-
1
-
-
0742288850
-
A watermarking scheme based on principal component analysis technique
-
Chang C.C., and Chan C.S. A watermarking scheme based on principal component analysis technique. Informatica 14 4 (2003) 431-444
-
(2003)
Informatica
, vol.14
, Issue.4
, pp. 431-444
-
-
Chang, C.C.1
Chan, C.S.2
-
2
-
-
0000335798
-
Digital watermarking of images using neural networks
-
Hwang M.S., Chang C.C., and Hwang K.F. Digital watermarking of images using neural networks. J. Electron. Imaging 9 4 (2000) 548-555
-
(2000)
J. Electron. Imaging
, vol.9
, Issue.4
, pp. 548-555
-
-
Hwang, M.S.1
Chang, C.C.2
Hwang, K.F.3
-
3
-
-
23844453141
-
Watermarking text document images using edge direction histograms
-
Kim Y.W., and Oh I.S. Watermarking text document images using edge direction histograms. Pattern Recognition Lett. 25 11 (2004) 1243-1251
-
(2004)
Pattern Recognition Lett.
, vol.25
, Issue.11
, pp. 1243-1251
-
-
Kim, Y.W.1
Oh, I.S.2
-
4
-
-
0036556071
-
Combinational image watermarking in the spatial and frequency domains
-
Shih F.Y., and Wu S.Y.T. Combinational image watermarking in the spatial and frequency domains. Pattern Recognition 36 4 (2003) 969-975
-
(2003)
Pattern Recognition
, vol.36
, Issue.4
, pp. 969-975
-
-
Shih, F.Y.1
Wu, S.Y.T.2
-
5
-
-
0345356532
-
A color image watermarking scheme based on color quantization
-
Tsai P.Y., Hu Y.C., and Chang C.C. A color image watermarking scheme based on color quantization. Signal Process. 84 4 (2004) 95-106
-
(2004)
Signal Process.
, vol.84
, Issue.4
, pp. 95-106
-
-
Tsai, P.Y.1
Hu, Y.C.2
Chang, C.C.3
-
6
-
-
12344332735
-
An adjusted-purpose digital watermarking technique
-
Wu Y.T., and Shih Y.F. An adjusted-purpose digital watermarking technique. Pattern Recognition 37 12 (2004) 2349-2359
-
(2004)
Pattern Recognition
, vol.37
, Issue.12
, pp. 2349-2359
-
-
Wu, Y.T.1
Shih, Y.F.2
-
7
-
-
0036611838
-
Hierarchical watermarking for secure image authentication with localization
-
Celik M.U., Sharmar G., and Tekalp A.M. Hierarchical watermarking for secure image authentication with localization. IEEE Trans. Image Process. 11 6 (2002) 585-594
-
(2002)
IEEE Trans. Image Process.
, vol.11
, Issue.6
, pp. 585-594
-
-
Celik, M.U.1
Sharmar, G.2
Tekalp, A.M.3
-
8
-
-
0035248504
-
A robust image authentication method distinguishing JPEG compression from malicious manipulation
-
Lin C.Y., and Chang S.F. A robust image authentication method distinguishing JPEG compression from malicious manipulation. IEEE Trans. Circuits Syst. Video Technol. 11 2 (2001) 153-168
-
(2001)
IEEE Trans. Circuits Syst. Video Technol.
, vol.11
, Issue.2
, pp. 153-168
-
-
Lin, C.Y.1
Chang, S.F.2
-
9
-
-
0034140535
-
Fault resilient and compression tolerant digital signature for image authentication
-
Lou D.C., and Liu J.L. Fault resilient and compression tolerant digital signature for image authentication. IEEE Trans. Consumer Electron. 46 1 (2000) 31-39
-
(2000)
IEEE Trans. Consumer Electron.
, vol.46
, Issue.1
, pp. 31-39
-
-
Lou, D.C.1
Liu, J.L.2
-
10
-
-
0037818310
-
Structural digital signature for image authentication: an incidental distortion resistant scheme
-
Lu C.S., and Liao H.Y. Structural digital signature for image authentication: an incidental distortion resistant scheme. IEEE Trans. Multimedia 5 2 (2003) 161-173
-
(2003)
IEEE Trans. Multimedia
, vol.5
, Issue.2
, pp. 161-173
-
-
Lu, C.S.1
Liao, H.Y.2
-
11
-
-
0142029533
-
Using set partitioning in hierarchical trees to authenticate digital image
-
Tsai P.Y., Hu Y.C., and Chang C.C. Using set partitioning in hierarchical trees to authenticate digital image. Signal Process.: Image Commun. J. 18 (2003) 813-822
-
(2003)
Signal Process.: Image Commun. J.
, vol.18
, pp. 813-822
-
-
Tsai, P.Y.1
Hu, Y.C.2
Chang, C.C.3
-
12
-
-
0035473831
-
Secret and public key image watermarking schemes for image authentication and ownership verification
-
Wong P.W., and Memon N. Secret and public key image watermarking schemes for image authentication and ownership verification. IEEE Trans. Image Process. 10 10 (2001) 1593-1601
-
(2001)
IEEE Trans. Image Process.
, vol.10
, Issue.10
, pp. 1593-1601
-
-
Wong, P.W.1
Memon, N.2
-
13
-
-
84943817322
-
Error detecting and error correcting codes
-
Hamming R.W. Error detecting and error correcting codes. Bell Syst. Tech. J. 26 2 (1950) 147-160
-
(1950)
Bell Syst. Tech. J.
, vol.26
, Issue.2
, pp. 147-160
-
-
Hamming, R.W.1
-
14
-
-
33750304588
-
-
G. Voyatzis, I. Pitas, Chaotic mixing of digital images and applications to watermarking, Proceedings of European Conference on Multimedia Applications, vol. 2, 1996, pp. 687-695.
-
-
-
|