-
1
-
-
0031362116
-
Secure spread spectrum watermarking for multimedia
-
Cox I.J., Kilian J., Leighton T., and Shamoon T. Secure spread spectrum watermarking for multimedia. IEEE Transactions on Image Processing 6 12 (1997) 1673-1687
-
(1997)
IEEE Transactions on Image Processing
, vol.6
, Issue.12
, pp. 1673-1687
-
-
Cox, I.J.1
Kilian, J.2
Leighton, T.3
Shamoon, T.4
-
3
-
-
1942517830
-
Dual domain watermarking for authentication and compression of cultural heritage images
-
Yang Z., Campisi P., and Kundur D. Dual domain watermarking for authentication and compression of cultural heritage images. IEEE Transactions on Image Processing 13 3 (2004) 430-448
-
(2004)
IEEE Transactions on Image Processing
, vol.13
, Issue.3
, pp. 430-448
-
-
Yang, Z.1
Campisi, P.2
Kundur, D.3
-
4
-
-
0032308292
-
-
S. Bhattacharjee, M. Kutter. Compression tolerant image authentication, in: Proceeding of IEEE International Conference on Image Processing, vol. 1, 1998, pp. 435-439.
-
-
-
-
5
-
-
0035248504
-
A robust image authentication method distinguishing JPEG compression from malicious manipulation
-
Lin C.Y., and Chang S.F. A robust image authentication method distinguishing JPEG compression from malicious manipulation. IEEE Transactions on Circuits System and Video Technology 11 2 (2001) 153-168
-
(2001)
IEEE Transactions on Circuits System and Video Technology
, vol.11
, Issue.2
, pp. 153-168
-
-
Lin, C.Y.1
Chang, S.F.2
-
6
-
-
1442357585
-
Robust image authentication using content based compression
-
Chang E.C., Kankanhalli M.S., Guan X., Huang Z.Y., and Wu Y.H. Robust image authentication using content based compression. ACM Multimedia System Journal 9 2 (2003) 121-130
-
(2003)
ACM Multimedia System Journal
, vol.9
, Issue.2
, pp. 121-130
-
-
Chang, E.C.1
Kankanhalli, M.S.2
Guan, X.3
Huang, Z.Y.4
Wu, Y.H.5
-
7
-
-
0042823356
-
Wavelet packets-based digital watermarking for image verification and authentication
-
Paquet A.H., Ward R.K., and Pitas I. Wavelet packets-based digital watermarking for image verification and authentication. Signal Processing 83 10 (2003) 2117-2132
-
(2003)
Signal Processing
, vol.83
, Issue.10
, pp. 2117-2132
-
-
Paquet, A.H.1
Ward, R.K.2
Pitas, I.3
-
8
-
-
0036611838
-
Hierarchical watermarking for secure image authentication with localization
-
Mehmet U.C., Gaurav S., Eli S., and Ahmet M.T. Hierarchical watermarking for secure image authentication with localization. IEEE Transactions on Image Processing 11 6 (2002) 585-595
-
(2002)
IEEE Transactions on Image Processing
, vol.11
, Issue.6
, pp. 585-595
-
-
Mehmet, U.C.1
Gaurav, S.2
Eli, S.3
Ahmet, M.T.4
-
9
-
-
0344235334
-
-
H. Yuan, X.P. Zhang. Fragile watermark based on the Gaussian mixture model in the wavelet domain for image authentication, in: Proceedings of International Conference on Image Processing, vol. 1, Barcelona, Spain, 2003, pp. 505-508 .
-
-
-
-
10
-
-
0029292158
-
Information authentication for a slippery new age
-
Walton S. Information authentication for a slippery new age. Dr. Dobbs Journal 20 4 (1995) 18-26
-
(1995)
Dr. Dobbs Journal
, vol.20
, Issue.4
, pp. 18-26
-
-
Walton, S.1
-
11
-
-
0031378592
-
-
M. Yeung, F. Mintzer. An invisible watermarking technique for image verification, in: Proceeding of IEEE International Conference on Image Processing, vol. 2, Santa Barbara, California, 1997, pp. 680-683.
-
-
-
-
12
-
-
0034443602
-
-
J. Fridrich, M. Goljan, A.C. Baldoza, New fragile authentication watermark for images, in: Proceeding of IEEE International Conference on Image Processing, vol. 1, Vancouver, Canada, 2000, pp. 446-449.
-
-
-
-
13
-
-
0036030626
-
-
J. Fridrich, Security of fragile authentication watermarks with localization, in: Proceedings of SPIE Conference on Security and Watermarking of Multimedia Contents, vol. 4675, San Jose, California, 2002, pp. 691-700.
