-
1
-
-
0030384775
-
Techniques for data hiding [J]
-
34
-
Bender W, Gruhl D, Morimoto N, Lu A. Techniques for data hiding [J]. IBM System Journal, 1996, 35(3, 4): 313-336.
-
(1996)
IBM System Journal
, vol.35
, pp. 313-336
-
-
Bender, W.1
Gruhl, D.2
Morimoto, N.3
Lu, A.4
-
2
-
-
84947943261
-
Protecting digital media content [J]
-
7
-
Memon N, Wong P W. Protecting digital media content [J]. Communications of the ACM, 1998, 41(7), 34-43.
-
(1998)
Communications of the ACM
, vol.41
, pp. 34-43
-
-
Memon, N.1
Wong, P.W.2
-
3
-
-
0031996445
-
Exploring steganography: Seeing the unseen [J]
-
2
-
Johnson N F, Jajodia S. Exploring steganography: seeing the unseen [J]. IEEE Computer, 1998, 31(2): 26-34.
-
(1998)
IEEE Computer
, vol.31
, pp. 26-34
-
-
Johnson, N.F.1
Jajodia, S.2
-
4
-
-
11844252006
-
Cyber warfare: Steganography vs. steganalysis [J]
-
10
-
Wang H, Wang S. Cyber warfare: steganography vs. steganalysis [J]. Communications of the ACM, 2004, 47(10): 76-82.
-
(2004)
Communications of the ACM
, vol.47
, pp. 76-82
-
-
Wang, H.1
Wang, S.2
-
6
-
-
0037153490
-
Image fragile watermarking based on fusion of multi-resolution tamper detection [J]
-
24
-
Hu J Q, Huang J W, Huang D R, Shi Y Q. Image fragile watermarking based on fusion of multi-resolution tamper detection [J]. Electronics Letters, 2002, 38(24): 1512-1513.
-
(2002)
Electronics Letters
, vol.38
, pp. 1512-1513
-
-
Hu, J.Q.1
Huang, J.W.2
Huang, D.R.3
Shi, Y.Q.4
-
7
-
-
31344433959
-
New semifragile image authentication watermarking techniques using random bias and nonuniform quantization [J]
-
1
-
Maeno K, Sun Q, Chang S F, Suto M. New semifragile image authentication watermarking techniques using random bias and nonuniform quantization [J]. IEEE Transactions on Multimedia, 2006, 8(1): 32-45.
-
(2006)
IEEE Transactions on Multimedia
, vol.8
, pp. 32-45
-
-
Maeno, K.1
Sun, Q.2
Chang, S.F.3
Suto, M.4
-
8
-
-
84944325291
-
An extendible hash for multi-precision similarity querying of image databases [C]
-
Roma, Italy
-
Lin S, Ozsu M T, Oria V, Ng R. An extendible hash for multi-precision similarity querying of image databases [C]// Proceedings of the 27th VLDB Conference, Roma, Italy. 2001: 221-230.
-
(2001)
Proceedings of the 27th VLDB Conference
, pp. 221-230
-
-
Lin, S.1
Ozsu, M.T.2
Oria, V.3
Ng, R.4
-
11
-
-
0030409375
-
A robust content based digital signature for image authentication [C]
-
Schneider M, Chang S F. A robust content based digital signature for image authentication [C]// Proceedings of 1996 IEEE International Conference on Image Processing, Laussane, Switzerland. 1996, 3: 227-230.
-
(1996)
Proceedings of 1996 IEEE International Conference on Image Processing, Laussane, Switzerland
, vol.3
, pp. 227-230
-
-
Schneider, M.1
Chang, S.F.2
-
13
-
-
0034444578
-
Robust image hashing [C]
-
Venkatesan R, Koon S M, Jakubowski M H, Moulin P. Robust image hashing [C]// Proceedings of 2000 IEEE International Conference on Image Processing. 2000, 3: 664-666.
-
(2000)
Proceedings of 2000 IEEE International Conference on Image Processing
, vol.3
, pp. 664-666
-
-
Venkatesan, R.1
Koon, S.M.2
Jakubowski, M.H.3
Moulin, P.4
-
16
-
-
0032223822
-
A robust image authentication method surviving JPEG lossy compression [C]
-
Lin C Y, Chang S F. A robust image authentication method surviving JPEG lossy compression [C]// Proceedings of the SPIE, Storage and Retrieval of Image/Video Database, San Jose, USA. 1998, 3312: 296-307.
-
(1998)
Proceedings of the SPIE, Storage and Retrieval of Image/Video Database, San Jose, USA
, vol.3312
, pp. 296-307
-
-
Lin, C.Y.1
Chang, S.F.2
-
17
-
-
0037818310
-
Structural digital signature for image authentication [J]
-
2
-
Lu C S, Liao H Y M. Structural digital signature for image authentication [J]. IEEE Transactions on Multimedia, 2003, 5(2): 161-173.
-
(2003)
IEEE Transactions on Multimedia
, vol.5
, pp. 161-173
-
-
Lu, C.S.1
Liao, H.Y.M.2
-
18
-
-
33750344108
-
Perceptual image hashing via feature points: Performance evaluation and tradeoffs [J]
-
11
-
Monga V, Evans B L. Perceptual image hashing via feature points: performance evaluation and tradeoffs [J]. IEEE Transactions on Image Processing, 2006, 15(11): 3453-3466.
