-
3
-
-
0036381353
-
A color image copyright protection scheme based on visual cryptography and discrete cosine transform
-
Chang C.C., Hsiao J.Y., and Yeh J.C. A color image copyright protection scheme based on visual cryptography and discrete cosine transform. Image Science Journal 50 (2002) 133-140
-
(2002)
Image Science Journal
, vol.50
, pp. 133-140
-
-
Chang, C.C.1
Hsiao, J.Y.2
Yeh, J.C.3
-
4
-
-
0036983914
-
Recognition of image authenticity using significant DCT coefficients quantization
-
Chang C.C., Chuang J.C., and Chen T.S. Recognition of image authenticity using significant DCT coefficients quantization. Informatica 26 4 (2002) 359-366
-
(2002)
Informatica
, vol.26
, Issue.4
, pp. 359-366
-
-
Chang, C.C.1
Chuang, J.C.2
Chen, T.S.3
-
6
-
-
84961798361
-
-
Chang, C.C., Hsiao, J.Y., Chiang, C.L. 2002d. An image copyright protection scheme based on torus automorphism. In: Proceedings of the First International Symposium on Cyber Worlds, pp. 217-224.
-
Chang, C.C., Hsiao, J.Y., Chiang, C.L. 2002d. An image copyright protection scheme based on torus automorphism. In: Proceedings of the First International Symposium on Cyber Worlds, pp. 217-224.
-
-
-
-
8
-
-
13944272999
-
A publicly verifiable copyright-proving scheme resistant to malicious attacks
-
Chen T.H., Horng G., and Lee W.B. A publicly verifiable copyright-proving scheme resistant to malicious attacks. IEEE Transactions on Industrial Electronics 52 1 (2005) 327-334
-
(2005)
IEEE Transactions on Industrial Electronics
, vol.52
, Issue.1
, pp. 327-334
-
-
Chen, T.H.1
Horng, G.2
Lee, W.B.3
-
9
-
-
0031362116
-
Secure spread spectrum watermarking for multimedia
-
Cox I.J., Kilian J., Leighton F.T., and Shamoon T. Secure spread spectrum watermarking for multimedia. IEEE Transactions on Image Processing 6 12 (1997) 1673-1687
-
(1997)
IEEE Transactions on Image Processing
, vol.6
, Issue.12
, pp. 1673-1687
-
-
Cox, I.J.1
Kilian, J.2
Leighton, F.T.3
Shamoon, T.4
-
10
-
-
44049092842
-
-
DES encryption standard (DES). National Bureau of Standards (U.S.) 1997. Federal Information Processing Standards Publication 46. National Technical Information Service, Springfield, VA.
-
DES encryption standard (DES). National Bureau of Standards (U.S.) 1997. Federal Information Processing Standards Publication 46. National Technical Information Service, Springfield, VA.
-
-
-
-
14
-
-
44049091250
-
-
Katzenbeisser, S., Petitcolas, F.A.P. 2000. Information hiding techniques for steganography and digital watermarking, Artech House, January.
-
Katzenbeisser, S., Petitcolas, F.A.P. 2000. Information hiding techniques for steganography and digital watermarking, Artech House, January.
-
-
-
-
15
-
-
4344674714
-
-
Kazakova, N., Margala, M., Durdle, N.G. 2004. Sobel edge detection processor for a real-time volume rendering system. In: Proceedings of the 2004 International Symposium on Circuits and Systems, vol. 2. pp. II-913-16.
-
Kazakova, N., Margala, M., Durdle, N.G. 2004. Sobel edge detection processor for a real-time volume rendering system. In: Proceedings of the 2004 International Symposium on Circuits and Systems, vol. 2. pp. II-913-16.
-
-
-
-
16
-
-
0033099591
-
Wavelet based watermarking method for digital images using the human visual system
-
Kim W.S., Hyung O.H., and Park R.H. Wavelet based watermarking method for digital images using the human visual system. Electronics Letters 35 6 (1999) 466-468
-
(1999)
Electronics Letters
, vol.35
, Issue.6
, pp. 466-468
-
-
Kim, W.S.1
Hyung, O.H.2
Park, R.H.3
-
17
-
-
0032648596
-
Digital watermarking for telltale tamper proofing and authentication
-
Kundur D., and Hatzinakos D. Digital watermarking for telltale tamper proofing and authentication. Proceedings of the IEEE 87 7 (1999) 1167-1180
-
(1999)
Proceedings of the IEEE
, vol.87
, Issue.7
, pp. 1167-1180
-
-
Kundur, D.1
Hatzinakos, D.2
-
18
-
-
0035248504
-
A robust image authentication method distinguishing JPEG compression from malicious manipulation
-
Lin C.Y., and Chang S.F. A robust image authentication method distinguishing JPEG compression from malicious manipulation. IEEE Transactions on Circuits and Systems of Video Technology 11 2 (2001) 153-168
-
(2001)
IEEE Transactions on Circuits and Systems of Video Technology
, vol.11
, Issue.2
, pp. 153-168
-
-
Lin, C.Y.1
Chang, S.F.2
-
20
-
-
85115721225
-
Benchmarking of watermarking algorithms
-
Pan J.-S., Huang H.-C., and Jain L.C. (Eds), World Scientific Chapter 11
-
Nikolaidis N., and Pitas I. Benchmarking of watermarking algorithms. In: Pan J.-S., Huang H.-C., and Jain L.C. (Eds). Intelligent Watermarking Techniques (2004), World Scientific 315-347 Chapter 11
-
(2004)
Intelligent Watermarking Techniques
, pp. 315-347
-
-
Nikolaidis, N.1
Pitas, I.2
-
21
-
-
9544225054
-
A fast subpixel edge detection method using Sobel-Zernike moments operator
-
Qu Y.D., Cui C.S., Chen S.B., and Li J.Q. A fast subpixel edge detection method using Sobel-Zernike moments operator. Image and Vision Computing 23 1 (2005) 11-17
-
(2005)
Image and Vision Computing
, vol.23
, Issue.1
, pp. 11-17
-
-
Qu, Y.D.1
Cui, C.S.2
Chen, S.B.3
Li, J.Q.4
-
22
-
-
0017930809
-
A method for obtaining digital signatures and public-key cryptosystems
-
Rivest R., Shamir A., and Adleman L. A method for obtaining digital signatures and public-key cryptosystems. Communications of the ACM 21 2 (1978) 120-126
-
(1978)
Communications of the ACM
, vol.21
, Issue.2
, pp. 120-126
-
-
Rivest, R.1
Shamir, A.2
Adleman, L.3
-
23
-
-
7544234396
-
-
John Wiley & Sons Inc., USA p. 15
-
Sutherland P. Applied Cryptography, Protocols, Algorithms, and Source Code in C Bruce Schneier. second ed. (1996), John Wiley & Sons Inc., USA p. 15
-
(1996)
Applied Cryptography, Protocols, Algorithms, and Source Code in C Bruce Schneier. second ed.
-
-
Sutherland, P.1
|