-
1
-
-
34047132754
-
-
M.L. Miller, I.J. Cox, J.M.G. Linnartz and T. Kalker, A Review of Watermarking Principles and Practices, in Digital Signal Processing for Multimedia. Syatems, K.K. parhi and T. Nishitani Eds. New York: Marcel Dekker Inc., 1999, pp. 461-485.
-
M.L. Miller, I.J. Cox, J.M.G. Linnartz and T. Kalker, "A Review of Watermarking Principles and Practices," in Digital Signal Processing for Multimedia. Syatems, K.K. parhi and T. Nishitani Eds. New York: Marcel Dekker Inc., 1999, pp. 461-485.
-
-
-
-
2
-
-
0000525637
-
Watermarking Medical Images with Patient Information
-
D. Anand and U. Niranjan, "Watermarking Medical Images with Patient Information," in IEEE/EMBS Conference, 1998, pp. 703-706.
-
(1998)
IEEE/EMBS Conference
, pp. 703-706
-
-
Anand, D.1
Niranjan, U.2
-
3
-
-
0034441522
-
A secure data hiding technique with heterogeneous data-combining capability for electronic patient records
-
Jul 23-28
-
S.-. Miaou, C.-. Hsu, Y.-. Tsai and H.-. Chao, "A secure data hiding technique with heterogeneous data-combining capability for electronic patient records," in 22nd Annual International Conference of the IEEE Engineering in Medicine and Biology Society, Jul 23-28 2000, pp. 280-283.
-
(2000)
22nd Annual International Conference of the IEEE Engineering in Medicine and Biology Society
, pp. 280-283
-
-
Miaou, S.1
Hsu, C.2
Tsai, Y.3
Chao, H.4
-
6
-
-
0032312612
-
A public key watermark for image verification and authentication
-
Chicago, IL, October
-
P.W. Wong, "A public key watermark for image verification and authentication", in Proceedings of the IEEE International Conference on Image Processing, Chicago, IL, October 1998, pp. 455-459.
-
(1998)
Proceedings of the IEEE International Conference on Image Processing
, pp. 455-459
-
-
Wong, P.W.1
-
7
-
-
0033872149
-
Counterfeiting attacks on oblivious block-wise independent invisible watermarking schemes
-
M. Holliman, N. Memon, "Counterfeiting attacks on oblivious block-wise independent invisible watermarking schemes, IEEE Trans. Image Processing, 9(2000), pp. 432-441.
-
(2000)
IEEE Trans. Image Processing
, vol.9
, pp. 432-441
-
-
Holliman, M.1
Memon, N.2
-
8
-
-
0034443602
-
New fragile authentication watermark for images
-
J. Fridrich, M. Goljan, A.C. Baldoza, "New fragile authentication watermark for images", in Proceedings of the IEEE International Conference on Image Processing, Vancouver, BC, Canada, September 2000, pp. 10-13.
-
(2000)
Proceedings of the IEEE International Conference on Image Processing, Vancouver, BC, Canada, September
, pp. 10-13
-
-
Fridrich, J.1
Goljan, M.2
Baldoza, A.C.3
-
9
-
-
0033682895
-
Secret and public key authentication schemes that resist vector quantization attack
-
P.W. Wong, N. Memon, "Secret and public key authentication schemes that resist vector quantization attack", Proceeding SPIE 3971 (75), 2000, pp. 417-427.
-
(2000)
Proceeding SPIE
, vol.3971
, Issue.75
, pp. 417-427
-
-
Wong, P.W.1
Memon, N.2
-
10
-
-
0036611838
-
Hierarchical watermarking for secure image authentication with localization
-
M. U. Celik, G. Sharma, E. Saber, A.M. Tekalp, "Hierarchical watermarking for secure image authentication with localization", IEEE Trans. Image Processing, 11(6) 2002, pp.585-594.
-
(2002)
IEEE Trans. Image Processing
, vol.11
, Issue.6
, pp. 585-594
-
-
Celik, M.U.1
Sharma, G.2
Saber, E.3
Tekalp, A.M.4
-
11
-
-
0035248504
-
A robust image authentication method distinguishing JPEG compression from malicious manipulation
-
C. Lin, S. Chang, "A robust image authentication method distinguishing JPEG compression from malicious manipulation", IEEE Trans. Circuits and Video Technology, 11(2), pp. 153-168.
-
IEEE Trans. Circuits and Video Technology
, vol.11
, Issue.2
, pp. 153-168
-
-
Lin, C.1
Chang, S.2
-
12
-
-
0034140535
-
Fault resilient and compression tolerant digital signature for image authentication
-
D. C. Lou, J. L. Liu, "Fault resilient and compression tolerant digital signature for image authentication", IEEE Trans. Consumer Electronics, 46(1), pp. 31-39.
-
IEEE Trans. Consumer Electronics
, vol.46
, Issue.1
, pp. 31-39
-
-
Lou, D.C.1
Liu, J.L.2
-
13
-
-
0030386584
-
Applications of toral automorphisms in image watermarking
-
G. Voyatzis, I. Pitas, " Applications of toral automorphisms in image watermarking", in Proceedings of the International Conference on Image Processing, vol. II, 1996, pp. 237-240.
-
(1996)
Proceedings of the International Conference on Image Processing
, vol.2
, pp. 237-240
-
-
Voyatzis, G.1
Pitas, I.2
|