
-
30
-
-
0242576290
-
On the security of the visual hash function
-
San Jose, CA
-
R. Radhakrishnan, Z. Xiong, and N. Memom, "On the security of the visual hash function," in Proc. SPIE - Security and Watermarking of Multimedia Contents V, San Jose, CA, 2003, vol. 5020.
-
(2003)
Proc. SPIE - Security and Watermarking of Multimedia Contents V
, vol.5020
-
-
Radhakrishnan, R.1
Xiong, Z.2
Memom, N.3
-
31
-
-
8844285948
-
Analysis of a wavelet based robust hash algorithm
-
San Jose, CA
-
A. Meixner and A. Uhl, "Analysis of a wavelet based robust hash algorithm," in Proc. SPIE-IS&T - Security, Steganography Watermarking of Multimedia Contents VI, San Jose, CA, 2004, vol. 5306.
-
(2004)
Proc. SPIE-IS&T - Security, Steganography Watermarking of Multimedia Contents VI
, vol.5306
-
-
Meixner, A.1
Uhl, A.2
-
32
-
-
0344271942
-
Dither-based secure image zhashing using distributed coding
-
Barcelona, Spain, Sep.
-
M. Johnson and K. Ramachandran, "Dither-based secure image zhashing using distributed coding," in Proc. IEEE Int. Conf. Image Processing, Barcelona, Spain, Sep. 2003, vol. 2, pp. 751-754.
-
(2003)
Proc. IEEE Int. Conf. Image Processing
, vol.2
, pp. 751-754
-
-
Johnson, M.1
Ramachandran, K.2
-
34
-
-
0031365813
-
Rotation, scale and translation invariant digital image watermarking
-
Santa Barbara, CA, Oct.
-
J. J. K. O'Ruanaidh and T. Pun, "Rotation, scale and translation invariant digital image watermarking," in Proc. IEEE Int. Conf. Image Processing, Santa Barbara, CA, Oct. 1997, vol. 1, pp. 536-539.
-
(1997)
Proc. IEEE Int. Conf. Image Processing
, vol.1
, pp. 536-539
-
-
O'Ruanaidh, J.J.K.1
Pun, T.2
-
35
-
-
0035335388
-
Rotation, scale, and translation resilient public watermarking for images
-
May
-
C.-Y. Lin, M. Wu, J. A. Bloom, M. L. Miller, I. J. Cox, and Y.-M. Lui, "Rotation, scale, and translation resilient public watermarking for images," IEEE Trans. Image Process., vol. 10, no. 5, pp. 767-782, May 2001.
-
(2001)
IEEE Trans. Image Process.
, vol.10
, Issue.5
, pp. 767-782
-
-
Lin, C.-Y.1
Wu, M.2
Bloom, J.A.3
Miller, M.L.4
Cox, I.J.5
Lui, Y.-M.6
-
38
-
-
0016882596
-
The rate-distortion function for source coding with side information at the decoder
-
Jan.
-
A. Wyner and J. Ziv, "The rate-distortion function for source coding with side information at the decoder," IEEE Trans. Inform. Theory, vol. IT-22, no. 1, pp. 1-10, Jan. 1976.
-
(1976)
IEEE Trans. Inform. Theory
, vol.IT-22
, Issue.1
, pp. 1-10
-
-
Wyner, A.1
Ziv, J.2
-
39
-
-
84957877979
-
Attacks on copyright marking systems
-
Apr. Proc. Lecture Notes Comput. Sci. 1525. New York, Springer-Verlag, 3-540-65 386-4
-
F. A. P. Petitcolas, R. J. Anderson, and M. G. Kuhn, "Attacks on copyright marking systems," Second International Workshop on Information Hiding (IHW) Apr. 1998, Proc. Lecture Notes Comput. Sci. 1525. New York, Springer-Verlag, 3-540-65 386-4, pp. 219-239.
-
(1998)
Second International Workshop on Information Hiding (IHW)
, pp. 219-239
-
-
Petitcolas, F.A.P.1
Anderson, R.J.2
Kuhn, M.G.3
-
40
-
-
0036755019
-
On the design of content-based multimedia authentication systems
-
Sep.
-
C. W. Wu, "On the design of content-based multimedia authentication systems," IEEE Trans. Multimedia, vol. 4, no. 3, pp. 385-393, Sep. 2002.
-
(2002)
IEEE Trans. Multimedia
, vol.4
, Issue.3
, pp. 385-393
-
-
Wu, C.W.1
-
44
-
-
84890522850
-
Communication theory of secrecy systems
-
C. E. Shannon, "Communication theory of secrecy systems," Bell System Tech. J., vol. 28-4, pp. 656-715, 1949.
-
(1949)
Bell System Tech. J.
, vol.28
, Issue.4
, pp. 656-715
-
-
Shannon, C.E.1
|