-
2
-
-
13244251141
-
Exposing digital forgeries by detecting traces of resampling
-
Feb.
-
A. Popescu and H. Fand, "Exposing digital forgeries by detecting traces of resampling," IEEE Trans. Signal Process., vol. 53, no. 2, pp. 758-767, Feb. 2005.
-
(2005)
IEEE Trans. Signal Process.
, vol.53
, Issue.2
, pp. 758-767
-
-
Popescu, A.1
Fand, H.2
-
3
-
-
0032095654
-
Multimedia data-embedding and watermarking technologies
-
Jun.
-
M. D. Swanson, M. Kobayashi, and A. H. Tewfik, "Multimedia data-embedding and watermarking technologies," Proc. IEEE, vol. 86, no. 6, pp. 1064-1087, Jun. 1998.
-
(1998)
Proc. IEEE
, vol.86
, Issue.6
, pp. 1064-1087
-
-
Swanson, M.D.1
Kobayashi, M.2
Tewfik, A.H.3
-
4
-
-
0032634857
-
Multimedia watermarking techniques
-
Jul.
-
F. Hartung and M. Kutter, "Multimedia watermarking techniques," Proc. IEEE, vol. 87, no. 7, pp. 1079-1107, Jul. 1999.
-
(1999)
Proc. IEEE
, vol.87
, Issue.7
, pp. 1079-1107
-
-
Hartung, F.1
Kutter, M.2
-
5
-
-
0031362116
-
Secure spread spectrum watermarking for multimedia
-
Dec.
-
I. J. Cox, J. Killian, F. T. Leighton, and T. Shamoon, "Secure spread spectrum watermarking for multimedia," IEEE Trans. Image Process., vol. 6, no. 12, pp. 1673-1687, Dec. 1997.
-
(1997)
IEEE Trans. Image Process.
, vol.6
, Issue.12
, pp. 1673-1687
-
-
Cox, I.J.1
Killian, J.2
Leighton, F.T.3
Shamoon, T.4
-
6
-
-
0035333687
-
Quantization index modulation: A class of provably good methods for digital watermarking and information embedding
-
May
-
B. Chen and G. W. Wornell, "Quantization index modulation: A class of provably good methods for digital watermarking and information embedding," IEEE Trans. Inf. Theory, vol. 47, no. 4, pp. 1423-1443, May 2001.
-
(2001)
IEEE Trans. Inf. Theory
, vol.47
, Issue.4
, pp. 1423-1443
-
-
Chen, B.1
Wornell, G.W.2
-
7
-
-
0032117545
-
Invisible watermarking for image verification
-
Jul.
-
M. Yeung and F. Mintzer, "Invisible watermarking for image verification," J. Electron. Imag., vol. 7, no. 6, pp. 578-591, Jul. 1998.
-
(1998)
J. Electron. Imag.
, vol.7
, Issue.6
, pp. 578-591
-
-
Yeung, M.1
Mintzer, F.2
-
8
-
-
0032312612
-
A public key watermark for image verification and authentication
-
Chicago, IL, Oct. 4-7
-
P. W. Wong, "A public key watermark for image verification and authentication," in Proc. IEEE Int. Conf. Image Processing, Chicago, IL, Oct. 4-7, 1998, pp. 425-429.
-
(1998)
Proc. IEEE Int. Conf. Image Processing
, pp. 425-429
-
-
Wong, P.W.1
-
9
-
-
0034443602
-
New fragile authentication watermark for images
-
Vancouver, BC, Canada, Sep. 10-13
-
J. Fridrich, M. Goljan, and A. C. Baldoza, "New fragile authentication watermark for images," in Proc. IEEE Int. Conf. Image Processing, Vancouver, BC, Canada, Sep. 10-13, 2000, pp. 446-449.
-
(2000)
Proc. IEEE Int. Conf. Image Processing
, pp. 446-449
-
-
Fridrich, J.1
Goljan, M.2
Baldoza, A.C.3
-
10
-
-
0033601660
-
Fragile imperceptible digital watermark with privacy control
-
Jan.
-
D. Coppersmith, F. C. Mintzer, C. P. Tresser, C. W. Wu, and M. M. Yeung, "Fragile imperceptible digital watermark with privacy control," in Proc. SPIE Security and Watermarking of Multimedia Contents I, Jan. 1999, vol. 3657, pp. 79-84.
