-
1
-
-
84943615552
-
An implementation of des and AES, secure against some attacks
-
Cryptographic hardware and embedded systems-CHES 2001. Proceedings on the third international workshop Paris, France
-
Akkar ML, Giraud C (2001) An implementation of DES and AES, secure against some attacks. In: Cryptographic hardware and embedded systems-CHES 2001. Proceedings on the third international workshop. Lecture notes in computer science, vol 2162. Paris, France, pp 309-318
-
(2001)
Lecture Notes in Computer Science
, vol.2162
, pp. 309-318
-
-
Akkar, M.L.1
Giraud, C.2
-
3
-
-
84937396363
-
Generating standard DSA signatures without long inversion
-
Advances in cryptology-ASIACRYPT'96. Proceedings on the international conference on the theory and applications of cryptology and information security, Kyongju, Korea Springer
-
Arjen K (1996) Generating standard DSA signatures without long inversion. In: Advances in cryptology-ASIACRYPT'96. Proceedings on the international conference on the theory and applications of cryptology and information security, Kyongju, Korea. Lecture notes in computer science, vol 1163. Springer, pp 57-64
-
(1996)
Lecture Notes in Computer Science
, vol.1163
, pp. 57-64
-
-
Arjen, K.1
-
4
-
-
0012085074
-
Information hiding
-
Aucsmith D (ed) Proceedings of the second international workshop, Portland, Oregon, USA Springer
-
Aucsmith D (ed) (1998) Information hiding. Proceedings of the second international workshop, Portland, Oregon, USA. Lecture notes in computer science, vol 1525. Springer, pp 306-318
-
(1998)
Lecture Notes in Computer Science
, vol.1525
, pp. 306-318
-
-
-
5
-
-
44949160921
-
Methods for detecting tampering in digital images
-
1
-
Baldoza A, Sieffert M (2000) Methods for detecting tampering in digital images. AFRL Technology Horizons® 1(1):15-17
-
(2000)
AFRL Technology Horizons®
, vol.1
, pp. 15-17
-
-
Baldoza, A.1
Sieffert, M.2
-
7
-
-
0032308292
-
Compression tolerant image authentication
-
Chicago
-
Bhattacharjee S, Kutter M (2000) Compression tolerant image authentication. In: Proceedings of the ICIP-98, vol 1. Chicago, pp 435-439
-
(2000)
Proceedings of the ICIP-98
, vol.1
, pp. 435-439
-
-
Bhattacharjee, S.1
Kutter, M.2
-
8
-
-
0031233659
-
Invariance of stereo images via the theory of complex moments
-
9
-
Bhattacharya D, Sinha S (1997) Invariance of stereo images via the theory of complex moments. Pattern Recogn 30(9):1373-1386
-
(1997)
Pattern Recogn
, vol.30
, pp. 1373-1386
-
-
Bhattacharya, D.1
Sinha, S.2
-
10
-
-
84908339882
-
A public key based watermarking for color image authentication
-
Piscataway, NJ, USA
-
Byun SC, Lee IL, Shin TH (2002) A public key based watermarking for color image authentication. In: Proceedings of the IEEE international conference on multimedia and expo, vol 1. Piscataway, NJ, USA, pp 593-600
-
(2002)
Proceedings of the IEEE International Conference on Multimedia and Expo
, vol.1
, pp. 593-600
-
-
Byun, S.C.1
Lee, I.L.2
Shin, T.H.3
-
11
-
-
0022808786
-
A computational approach to edge detection
-
6
-
Canny JF (1986) A computational approach to edge detection. IEEE Trans Pattern Anal Mach Intell 8(6):679-698
-
(1986)
IEEE Trans Pattern Anal Mach Intell
, vol.8
, pp. 679-698
-
-
Canny, J.F.1
-
12
-
-
0034258869
-
Adaptive wavelet thresholding for image de-noising and compression
-
9
-
Chang G, Yu SB, Vetterli M (2000) Adaptive wavelet thresholding for image de-noising and compression. IEEE Trans Image Process 9(9):1532-1546
-
(2000)
IEEE Trans Image Process
, vol.9
, pp. 1532-1546
-
-
Chang, G.1
Yu, S.B.2
Vetterli, M.3
-
13
-
-
84964426993
-
Combined digital signature and digital watermark scheme for image authentication
-
Chen T, Wang J, Zhou Y (2000) Combined digital signature and digital watermark scheme for image authentication. In: Proceedings of the ICII2001, vol 5, pp 78-82
-
(2000)
Proceedings of the ICII2001
, vol.5
, pp. 78-82
-
-
Chen, T.1
Wang, J.2
Zhou, Y.3
-
16
-
-
0003302360
-
Public watermarks and resistance to tampering
-
