-
1
-
-
0037818310
-
"Structural digital signature for image authentication: An incidental distortion resistant scheme"
-
C. S. Lu and H. Y. Mark Liao, "Structural digital signature for image authentication: an incidental distortion resistant scheme," IEEE Trans. Multimedia 5(2), 161-173 (2003).
-
(2003)
IEEE Trans. Multimedia
, vol.5
, Issue.2
, pp. 161-173
-
-
Lu, C.S.1
Mark Liao, H.Y.2
-
2
-
-
0142029533
-
"Using set partitioning in hierarchical trees to authenticate digital images"
-
P. Tsai, Y. C. Hu, and C. C. Chang, "Using set partitioning in hierarchical trees to authenticate digital images," Signal Process. Image Commun. 18(9), 813-822 (2003).
-
(2003)
Signal Process. Image Commun.
, vol.18
, Issue.9
, pp. 813-822
-
-
Tsai, P.1
Hu, Y.C.2
Chang, C.C.3
-
3
-
-
1942517830
-
"Dual domain watermarking for authentication and compression of cultural heritage images"
-
Y. Z. Patrizio Campisi and D. Kundur, "Dual domain watermarking for authentication and compression of cultural heritage images," IEEE Trans. Image Process. 13(3), 430-448 (2004).
-
(2004)
IEEE Trans. Image Process.
, vol.13
, Issue.3
, pp. 430-448
-
-
Patrizio Campisi, Y.Z.1
Kundur, D.2
-
4
-
-
0032312612
-
"A public key watermark for image verification and authentication
-
P. W. Wong, "A public key watermark for image verification and authentication, in IEEE Int. Conf. on Image Processing, pp. 425-429 (1998).
-
(1998)
IEEE Int. Conf. on Image Processing
, pp. 425-429
-
-
Wong, P.W.1
-
5
-
-
0036488240
-
"Lossless data embedding - New paradigm in digital watermarking"
-
J. Fridrich, M. Goljan, and R. Du, "Lossless data embedding - new paradigm in digital watermarking," EURASIP J. Appl. Signal Process. 2002(2), 185-196 (2002).
-
(2002)
EURASIP J. Appl. Signal Process.
, vol.2002
, Issue.2
, pp. 185-196
-
-
Fridrich, J.1
Goljan, M.2
Du, R.3
-
6
-
-
0033872149
-
"Counterfeiting attacks on oblivious block-wise independent invisible watermarking schemes"
-
M. Holliman and N. Memon, "Counterfeiting attacks on oblivious block-wise independent invisible watermarking schemes," IEEE Trans. Image Process. 9(3), 432-441 (2000).
-
(2000)
IEEE Trans. Image Process.
, vol.9
, Issue.3
, pp. 432-441
-
-
Holliman, M.1
Memon, N.2
-
8
-
-
0036030626
-
"Security of fragile authentication watermarks with localization"
-
J. Fridrich, "Security of fragile authentication watermarks with localization," in Proc. SPIE 4615, 691-700 (2002).
-
(2002)
Proc. SPIE
, vol.4615
, pp. 691-700
-
-
Fridrich, J.1
-
9
-
-
0036611838
-
"Hierarchical watermarking for secure image authentication with localization"
-
M. U. Celik, G. Sharma, E. Saber, and A. M. Tekalp, "Hierarchical watermarking for secure image authentication with localization," IEEE Trans. Image Process. 11(6), 586-595 (2002).
-
(2002)
IEEE Trans. Image Process.
, vol.11
, Issue.6
, pp. 586-595
-
-
Celik, M.U.1
Sharma, G.2
Saber, E.3
Tekalp, A.M.4
-
10
-
-
1542752845
-
"Applying projection and B-spline to image authentication and remedy"
-
C. H. Lin and W. S. Hsieh, "Applying projection and B-spline to image authentication and remedy," IEEE Trans. Consum. Electron. 49(4), 1234-1238 (2003).
-
(2003)
IEEE Trans. Consum. Electron.
, vol.49
, Issue.4
, pp. 1234-1238
-
-
Lin, C.H.1
Hsieh, W.S.2
-
11
-
-
0347927731
-
"Detection and restoration of tampered JPEG compressed images"
-
H. C. Wu and C. C. Chang, "Detection and restoration of tampered JPEG compressed images," J. Syst. Softw. 64, 151-161 (2001).
-
(2001)
J. Syst. Softw.
, vol.64
, pp. 151-161
-
-
Wu, H.C.1
Chang, C.C.2
-
12
-
-
0038729637
-
"Detecting and restoring the tampered images based on iteration-free fractal compression"
-
C. T. Wang, T. S. Chen, and S. H. He, "Detecting and restoring the tampered images based on iteration-free fractal compression," J. Syst. Softw. 67, 131-140 (2003).
-
(2003)
J. Syst. Softw.
, vol.67
, pp. 131-140
-
-
Wang, C.T.1
Chen, T.S.2
He, S.H.3
-
14
-
-
0000412724
-
"Arithmetical properties of strongly chaotic motions"
-
I. Percival and F. Vivaldi, "Arithmetical properties of strongly chaotic motions," Physica D 25(1-3), 105-130 (1987).
-
(1987)
Physica D
, vol.25
, Issue.1-3
, pp. 105-130
-
-
Percival, I.1
Vivaldi, F.2
-
15
-
-
0032120128
-
"Digital image watermarking using mixing systems"
-
G. Voyatzis and I. Pitas, "Digital image watermarking using mixing systems," Comput. Graph. 22(4), 405-416 (1998).
-
(1998)
Comput. Graph.
, vol.22
, Issue.4
, pp. 405-416
-
-
Voyatzis, G.1
Pitas, I.2
-
16
-
-
34447577156
-
"Standard IS 10918-1 (ITU-T T.81)"
-
Joint Photographic Experts Group
-
Joint Photographic Experts Group, "Standard IS 10918-1 (ITU-T T.81)," http://www.jpeg.org
-
-
-
-
18
-
-
0001120799
-
"Image watermarking using block site selection and DCT domain constraints"
-
A. G. Bors and I. Pitas, "Image watermarking using block site selection and DCT domain constraints," Opt. Express 3(12), 512-523 (1998).
-
(1998)
Opt. Express
, vol.3
, Issue.12
, pp. 512-523
-
-
Bors, A.G.1
Pitas, I.2
-
19
-
-
0003602325
-
"The MD5 message-digest algorithm"
-
RFC 1321
-
R. Rivest, "The MD5 message-digest algorithm," RFC 1321, http://www.faqs.org/rfcs/rfc1321.html (1992).
-
(1992)
-
-
Rivest, R.1
-
20
-
-
0017930809
-
"A method for obtaining digital signatures and public-key cryptosystems"
-
R. Rivest, A. Shamir, and L. Adleman, "A method for obtaining digital signatures and public-key cryptosystems," Commun. ACM 21(2), 120-126 (1978).
-
(1978)
Commun. ACM
, vol.21
, Issue.2
, pp. 120-126
-
-
Rivest, R.1
Shamir, A.2
Adleman, L.3
|