-
2
-
-
30744435344
-
Watermarking via optimization algorithms for quantizing randomized semi-global image statistics
-
Apr
-
K. Mihcak, R. Venkatesan, and T. Liu, "Watermarking via optimization algorithms for quantizing randomized semi-global image statistics," ACM Multimedia Systems Journal, Apr. 2005.
-
(2005)
ACM Multimedia Systems Journal
-
-
Mihcak, K.1
Venkatesan, R.2
Liu, T.3
-
3
-
-
0030409375
-
A robust content based digital signature for image authentication
-
Sept
-
M. Schneider and S. F. Chang, "A robust content based digital signature for image authentication," Proc. IEEE Conf. on Image Processing, vol. 3, pp. 227-230, Sept. 1996.
-
(1996)
Proc. IEEE Conf. on Image Processing
, vol.3
, pp. 227-230
-
-
Schneider, M.1
Chang, S.F.2
-
4
-
-
20444458213
-
Image authentication surviving acceptable modifications using statistical measures and k-mean segmentation
-
June
-
C. Kailasanathan and R. Safavi Naini, "Image authentication surviving acceptable modifications using statistical measures and k-mean segmentation," Proc. IEEE-EURASIP Work. Nonlinear Sig. and Image, June 2001.
-
(2001)
Proc. IEEE-EURASIP Work. Nonlinear Sig. and Image
-
-
Kailasanathan, C.1
Safavi Naini, R.2
-
5
-
-
0034444578
-
Robust image hashing
-
Sept
-
R. Venkatesan, S. M. Koon, M. H. Jakubowski, and P. Moulin, "Robust image hashing," Proc. IEEE Conf. on Image Processing, pp. 664-666, Sept. 2000.
-
(2000)
Proc. IEEE Conf. on Image Processing
, pp. 664-666
-
-
Venkatesan, R.1
Koon, S.M.2
Jakubowski, M.H.3
Moulin, P.4
-
6
-
-
0035248504
-
A robust image authentication system distinguishing JPEG compression from malicious manipulation
-
Feb
-
C. Y. Lin and S. F. Chang, "A robust image authentication system distinguishing JPEG compression from malicious manipulation," IEEE Trans. on Circuits and Systems for Video Technology, vol. 11, no. 2, pp. 153-168, Feb. 2001.
-
(2001)
IEEE Trans. on Circuits and Systems for Video Technology
, vol.11
, Issue.2
, pp. 153-168
-
-
Lin, C.Y.1
Chang, S.F.2
-
7
-
-
0037818310
-
Structural digital signature for image authentication
-
June
-
C.-S. Lu and H.-Y. M. Liao, "Structural digital signature for image authentication," IEEE Transactions on Multimedia, pp. 161-173, June 2003.
-
(2003)
IEEE Transactions on Multimedia
, pp. 161-173
-
-
Lu, C.-S.1
Liao, H.-Y.M.2
-
10
-
-
20444500587
-
Robust perceptual image hashing via matrix invariances
-
Oct
-
S. S. Kozat, K. Mihcak, and R. Venkatesan, "Robust perceptual image hashing via matrix invariances," Proc. IEEE Conf. on Image Processing, pp. 3443-3446, Oct. 2004.
-
(2004)
Proc. IEEE Conf. on Image Processing
, pp. 3443-3446
-
-
Kozat, S.S.1
Mihcak, K.2
Venkatesan, R.3
-
11
-
-
0032650557
-
Content based digital signature for motion picture authentication and content-fragile watermarking
-
J. Dittman, A. Steinmetz, and R. Steinmetz, "Content based digital signature for motion picture authentication and content-fragile watermarking," Proc. IEEE Int. Conf. on Multimedia Computing and Systems, pp. 209-213, 1999.
-
(1999)
Proc. IEEE Int. Conf. on Multimedia Computing and Systems
, pp. 209-213
-
-
Dittman, J.1
Steinmetz, A.2
Steinmetz, R.3
-
14
-
-
0033592606
-
Learning the parts of objects by non-negative matrix factorization
-
Oct
-
Daniel D. Lee and H. Sebastian Seung, "Learning the parts of objects by non-negative matrix factorization," Nature, vol. 401, Oct. 1999.
-
(1999)
Nature
, vol.401
-
-
Lee, D.D.1
Sebastian Seung, H.2
-
15
-
-
0042356818
-
Analyzing non-negative matrix factorization for image classification
-
Aug
-
B. Schiele D. Guillemet and J. Vitria, "Analyzing non-negative matrix factorization for image classification," IEEE Int. Conf. Pattern Recognition, vol. 2, pp. 116-119, Aug. 2002.
-
(2002)
IEEE Int. Conf. Pattern Recognition
, vol.2
, pp. 116-119
-
-
Schiele, B.1
Guillemet, D.2
Vitria, J.3
-
17
-
-
12344281227
-
Estimation of single tones from chord sounds using non-negative matrix factorization
-
July
-
T. Kawamoto, K. Hotta, T. Mishmima, J. Fujiki, M. Tanaka, and T. Kurita, "Estimation of single tones from chord sounds using non-negative matrix factorization," Neural Network World, July 2000.
-
(2000)
Neural Network World
-
-
Kawamoto, T.1
Hotta, K.2
Mishmima, T.3
Fujiki, J.4
Tanaka, M.5
Kurita, T.6
-
18
-
-
17044365507
-
Fair evaluation procedures for watermarking systems
-
"Fair evaluation procedures for watermarking systems," http://www.petitcolas.net/fabien/watermarking/stirmark, 2000.
-
(2000)
-
-
|