-
(1999)
Proc. SPIE Security and Watermarking of Multimedia Contents I
, vol.3657
, pp. 79-84
-
-
Coppersmith, D.1
Mintzer, F.C.2
Tresser, C.P.3
Wu, C.W.4
Yeung, M.M.5
-
11
-
-
0036611838
-
Hierarchical watermarking for secure image authentication with localization
-
Jun.
-
M. U. Celik, G. Sharma, E. Saber, and A. M. Tekalp, "Hierarchical watermarking for secure image authentication with localization," IEEE Trans. Image Process., vol. 11, no. 6, pp. 585-595, Jun. 2002.
-
(2002)
IEEE Trans. Image Process.
, vol.11
, Issue.6
, pp. 585-595
-
-
Celik, M.U.1
Sharma, G.2
Saber, E.3
Tekalp, A.M.4
-
12
-
-
0032648596
-
Digital watermarking for telltale tamper proofing and authentication
-
Jul.
-
D. Kundur and D. Hatzinakos, "Digital watermarking for telltale tamper proofing and authentication," Proc. IEEE, vol. 87, no. 7, pp. 1167-1180, Jul. 1999.
-
(1999)
Proc. IEEE
, vol.87
, Issue.7
, pp. 1167-1180
-
-
Kundur, D.1
Hatzinakos, D.2
-
13
-
-
0034848594
-
Blind watermarking applied to image authentication
-
Salt Lake City, UT, May
-
J. Eggers and B. Girod, "Blind watermarking applied to image authentication," in Proc. IEEE ICASSP, Salt Lake City, UT, May 2001, pp. 1977-1980.
-
(2001)
Proc. IEEE ICASSP
, pp. 1977-1980
-
-
Eggers, J.1
Girod, B.2
-
14
-
-
0032308292
-
Compression tolerant image authentication
-
Chicago, IL, Oct.
-
S. Bhattacharjee and M. Kutter, "Compression tolerant image authentication," in Proc. IEEE Int. Conf. Image Processing, Chicago, IL, Oct. 1998, pp. 435-439.
-
(1998)
Proc. IEEE Int. Conf. Image Processing
, pp. 435-439
-
-
Bhattacharjee, S.1
Kutter, M.2
-
15
-
-
0001336448
-
The method of successive projection for finding a common point of convex sets
-
L. M. Bregman, "The method of successive projection for finding a common point of convex sets," Dokl. Akad. Nauk, SSSR, vol. 162, no. 3, pp. 688-692, 1965.
-
(1965)
Dokl. Akad. Nauk, SSSR
, vol.162
, Issue.3
, pp. 688-692
-
-
Bregman, L.M.1
-
17
-
-
0027541192
-
The foundations of set theoretic estimation
-
Feb.
-
P. L. Combettes, "The foundations of set theoretic estimation," Proc. IEEE, vol. 81, no. 2, pp. 182-208, Feb. 1993.
-
(1993)
Proc. IEEE
, vol.81
, Issue.2
, pp. 182-208
-
-
Combettes, P.L.1
-
18
-
-
0034246405
-
Constrained FIR filter design by the method of vector space projections
-
Aug.
-
K. C. Haddad, H. Stark, and N. P. Galatsanos, "Constrained FIR filter design by the method of vector space projections," IEEE Trans. Circuits Syst. II: Analog Digit. Signal Process., vol. 47, no. 8, pp. 714-725, Aug. 2000.
-
(2000)
IEEE Trans. Circuits Syst. II: Analog Digit. Signal Process.
, vol.47
, Issue.8
, pp. 714-725
-
-
Haddad, K.C.1
Stark, H.2
Galatsanos, N.P.3
-
19
-
-
0021405936
-
The feasible solution in signal restoration
-
Apr.
-
H. J. Trussell and M. R. Civanlar, "The feasible solution in signal restoration," IEEE Trans. Acoust., Speech, Signal Process., vol. ASSP-32, no. 2, pp. 201-212, Apr. 1984.
-
(1984)
IEEE Trans. Acoust., Speech, Signal Process.
, vol.ASSP-32
, Issue.2
, pp. 201-212
-
-
Trussell, H.J.1
Civanlar, M.R.2
-
20
-
-
0031358008
-
Set theoretic signal restoration using an error in variables criterion
-
Dec.
-
G. Sharma and H. J. Trussell, "Set theoretic signal restoration using an error in variables criterion," IEEE Trans. Image Process., vol. 6, no. 12, pp. 1692-1697, Dec. 1997.
-
(1997)
IEEE Trans. Image Process.
, vol.6
, Issue.12
, pp. 1692-1697
-
-
Sharma, G.1
Trussell, H.J.2
-
21
-
-
0033717154
-
Detection of image alterations using semi-fragile watermarks
-
Jan.
