-
1
-
-
0032785523
-
Hidden digital watermarks in images
-
1057-7149
-
Hsu, C.T., and Wu, J.I.: ' Hidden digital watermarks in images ', IEEE Trans. Image Process., 1999, 8, p. 58-68 1057-7149
-
(1999)
IEEE Trans. Image Process.
, vol.8
, pp. 58-68
-
-
Hsu, C.T.1
Wu, J.I.2
-
2
-
-
0027697301
-
The trustworthy digital camera: Restoring credibility to the photographic image
-
0098-3063
-
Friedman, G.L.: ' The trustworthy digital camera: restoring credibility to the photographic image ', IEEE Trans. Consum. Electron., 1993, 39, p. 905-910 0098-3063
-
(1993)
IEEE Trans. Consum. Electron.
, vol.39
, pp. 905-910
-
-
Friedman, G.L.1
-
3
-
-
0003231936
-
Information authentication for a slippery new images
-
1044-789X
-
Walton, S.: ' Information authentication for a slippery new images ', Dr. Dobbs J., 1995, 20, p. 16-26 1044-789X
-
(1995)
Dr. Dobbs J.
, vol.20
, pp. 16-26
-
-
Walton, S.1
-
5
-
-
0033601653
-
Fragile watermarking using the VW2D watermarks
-
Wolfgang, R., and Delp, E.J.: ' Fragile watermarking using the VW2D watermarks ', Proc. SPIE, 1999, 3657, p. 204-213
-
(1999)
Proc. SPIE
, vol.3657
, pp. 204-213
-
-
Wolfgang, R.1
Delp, E.J.2
-
6
-
-
0032117545
-
Invisible watermarking for image verification
-
0737-6553
-
Yeung, M., and Mintzer, F.: ' Invisible watermarking for image verification ', Electron. Imaging, 1998, 7, p. 578-591 0737-6553
-
(1998)
Electron. Imaging
, vol.7
, pp. 578-591
-
-
Yeung, M.1
Mintzer, F.2
-
7
-
-
0031362116
-
Secure spread spectrum watermarking for multimedia
-
10.1109/83.650120 1057-7149
-
Cox, I.J., Kilian, J., Leighton, F.T., and Shamoon, T.: ' Secure spread spectrum watermarking for multimedia ', IEEE Trans. Image Process., 1997, 6, p. 1673-1687 10.1109/83.650120 1057-7149
-
(1997)
IEEE Trans. Image Process.
, vol.6
, pp. 1673-1687
-
-
Cox, I.J.1
Kilian, J.2
Leighton, F.T.3
Shamoon, T.4
-
11
-
-
0033688392
-
Semi-fragile watermarking for authenticating JPEG visual content
-
Chang, S.F., and Lin, C.Y.: ' Semi-fragile watermarking for authenticating JPEG visual content ', Proc. SPIE, 2000, 3971, p. 140-151
-
(2000)
Proc. SPIE
, vol.3971
, pp. 140-151
-
-
Chang, S.F.1
Lin, C.Y.2
-
12
-
-
0033717154
-
Detection of image alteration using semi-fragile watermarks
-
Lin, E.T., Podilchunk, C.I., and Delp, E.J.: ' Detection of image alteration using semi-fragile watermarks ', Proc. SPIE, 2000, 3971, p. 152-163
-
(2000)
Proc. SPIE
, vol.3971
, pp. 152-163
-
-
Lin, E.T.1
Podilchunk, C.I.2
Delp, E.J.3
-
13
-
-
0035763305
-
Comparative assessment of semi-fragile watermarking techniques
-
Ekici, O., Coskun, B., Naci, U., and Sankur, B.: ' Comparative assessment of semi-fragile watermarking techniques ', Proc. SPIE, 2001, 4518, p. 177-188
-
(2001)
Proc. SPIE
, vol.4518
, pp. 177-188
-
-
Ekici, O.1
Coskun, B.2
Naci, U.3
Sankur, B.4
-
14
-
-
49549097199
-
The survey of digital watermarking-based image authentication techniques
-
Liu, T., and Qiu, Z.D.: ' The survey of digital watermarking-based image authentication techniques ', IEEE Int. Conf. on Signal Processing, 2002, p. 1556-1559
-
(2002)
IEEE Int. Conf. on Signal Processing
, pp. 1556-1559
-
-
Liu, T.1
Qiu, Z.D.2
-
15
-
-
0004026002
-
-
Morgan Kaufmann
-
Cox, I.J., Miller, M.L., and Bloom, J.A.: ' Digital watermarking ', (Morgan Kaufmann, 2002)
-
(2002)
Digital Watermarking
-
-
Cox, I.J.1
Miller, M.L.2
Bloom, J.A.3
-
16
-
-
0036488240
-
Lossless data embedding-new paradigm in digital watermarking
-
1110-8657
-
Fridrich, J., and Goljan, M.: ' Lossless data embedding-new paradigm in digital watermarking ', EURASIP J. Appl. Signal Process., 2002, 2, p. 185-196 1110-8657
-
(2002)
EURASIP J. Appl. Signal Process.
