-
1
-
-
27744517664
-
Ergodic chaotic parameter modulation with application to digital image watermarking
-
S. Chen and H. Leung, "Ergodic chaotic parameter modulation with application to digital image watermarking," IEEE Trans. Image Process. 14(10), 1590-1602 (2005).
-
(2005)
IEEE Trans. Image Process
, vol.14
, Issue.10
, pp. 1590-1602
-
-
Chen, S.1
Leung, H.2
-
2
-
-
14344265162
-
Digital fragile watermarking scheme for authentication of JPEG images
-
C.-T. Li, "Digital fragile watermarking scheme for authentication of JPEG images," IEE Proc. Vision Image Signal Process. 151(6), 460-466 (2004).
-
(2004)
IEE Proc. Vision Image Signal Process
, vol.151
, Issue.6
, pp. 460-466
-
-
Li, C.-T.1
-
3
-
-
0141862035
-
An ill-posed operator for secure image authentication
-
E. Izquierdo and V. Guerra, "An ill-posed operator for secure image authentication," IEEE Trans. Circuits Syst. Vdeo Technol. 13(8), 842-852 (2003).
-
(2003)
IEEE Trans. Circuits Syst. Vdeo Technol
, vol.13
, Issue.8
, pp. 842-852
-
-
Izquierdo, E.1
Guerra, V.2
-
4
-
-
0041695400
-
Design of an efficient authentication method for modern image and video
-
D. Skraparlis, "Design of an efficient authentication method for modern image and video," IEEE Trans. Consum. Electron. 49(2), 417-426 (2003).
-
(2003)
IEEE Trans. Consum. Electron
, vol.49
, Issue.2
, pp. 417-426
-
-
Skraparlis, D.1
-
5
-
-
20444378085
-
Multipurpose image watermarking algorithm based on multistage vector quantization
-
Z. M. Lu, D. G. Xu, and S. H. Sun, "Multipurpose image watermarking algorithm based on multistage vector quantization," IEEE Trans. Image Process. 14(6), 822-831 (2005).
-
(2005)
IEEE Trans. Image Process
, vol.14
, Issue.6
, pp. 822-831
-
-
Lu, Z.M.1
Xu, D.G.2
Sun, S.H.3
-
7
-
-
33749622444
-
Localization and security enhancement of block-based image authentication
-
H. Ouda and M. R. El-Sakka, "Localization and security enhancement of block-based image authentication," in Proc. IEEE Int. Conf. Image Process, Vol. I, pp. 673-676 (2005).
-
(2005)
Proc. IEEE Int. Conf. Image Process
, vol.1
, pp. 673-676
-
-
Ouda, H.1
El-Sakka, M.R.2
-
8
-
-
13244283134
-
An asymmetric subspace watermarking method for copyright protection
-
J. Tzeng, W.-L. Hwang, and I.-L. Chern, "An asymmetric subspace watermarking method for copyright protection," IEEE Trans. Signal Process. 53(2), 784-792 (2005).
-
(2005)
IEEE Trans. Signal Process
, vol.53
, Issue.2
, pp. 784-792
-
-
Tzeng, J.1
Hwang, W.-L.2
Chern, I.-L.3
-
9
-
-
10644225222
-
A robust watermarking scheme using phase shift keying with the combination of amplitude boost and low amplitude block selection
-
W.-Y. Chen and C.-H. Chen, "A robust watermarking scheme using phase shift keying with the combination of amplitude boost and low amplitude block selection," Pattern Recogn. 38(4), 587-598 (2005).
-
(2005)
Pattern Recogn
, vol.38
, Issue.4
, pp. 587-598
-
-
Chen, W.-Y.1
Chen, C.-H.2
-
10
-
-
13144281779
-
Spatially localized image-dependent watermarking for statistical invisibility and collusion resistance
-
K. Su, D. Kundur, and D. Hatzinakos, "Spatially localized image-dependent watermarking for statistical invisibility and collusion resistance," IEEE Trans. Multimedia 7(1), 52-66 (2005).
-
(2005)
IEEE Trans. Multimedia
, vol.7
, Issue.1
, pp. 52-66
-
-
Su, K.1
Kundur, D.2
Hatzinakos, D.3
-
11
-
-
0036544390
-
Toward secure public-key block-wise fragile authentication watermarking
-
P. S. L. M. Barreto, H. Y. Kim, and V. Rijmen, "Toward secure public-key block-wise fragile authentication watermarking," IEE Proc. Vision Image signal Image Signal Process. 148(2), 57-62 (2002).
-
(2002)
IEE Proc. Vision Image signal Image Signal Process
, vol.148
, Issue.2
, pp. 57-62
-
-
Barreto, P.S.L.M.1
Kim, H.Y.2
Rijmen, V.3
-
12
-
-
0034443602
-
New fragile authentication watermark for images
-
J. Fridrich, M. Goljan, and A. C. Baldoza, "New fragile authentication watermark for images," in Proc. IEEE Int. Conf. Image Processing, Vol. I, pp. 446-449 (2000).
-
(2000)
Proc. IEEE Int. Conf. Image Processing
, vol.1
, pp. 446-449
-
-
Fridrich, J.1
Goljan, M.2
Baldoza, A.C.3
-
13
-
-
0034442403
-
Image authenticity and integrity verification via content-based watermarks and a public key cryptosystem
-
C.-T. Li, D. C. Lou, and T. H. Chen, "Image authenticity and integrity verification via content-based watermarks and a public key cryptosystem," in Proc. IEEE Int. Conf. Image Processing, Vol. III, pp. 694-697 (2000).
