-
1
-
-
0001120799
-
"Image watermarking using block site selection and det domain constraints"
-
A. G. Bors and I. Pitas, "Image watermarking using block site selection and det domain constraints," Opt. Express 3(12), 512-522 (1998).
-
(1998)
Opt. Express
, vol.3
, Issue.12
, pp. 512-522
-
-
Bors, A.G.1
Pitas, I.2
-
2
-
-
24344482972
-
"Highly robust watermarking scheme based on surrounding mean value relationship"
-
J.-M. Shieh, D.-C. Lou, and M.-C. Chang, "Highly robust watermarking scheme based on surrounding mean value relationship," Opt. Eng. 44(6), 897-907 (2005).
-
(2005)
Opt. Eng.
, vol.44
, Issue.6
, pp. 897-907
-
-
Shieh, J.-M.1
Lou, D.-C.2
Chang, M.-C.3
-
3
-
-
13144281779
-
"Spatially localized image-dependent watermarking for statistical invisibility and collusion resistance"
-
K. Su, D. Kundur, and D. Hatzinakos, "Spatially localized image-dependent watermarking for statistical invisibility and collusion resistance," IEEE Trans. Multimedia 7(1), 52-66 (2005).
-
(2005)
IEEE Trans. Multimedia
, vol.7
, Issue.1
, pp. 52-66
-
-
Su, K.1
Kundur, D.2
Hatzinakos, D.3
-
4
-
-
0036544390
-
"Toward secure public-key block-wise fragile authentication watermarking"
-
P. S. L. M. Barreto, H. Y. Kim, and V. Rijmen, "Toward secure public-key block-wise fragile authentication watermarking," IEE Proc. Vision Image Signal Process. 148(2), 57-62 (2002).
-
(2002)
IEE Proc. Vision Image Signal Process.
, vol.148
, Issue.2
, pp. 57-62
-
-
Barreto, P.S.L.M.1
Kim, H.Y.2
Rijmen, V.3
-
5
-
-
0036530306
-
"Cryptanalysis of the Yeung-Mintzer fragile watermarking technique"
-
J. Fridrich, M. Goljan, and N. Memon, "Cryptanalysis of the Yeung-Mintzer fragile watermarking technique," J. Electron. Imaging 11(2), 262-274 (2002).
-
(2002)
J. Electron. Imaging
, vol.11
, Issue.2
, pp. 262-274
-
-
Fridrich, J.1
Goljan, M.2
Memon, N.3
-
6
-
-
0036030626
-
"Security of fragile authentication watermarks with localization"
-
Security and Watermarking of Multimedia Contents VI
-
J. Fridrich, "Security of fragile authentication watermarks with localization," Security and Watermarking of Multimedia Contents VI, Proc. SPIE 5306, 691-700 (2002).
-
(2002)
Proc. SPIE
, vol.5306
, pp. 691-700
-
-
Fridrich, J.1
-
8
-
-
0033872149
-
"Counterfeiting attacks on oblivious block-wise independent invisible watermarking schemes"
-
M. Holliman and N. Memon, "Counterfeiting attacks on oblivious block-wise independent invisible watermarking schemes," IEEE Trans. Image Process., 9(3), 432-441 (2000).
-
(2000)
IEEE Trans. Image Process.
, vol.9
, Issue.3
, pp. 432-441
-
-
Holliman, M.1
Memon, N.2
-
9
-
-
0034442403
-
"Image authenticity and integrity verification via content-based watermarks and a public key cryptosystem"
-
C.-T. Li, D. C. Lou, and T. H. Chen, "Image authenticity and integrity verification via content-based watermarks and a public key cryptosystem," in Proc. IEEE Int. Conf. on Image Processing, Vol. III, pp. 694-697 (2000).
-
(2000)
Proc. IEEE Int. Conf. on Image Processing
, vol.3
, pp. 694-697
-
-
Li, C.-T.1
Lou, D.C.2
Chen, T.H.3
-
10
-
-
14344265162
-
"Digital fragile watermarking scheme for authentication of JPEG images"
-
C.-T. Li, "Digital fragile watermarking scheme for authentication of JPEG images," IEE Proc. Vision Image Signal Process. 151(6), 460-466 (2004).
-
(2004)
IEE Proc. Vision Image Signal Process.
, vol.151
, Issue.6
, pp. 460-466
-
-
Li, C.-T.1
-
11
-
-
0037721337
-
"One-dimensional neighborhood forming strategy for fragile watermarking"
-
C.-T. Li and F.-M. Yang, "One-dimensional neighborhood forming strategy for fragile watermarking," J. Electron. Imaging 12(2), 284-291 (2003).
-
(2003)
J. Electron. Imaging
, vol.12
, Issue.2
, pp. 284-291
-
-
Li, C.-T.1
Yang, F.-M.2
-
12
-
-
33749622444
-
"Localization and security enhancement of block-based image authentication"
-
A. H. Ouda and M. R. El-Sakka, "Localization and security enhancement of block-based image authentication," in Proc. IEEE Int. Conf. on Image Processing, Vol. I, pp. 673-676 (2005).
-
(2005)
Proc. IEEE Int. Conf. on Image Processing
, vol.1
, pp. 673-676
-
-
Ouda, A.H.1
El-Sakka, M.R.2
-
13
-
-
0035473831
-
"Secret and public key image watermarking schemes for image authentication and ownership verification"
-
P. W. Wong and N. Memon, "Secret and public key image watermarking schemes for image authentication and ownership verification," IEEE Trans. Image Process. 10(10), 1593-1601 (2001).
-
(2001)
IEEE Trans. Image Process.
, vol.10
, Issue.10
, pp. 1593-1601
-
-
Wong, P.W.1
Memon, N.2
-
14
-
-
0033682895
-
"Secret and public key authentication watermarking schemes that resist vector quantization attack"
-
in Security and Watermarking of Multimedia Contents II
-
P. W. Wong and N. Memon, "Secret and public key authentication watermarking schemes that resist vector quantization attack," in Security and Watermarking of Multimedia Contents II, Proc. SPIE 3971, 40-47 (2000).
-
(2000)
Proc. SPIE
, vol.3971
, pp. 40-47
-
-
Wong, P.W.1
Memon, N.2
-
16
-
-
33947225321
-
"Digital watermarking for multimedia authentication"
-
in J. Seitz, Ed., Idea Group Publishing
-
C.-T. Li, "Digital watermarking for multimedia authentication," in Digital Watermarking for Digital Media, J. Seitz, Ed., Idea Group Publishing (2005).
-
(2005)
Digital Watermarking for Digital Media
-
-
Li, C.-T.1
-
17
-
-
0032117545
-
"Invisible watermarking for image verification"
-
M. Yeung and F. Minzter, "Invisible watermarking for image verification," J. Electron. Imaging 7 (3), 578-591 (1998).
-
(1998)
J. Electron. Imaging
, vol.7
, Issue.3
, pp. 578-591
-
-
Yeung, M.1
Minzter, F.2
|