, vol.2
, pp. 185-196
-
-
Fridrich, J.1
Goljan, M.2
-
17
-
-
84961844573
-
Invertible authentication watermark for JPEG images
-
Fridrich, J., Goljan, M., and Rui, D.: ' Invertible authentication watermark for JPEG images ', Int. Conf. on Information Technology, Coding and Computing, 2001, p. 223-227
-
(2001)
Int. Conf. on Information Technology, Coding and Computing
, pp. 223-227
-
-
Fridrich, J.1
Goljan, M.2
Rui, D.3
-
18
-
-
0033701078
-
The watermark copy attack
-
Kutter, M., Voloshynovskiy, S., and Herrigel, A.: ' The watermark copy attack ', Proc. SPIE, 2000, 3971, p. 371-380
-
(2000)
Proc. SPIE
, vol.3971
, pp. 371-380
-
-
Kutter, M.1
Voloshynovskiy, S.2
Herrigel, A.3
-
19
-
-
33747135253
-
-
Lin, C.Y.: 'Bibliography of multimedia authentication research papers'. Available at http://www.ctr.columbia.edu/cylin/auth/bibauth.html
-
Lin, C.Y.: 'Bibliography of multimedia authentication research papers'. Available at http://www.ctr.columbia.edu/cylin/auth/bibauth.html
-
-
-
-
21
-
-
0035248504
-
A robust image authentication method distinguishing JPEG compression from malicious manipulation
-
1051-8215
-
Lin, C.-Y., and Chang, S.F.: ' A robust image authentication method distinguishing JPEG compression from malicious manipulation ', IEEE Trans. Circuits Syst. Video Technol., 2001, 11, p. 153-168 1051-8215
-
(2001)
IEEE Trans. Circuits Syst. Video Technol.
, vol.11
, pp. 153-168
-
-
Lin, C.-Y.1
Chang, S.F.2
-
22
-
-
0033601667
-
Content-based integrity protection of digital images
-
Queluz, M.P.: ' Content-based integrity protection of digital images ', Proc. SPIE, 1999, 3657, p. 85-93
-
(1999)
Proc. SPIE
, vol.3657
, pp. 85-93
-
-
Queluz, M.P.1
-
23
-
-
0036450244
-
Fragile and semi-fragile image authentication based on image self-similarity
-
ICIP2002
-
El-Din, S.N., and Moniri, M.: ' Fragile and semi-fragile image authentication based on image self-similarity ', ICIP2002, IEEE Int. Conf. on Image Processing, 2002, 2, p. 897-900
-
(2002)
IEEE Int. Conf. on Image Processing
, vol.2
, pp. 897-900
-
-
El-Din, S.N.1
Moniri, M.2
-
24
-
-
33747094987
-
Hierarchical signatures for semi-fragile image authentication with localization
-
VIE2003
-
El-Din, S.N., and Moniri, M.: ' Hierarchical signatures for semi-fragile image authentication with localization ', VIE2003, IEE Int. Conf. Visual Information Engineering, 2003
-
(2003)
IEE Int. Conf. Visual Information Engineering
-
-
El-Din, S.N.1
Moniri, M.2
-
25
-
-
0013410690
-
Compact representation of patterns by finite automata
-
Berstel, J., and Morcrette, M.: ' Compact representation of patterns by finite automata ', Proc. Pixim1989, 1989, p. 387-402
-
(1989)
Proc. Pixim1989
, pp. 387-402
-
-
Berstel, J.1
Morcrette, M.2
-
27
-
-
0031343598
-
Finite state transformations of images
-
Culik, K., and Kari, J.: ' Finite state transformations of images ', Comput. Graph., 1997, 34, p. 151-166
-
(1997)
Comput. Graph.
, vol.34
, pp. 151-166
-
-
Culik, K.1
Kari, J.2
-
28
-
-
0011989986
-
Generalized finite automata and transducer
-
1430-189X
-
Culik, K., and Valenta, V.: ' Generalized finite automata and transducer ', J. Autom. Lang. Combin., 1997, 2, p. 3-17 1430-189X
-
(1997)
J. Autom. Lang. Combin.
, vol.2
, pp. 3-17
-
-
Culik, K.1
Valenta, V.2
-
29
-
-
0011952395
-
Shape description using generalized finite automata for object-based video coding
-
NORSIG 2000
-
Makarov, A., and Moniri, M.: ' Shape description using generalized finite automata for object-based video coding ', NORSIG 2000, Proc. IEEE Nordic Signal Processing Symp., 2000, p. 395-398
-
(2000)
Proc. IEEE Nordic Signal Processing Symp.
, pp. 395-398
-
-
Makarov, A.1
Moniri, M.2
-
30
-
-
0011924276
-
Processing of visual binary data in compressed domain using generalized finite transducers
-
ISIMP 2001
-
Makarov, A., and Moniri, M.: ' Processing of visual binary data in compressed domain using generalized finite transducers ', ISIMP 2001, Proc. Int. Symp. on Intelligent Multimedia, Video and Speech Processing, 2001, p. 64-67
-
(2001)
Proc. Int. Symp. on Intelligent Multimedia, Video and Speech Processing
, pp. 64-67
-
-
Makarov, A.1
Moniri, M.2
-
31
-
-
33747089786
-
Secure watermarks based on image analysis in automata domain
-
WIAMS2003 4th
-
El-Din, S.N., Maguid, M.A., and Moniri, M.: ' Secure watermarks based on image analysis in automata domain ', WIAMS2003, 4th, European Workshop on Image Analysis for Multimedia Interactive Services, 2003, p. 265-270
-
(2003)
European Workshop on Image Analysis for Multimedia Interactive Services
, pp. 265-270
-
-
El-Din, S.N.1
Maguid, M.A.2
Moniri, M.3
-
33
-
-
0034509441
-
Combined watermarking for image authentication and protection
-
ICME2000
-
Lu, C.-S., Liao, H.Y., and Sze, C.-J.: ' Combined watermarking for image authentication and protection ', ICME2000, IEEE Int. Conf. on Multimedia and Expo., 2000, p. 1415-1418
-
(2000)
IEEE Int. Conf. on Multimedia and Expo.
, pp. 1415-1418
-
-
Lu, C.-S.1
Liao, H.Y.2
Sze, C.-J.3
|