-
(2000)
Proc. IEEE Int. Conf. Image Processing
, vol.3
, pp. 694-697
-
-
Li, C.-T.1
Lou, D.C.2
Chen, T.H.3
-
14
-
-
0032117545
-
Invisible watermarking for image verification
-
M. Yeung and F. Minzter, "Invisible watermarking for image verification," J. Electron. Imaging 7(3), 578-591 (1998).
-
(1998)
J. Electron. Imaging
, vol.7
, Issue.3
, pp. 578-591
-
-
Yeung, M.1
Minzter, F.2
-
16
-
-
34248651529
-
Secret and public key authentication watermarking schemes that resist vector quantization attack
-
P. W. Wong and N. Memom, "Secret and public key authentication watermarking schemes that resist vector quantization attack," in Proc. SPIE Security and Watermarking of Multimedia Contents, Vol. II, pp. 40-47 (2000).
-
(2000)
Proc. SPIE Security and Watermarking of Multimedia Contents
, vol.2
, pp. 40-47
-
-
Wong, P.W.1
Memom, N.2
-
17
-
-
0033872149
-
Counterfeiting attacks on oblivious block-wise independent invisible watermarking schemes
-
M. Holliman and N. Memon, "Counterfeiting attacks on oblivious block-wise independent invisible watermarking schemes," IEEE Trans. Image Process. 9(3), 432-411 (2000).
-
(2000)
IEEE Trans. Image Process
, vol.9
, Issue.3
, pp. 432-411
-
-
Holliman, M.1
Memon, N.2
-
18
-
-
0033703669
-
Further attack on Yeung-Mintzer watermarking scheme
-
J. Fridrich, M. Goljan, and N. Memon, "Further attack on Yeung-Mintzer watermarking scheme," in Proc. SPIE Security and Watermarking of Multimedia Contents, Vol. II, pp. 428-437 (2000).
-
(2000)
Proc. SPIE Security and Watermarking of Multimedia Contents
, vol.2
, pp. 428-437
-
-
Fridrich, J.1
Goljan, M.2
Memon, N.3
-
19
-
-
0037721337
-
One-dimensional neighborhood forming strategy for fragile watermarking
-
C.-T. Li and F. M. Yang, "One-dimensional neighborhood forming strategy for fragile watermarking," J. Electron. Imaging 12(2), 284-291 (2003).
-
(2003)
J. Electron. Imaging
, vol.12
, Issue.2
, pp. 284-291
-
-
Li, C.-T.1
Yang, F.M.2
-
21
-
-
0035509773
-
A class of authentication digital watermarks for secure multimedia communication
-
L. Xie and G. R. Arce, "A class of authentication digital watermarks for secure multimedia communication," IEEE Trans. Image Process. 10(11), 1754-1764 (2001).
-
(2001)
IEEE Trans. Image Process
, vol.10
, Issue.11
, pp. 1754-1764
-
-
Xie, L.1
Arce, G.R.2
-
22
-
-
0036028633
-
Digital watermarking in wavelet domain with predistortion for authenticity verification and localization
-
D. A. Winne, H. D. Knowles, D. R. Bull, and C. N. Canagarajah, "Digital watermarking in wavelet domain with predistortion for authenticity verification and localization," in Proc. SPIE Security and Watermarking of Multimedia Contents, Vol. IV, pp. 349-356 (2002).
-
(2002)
Proc. SPIE Security and Watermarking of Multimedia Contents
, vol.4
, pp. 349-356
-
-
Winne, D.A.1
Knowles, H.D.2
Bull, D.R.3
Canagarajah, C.N.4
-
23
-
-
0034445522
-
Wavelet-based watermarking for tamper proofing of still images
-
H. Inoue, A. Miyazaki, and T. Katsure, "Wavelet-based watermarking for tamper proofing of still images," in Proc. IEEE Int. Conf. Image Processing, Vol. II, pp. 88-101 (2000).
-
(2000)
Proc. IEEE Int. Conf. Image Processing
, vol.2
, pp. 88-101
-
-
Inoue, H.1
Miyazaki, A.2
Katsure, T.3
-
24
-
-
0344235334
-
Fragile watermark based on the Gaussian mixture model in the wavelet domain for image authentication
-
H. Yuan and X. P. Zhang, "Fragile watermark based on the Gaussian mixture model in the wavelet domain for image authentication," in Proc. IEEE Int. Conf. Image Processing, Vol. I, pp. 566-569 (2003).
-
(2003)
Proc. IEEE Int. Conf. Image Processing
, vol.1
, pp. 566-569
-
-
Yuan, H.1
Zhang, X.P.2
-
25
-
-
0042823356
-
Wavelet packets-based digital watermarking for image verification and authentication
-
A. H. Paquet, R. K. Ward, and I. Pitas, "Wavelet packets-based digital watermarking for image verification and authentication," Signal Process. 83, 2117-2132 (2003).
-
(2003)
Signal Process
, vol.83
, pp. 2117-2132
-
-
Paquet, A.H.1
Ward, R.K.2
Pitas, I.3
-
26
-
-
0034315180
-
The JPEG2000 still image coding system: An overview
-
C. Christopoulos, A. Skodras, and T. Ebrahimi, "The JPEG2000 still image coding system: an overview," IEEE Trans. Consum. Electron. 46, 1103-1127 (2000).
-
(2000)
IEEE Trans. Consum. Electron
, vol.46
, pp. 1103-1127
-
-
Christopoulos, C.1
Skodras, A.2
Ebrahimi, T.3
-
27
-
-
0026852760
-
Image compression using the 2-D wavelet transform
-
A. S. Lewis and G. Knowles, "Image compression using the 2-D wavelet transform," IEEE Trans. Image Process. 1, 244-250 (1992).
-
(1992)
IEEE Trans. Image Process
, vol.1
, pp. 244-250
-
-
Lewis, A.S.1
Knowles, G.2
|