-
E. J. Delp, C. I. Podilchuk, and E. T. Lin, "Detection of image alterations using semi-fragile watermarks," in Proc. SPIE Int. Conf. Security and Watermarking of Multimedia Contents II, Jan. 2000, vol. 3971, no. 5, pp. 409-413.
-
(2000)
Proc. SPIE Int. Conf. Security and Watermarking of Multimedia Contents II
, vol.3971
, Issue.5
, pp. 409-413
-
-
Delp, E.J.1
Podilchuk, C.I.2
Lin, E.T.3
-
23
-
-
84863689600
-
Informed watermark embedding in fractional Fourier domains
-
presented at the, Antalya, Turkey, Sep., unpublished
-
O. Altun, G. Sharma, and M. Bocko, "Informed watermark embedding in fractional Fourier domains," presented at the EUSIPCO, Antalya, Turkey, Sep. 2005, unpublished.
-
(2005)
EUSIPCO
-
-
Altun, O.1
Sharma, G.2
Bocko, M.3
-
24
-
-
0035368661
-
Optimal transform domain watermark embedding via linear programming
-
Jun.
-
S. Pereira, S. Voloshynoskiy, and T. Pun, "Optimal transform domain watermark embedding via linear programming," Signal Process., vol. 81, no. 6, pp. 1251-1260, Jun. 2001.
-
(2001)
Signal Process.
, vol.81
, Issue.6
, pp. 1251-1260
-
-
Pereira, S.1
Voloshynoskiy, S.2
Pun, T.3
-
25
-
-
1642358083
-
Color fundamentals for digital imaging
-
Boca Raton, FL: CRC, ch. 1
-
G. Sharma, "Color fundamentals for digital imaging," in Digital Color Imaging Handbook. Boca Raton, FL: CRC, 2003, ch. 1.
-
(2003)
Digital Color Imaging Handbook
-
-
Sharma, G.1
-
26
-
-
0016079335
-
The effects of a visual fidelity criterion on the encoding of images
-
Jul.
-
J. L. Mannos and D. L. Sakrison, "The effects of a visual fidelity criterion on the encoding of images," IEEE Trans. Inf. Theory, vol. IT-20, no. 4, pp. 525-536, Jul. 1974.
-
(1974)
IEEE Trans. Inf. Theory
, vol.IT-20
, Issue.4
, pp. 525-536
-
-
Mannos, J.L.1
Sakrison, D.L.2
-
29
-
-
0035368528
-
Analysis of digital watermarks subjected to optimum linear filtering and additive noise
-
J. K. Su, J. J. Eggers, and B. Girod, "Analysis of digital watermarks subjected to optimum linear filtering and additive noise," Signal Process., Special Issue Inf. Theoretic Issues Digital Watermarking, vol. 81, no. 6, pp. 1141-1175, 2001.
-
(2001)
Signal Process., Special Issue Inf. Theoretic Issues Digital Watermarking
, vol.81
, Issue.6
, pp. 1141-1175
-
-
Su, J.K.1
Eggers, J.J.2
Girod, B.3
-
31
-
-
84860042304
-
-
[Online]
-
[Online]. Available: http://sipi.usc.edu/database/.
-
-
-
-
32
-
-
8844235143
-
-
Kodak PhotoCD Images, Eastman Kodak Company [Online]. Available: ftp://ftp.kodak.com/www/images/pcd.
-
Kodak PhotoCD Images
-
-
-
33
-
-
33845623551
-
Adaptive image restoration with reduced computational load
-
Dec.
-
S. Efstratiadis and A. Katsaggelos, "Adaptive image restoration with reduced computational load," Opt. Eng., vol. 29, no. 12, pp. 845-853, Dec. 1990.
-
(1990)
Opt. Eng.
, vol.29
, Issue.12
, pp. 845-853
-
-
Efstratiadis, S.1
Katsaggelos, A.2
-
34
-
-
84947911018
-
A stochastic approach to content adaptive digital image watermarking
-
Sep. 29-Oct. 1
-
S. Voloshynovskiy, A. Herrigel, N. Baumgeartner, and T. Pun, "A stochastic approach to content adaptive digital image watermarking," in Proc. 3rd Int. Workshop Information Hiding, Sep. 29-Oct. 1, 1999, pp. 211-236.
-
(1999)
Proc. 3rd Int. Workshop Information Hiding
, pp. 211-236
-
-
Voloshynovskiy, S.1
Herrigel, A.2
Baumgeartner, N.3
Pun, T.4
|