-
1
-
-
0033601660
-
Fragile imperceptible digital watermark with privacy control
-
Coppersmith D., Mintzer F., Tresser C., Wu C., and Yeung C. Fragile imperceptible digital watermark with privacy control. Proceedings of SPIE, Security and Watermarking of Multimedia Contents (1999) 79-84
-
(1999)
Proceedings of SPIE, Security and Watermarking of Multimedia Contents
, pp. 79-84
-
-
Coppersmith, D.1
Mintzer, F.2
Tresser, C.3
Wu, C.4
Yeung, C.5
-
2
-
-
0036611838
-
Hierarchical watermarking for secure image authentication with localization
-
Celik M.U., Sharma G., Saber E., and Tekalp A.M. Hierarchical watermarking for secure image authentication with localization. IEEE Trans Image Process 11 6 (2000) 585-595
-
(2000)
IEEE Trans Image Process
, vol.11
, Issue.6
, pp. 585-595
-
-
Celik, M.U.1
Sharma, G.2
Saber, E.3
Tekalp, A.M.4
-
3
-
-
0347927731
-
Detection and restoration of tampered JPEG compressed images
-
Wu H.C., and Chang C.C. Detection and restoration of tampered JPEG compressed images. J Syst Softw 64 2 (2002) 151-161
-
(2002)
J Syst Softw
, vol.64
, Issue.2
, pp. 151-161
-
-
Wu, H.C.1
Chang, C.C.2
-
6
-
-
0029292158
-
Information Authentication for a Slippery New Age
-
Walton S. Information Authentication for a Slippery New Age. Dr Dobb's J 20 4 (1995) 18-26
-
(1995)
Dr Dobb's J
, vol.20
, Issue.4
, pp. 18-26
-
-
Walton, S.1
-
10
-
-
0035473831
-
Secret and public key image watermarking schemes for image authentication and ownership verification
-
Wong P.W., and Memon N. Secret and public key image watermarking schemes for image authentication and ownership verification. IEEE Trans Image Process 10 10 (2001) 1593-1601
-
(2001)
IEEE Trans Image Process
, vol.10
, Issue.10
, pp. 1593-1601
-
-
Wong, P.W.1
Memon, N.2
-
11
-
-
0036627368
-
A survey of watermarking algorithms for image authentication
-
Rey C., and Dugelay J.L. A survey of watermarking algorithms for image authentication. EURASTP J Appl Signal Process 6 (2002) 613-621
-
(2002)
EURASTP J Appl Signal Process
, vol.6
, pp. 613-621
-
-
Rey, C.1
Dugelay, J.L.2
-
12
-
-
8344236008
-
Fragile image watermarking using a gradient image for improved localization and security
-
Suthaharan S. Fragile image watermarking using a gradient image for improved localization and security. Pattern Recogn Lett 25 16 (2004) 1893-1903
-
(2004)
Pattern Recogn Lett
, vol.25
, Issue.16
, pp. 1893-1903
-
-
Suthaharan, S.1
-
13
-
-
25144448272
-
A hierarchical digital watermarking method for image tamper detection and recovery
-
Lin P.-L., Hsieh C.-K., and Huang P.-W. A hierarchical digital watermarking method for image tamper detection and recovery. Pattern Recogn 38 12 (2005) 2519-2529
-
(2005)
Pattern Recogn
, vol.38
, Issue.12
, pp. 2519-2529
-
-
Lin, P.-L.1
Hsieh, C.-K.2
Huang, P.-W.3
-
19
-
-
0033872149
-
Counterfeiting attacks on oblivious block-wise independent invisible watermarking schemes
-
Holliman M., and Memon N. Counterfeiting attacks on oblivious block-wise independent invisible watermarking schemes. IEEE Trans Image Process 9 3 (2000) 432-441
-
(2000)
IEEE Trans Image Process
, vol.9
, Issue.3
, pp. 432-441
-
-
Holliman, M.1
Memon, N.2
|