-
-
-
-
14
-
-
0033682895
-
-
P. Wong, N. Memon, Secret and public key authentication watermarking schemes that resist vector quantization attack, in: Proceedings of SPIE Conference on Security and Watermarking of Multimedia Contents, vol. 3971, San Jose, California, 2000, pp. 417-427.
-
-
-
-
15
-
-
33847253278
-
-
N. Memon, S. Shende, P. Wong, On the security of the Yeung-Mintzer authentication watermark. in: Proceedings of the IS&T PICS Symposium, Savannah, Georgia, 2000.
-
-
-
-
16
-
-
0033703669
-
-
J. Fridrich, M. Goljan, N. Memon, Further attacks on Yeung-Mintzer watermarking scheme, in: Proceedings of SPIE Electronic Imaging, San Jose, 2000.
-
-
-
-
17
-
-
0037869332
-
Fragile watermarking scheme for image authentication
-
Lu H.T., Shen R.M., and Chung F.L. Fragile watermarking scheme for image authentication. Electronics Letters 39 12 (2003) 898-900
-
(2003)
Electronics Letters
, vol.39
, Issue.12
, pp. 898-900
-
-
Lu, H.T.1
Shen, R.M.2
Chung, F.L.3
-
18
-
-
0033872149
-
Counterfeiting attacks on oblivious block-wise independent invisible watermarking schemes
-
Holliman M., and Memon N. Counterfeiting attacks on oblivious block-wise independent invisible watermarking schemes. IEEE Transactions on Image Processing 9 3 (2000) 432-444
-
(2000)
IEEE Transactions on Image Processing
, vol.9
, Issue.3
, pp. 432-444
-
-
Holliman, M.1
Memon, N.2
-
20
-
-
20444492372
-
-
J.H. Wu, B.B. Zhu, S.P. Li, F.Z. Lin, A secure image authentication algorithm with pixel-level tamper localization, in: Proceedings of international conference on image process (IEEE ICIP2004), vol. III, 2004, pp. 1573-1576 .
-
-
-
-
21
-
-
33847307997
-
-
J.H. Wu, B.B. Zhu, S.P. Li, F.Z. Lin, Efficient oracle attacks on Yeung-Mintzer and variant authentication schemes, in: Proceedings of International Conference on Multimedia and Expro. Twaiwan, 2004, pp. 301-306.
-
-
-
-
22
-
-
8644231988
-
-
J.H. Wu, B.B. Zhu, S.P. Li, F.Z. Lin, New attacks on sari image authentication system, in: Proceedings of SPIE, vol. 5306, San Jose, CA, 2004, pp. 602-609.
-
-
-
-
23
-
-
1342306801
-
Watermark-based copyright protection system security
-
Kwok S.H. Watermark-based copyright protection system security. Communications of the ACM 46 10 (2003) 98-101
-
(2003)
Communications of the ACM
, vol.46
, Issue.10
, pp. 98-101
-
-
Kwok, S.H.1
-
24
-
-
0041320695
-
A general framework for robust watermarking security
-
Barni M., Bartolini F., and Furon T. A general framework for robust watermarking security. Signal Processing 83 10 (2003) 2069-2084
-
(2003)
Signal Processing
, vol.83
, Issue.10
, pp. 2069-2084
-
-
Barni, M.1
Bartolini, F.2
Furon, T.3
-
25
-
-
0036530306
-
Cryptanalysis of the Yeung-Mintzer fragile watermarking technique
-
Fridrich J., Goljan M., and Memon N. Cryptanalysis of the Yeung-Mintzer fragile watermarking technique. Journal of Electronic Imaging 11 2 (2002) 262-274
-
(2002)
Journal of Electronic Imaging
, vol.11
, Issue.2
, pp. 262-274
-
-
Fridrich, J.1
Goljan, M.2
Memon, N.3
-
26
-
-
0035135789
-
Watermark embedded in permuted domain
-
Yen J.C. Watermark embedded in permuted domain. Electronics Letters 37 2 (2001) 80-81
-
(2001)
Electronics Letters
, vol.37
, Issue.2
, pp. 80-81
-
-
Yen, J.C.1
-
27
-
-
1842528982
-
A chaos-based robust wavelet-domain watermarking algorithm
-
Zhao D.W., Chen G.R., and Liu W.B. A chaos-based robust wavelet-domain watermarking algorithm. Chaos, Solitons and Fractals 22 12 (2004) 47-54
-
(2004)
Chaos, Solitons and Fractals
, vol.22
, Issue.12
, pp. 47-54
-
-
Zhao, D.W.1
Chen, G.R.2
Liu, W.B.3
|