-
(2006)
IEEE Transactions on Image Processing
, vol.15
, pp. 3453-3466
-
-
Monga, V.1
Evans, B.L.2
-
20
-
-
0001466773
-
A combined corner and edge detector [C]
-
Harris C, Stephen M. A combined corner and edge detector [C]// Proceeding of the Fourth Alvey Vision Conference, Manchester, UK. 1988, 15: 147-151.
-
(1988)
Proceeding of the Fourth Alvey Vision Conference, Manchester, UK
, vol.15
, pp. 147-151
-
-
Harris, C.1
Stephen, M.2
-
22
-
-
0041416425
-
Robust wide-baseline stereo from maximally stable extremal regions [C]
-
Cardiff, UK
-
Matas J, Schum Q, Urban M, Pajdla T. Robust wide-baseline stereo from maximally stable extremal regions [C]// Proceeding of the British Machine Vision Conference, Cardiff, UK. 2002: 384-393.
-
(2002)
Proceeding of the British Machine Vision Conference
, pp. 384-393
-
-
Matas, J.1
Schum, Q.2
Urban, M.3
Pajdla, T.4
-
23
-
-
0033342928
-
End-stopped wavelets for detection low-level features [C]
-
Bhatacherjee S, Vandergheynst P. End-stopped wavelets for detection low-level features [C]// Proceedings of the SPIE, Wavelet Applications in Signal and Image Processing, VII. 1999, 3813: 732-741.
-
(1999)
Proceedings of the SPIE, Wavelet Applications in Signal and Image Processing, VII
, vol.3813
, pp. 732-741
-
-
Bhatacherjee, S.1
Vandergheynst, P.2
-
25
-
-
33749259245
-
Robust image hashing based on radial variance of pixels [C]
-
Genova Ltaly
-
Roover C, Vleeschouwer C, Lefebvre F, Macq B. Robust image hashing based on radial variance of pixels [C]// IEEE International Conference on Image Processing 2005 (ICIP 2005), III, Genova, Ltaly. 2005: 77-80.
-
(2005)
IEEE International Conference on Image Processing 2005 (ICIP 2005), III
, pp. 77-80
-
-
Roover, C.1
Vleeschouwer, C.2
Lefebvre, F.3
MacQ, B.4
-
27
-
-
30744471653
-
Geometric distortion-resilient image hashing scheme and its applications on copy detection and authentication [J]
-
2
-
Lu C S, Hsu C Y. Geometric distortion-resilient image hashing scheme and its applications on copy detection and authentication [J]. Multimedia Systems, 2005, 11(2): 159-173.
-
(2005)
Multimedia Systems
, vol.11
, pp. 159-173
-
-
Lu, C.S.1
Hsu, C.Y.2
-
30
-
-
20444500587
-
Robust perceptual image hashing via matrix invariants [C]
-
Kozat S S, Venkatesan R, Mihcak M K. Robust perceptual image hashing via matrix invariants [C]// Proceedings of 2004 International Conference on Image Processing, (ICIP'04), Genova, Italy. 2004, 5: 3443-3446.
-
(2004)
Proceedings of 2004 International Conference on Image Processing, (ICIP'04), Genova, Italy
, vol.5
, pp. 3443-3446
-
-
Kozat, S.S.1
Venkatesan, R.2
Mihcak, M.K.3
-
31
-
-
33845404068
-
Robust image hashing via non-negative matrix factorizations [C]
-
Toulouse, France
-
Monga V, Mihçak M K. Robust image hashing via non-negative matrix factorizations [C]// IEEE International Conference on Acoustics, Speech, and Signal Processing, Toulouse, France. 2006.
-
(2006)
IEEE International Conference on Acoustics, Speech, and Signal Processing
-
-
Monga, V.1
Mihçak, M.K.2
-
34
-
-
34548069805
-
Image hashing based on human visual system [J]
-
11
-
Qin C, Wang S, Zhang X. Image hashing based on human visual system [J]. Journal of Image and Graphics, 2006, 11(11): 1678-1681 (in Chinese).
-
(2006)
Journal of Image and Graphics
, vol.11
, pp. 1678-1681
-
-
Qin, C.1
Wang, S.2
Zhang, X.3
-
36
-
-
34547340074
-
Image block feature vectors based on a singular-value information metric and color-texture description [J]
-
3
-
Wang S, Lu X, Su S, Zhang X. Image block feature vectors based on a singular-value information metric and color-texture description [J]. Journal of Shanghai University (English Edition), 2007, 11(3): 205-209.
-
(2007)
Journal of Shanghai University (English Edition)
, vol.11
, pp. 205-209
-
-
Wang, S.1
Lu, X.2
Su, S.3
Zhang, X.4
-
38
-
-
28844447844
-
Perceptual audio hashing functions [J]
-
Özer H, Sankur B, Memon N, Anarim E. Perceptual audio hashing functions [J]. EURASIP Journal on Applied Signal Processing, 2005, (12): 1780-1793.
-
(2005)
EURASIP Journal on Applied Signal Processing
, Issue.12
, pp. 1780-1793
-
-
Özer, H.1
Sankur, B.2
Memon, N.3
Anarim, E.4
-
42
-
-
34548103963
-
-
http://www.howtoforge.org/fight_image_spam_with_fuzzyocr_spamassassin_p2.
-
-
-
|