Santa Barbara, California, USA
-
Cox IJ, Linnartz MG (1997) Public watermarks and resistance to tampering. In: Proceedings of the ICIP'97, Santa Barbara, California, USA
-
(1997)
Proceedings of the ICIP'97
-
-
Cox, I.J.1
Linnartz, M.G.2
-
17
-
-
0031343598
-
Finite state transformations of images
-
Culik K, Kari J (1997) Finite state transformations of images. Computer and Graphics 34:151-166
-
(1997)
Computer and Graphics
, vol.34
, pp. 151-166
-
-
Culik, K.1
Kari, J.2
-
18
-
-
0011989986
-
Generalized finite automata and transducer
-
Culik K, Valenta V (1997) Generalized finite automata and transducer. J Autom Lang Comb 2:3-17
-
(1997)
J Autom Lang Comb
, vol.2
, pp. 3-17
-
-
Culik, K.1
Valenta, V.2
-
21
-
-
0031237840
-
Quadratic interpolation for image resampling
-
9
-
Dodgson NA (1997) Quadratic interpolation for image resampling. IEEE Trans Image Process 6(9):1322-1326
-
(1997)
IEEE Trans Image Process
, vol.6
, pp. 1322-1326
-
-
Dodgson, N.A.1
-
22
-
-
44949216472
-
Un panorama des méthodes de tatouage permettant d'Assurer un service d'Intégrité
-
France
-
Dugelay J-L, Rey C (2002) Un panorama des Méthodes de Tatouage Permettant d'Assurer un Service d'Intégrité. Revue Traitement du Signal 18(4), France
-
(2002)
Revue Traitement du Signal
, vol.18
, Issue.4
-
-
Dugelay, J.-L.1
Rey, C.2
-
24
-
-
0026682116
-
Which new RSA-signatures can be computed from certain given RSA-signatures
-
1
-
Evertse J-H, Van-Heyst E (1992) Which new RSA-signatures can be computed from certain given RSA-signatures? J Cryptol 5(1):41-52
-
(1992)
J Cryptol
, vol.5
, pp. 41-52
-
-
Evertse, J.-H.1
Van-Heyst, E.2
-
29
-
-
0032292847
-
Image watermarking for tamper detection
-
Chicago, USA
-
Fridrich J (1998a) Image watermarking for tamper detection. In: Proceedings of the ICIP'98, Chicago, USA
-
(1998)
Proceedings of the ICIP'98
-
-
Fridrich, J.1
-
31
-
-
0002321371
-
Methods for tamper detection in digital images
-
ACM, Orlando, FL, USA
-
Fridrich J (1999a) Methods for tamper detection in digital images. In: Proceedings of the multimedia and security workshop at ACM multimedia '99, ACM, Orlando, FL, USA, pp 29-33
-
(1999)
Proceedings of the Multimedia and Security Workshop at ACM Multimedia '99
, pp. 29-33
-
-
Fridrich, J.1
-
34
-
-
0034765589
-
Invertible authentication
-
San Jose, California, January 23-26 2001
-
Fridrich J, Goljan M, Du R (2001) Invertible authentication. In: Proceedings of the SPIE, security and watermarking of multimedia contents, San Jose, California, January 23-26, 2001
-
(2001)
Proceedings of the SPIE, Security and Watermarking of Multimedia Contents
-
-
Fridrich, J.1
Goljan, M.2
Du, R.3
-
37
-
-
0027697301
-
The trustworthy digital camera: Restoring credibility to the photographic image
-
Friedman G (1993) The trustworthy digital camera: restoring credibility to the photographic image. IEEE Trans Consum Electron 39:905-910
-
(1993)
IEEE Trans Consum Electron
, vol.39
, pp. 905-910
-
-
Friedman, G.1
-
38
-
-
2442682088
-
Spread spectrum digital watermarking algorithm using gold codes
-
2
-
Gao Q, Li R, Wang H (2004) Spread spectrum digital watermarking algorithm using gold codes. Journal of Xi'an Jiaotong University 38(2):119-123
-
(2004)
Journal of xi'An Jiaotong University
, vol.38
, pp. 119-123
-
-
Gao, Q.1
Li, R.2
Wang, H.3
-
39
-
-
84947926543
-
Robust threshold DSS signatures
-
Advances in cryptology-EUROCRYPT '96. In: Proceedings on the international conference on the theory and application of cryptographic techniques Springer
-
Gennaro R, Jarecki S, Krawczyk H (1996) Robust threshold DSS signatures. Advances in cryptology-EUROCRYPT '96. In: Proceedings on the international conference on the theory and application of cryptographic techniques. Lecture notes in computer science, vol 1070. Springer, pp 354-71
-
(1996)
Lecture Notes in Computer Science
, vol.1070
, pp. 354-71
-
-
Gennaro, R.1
Jarecki, S.2
Krawczyk, H.3
-
40
-
-
0002297114
-
Distortion-free data embedding for images
-
April 25-27, 2001
-
Goljan M, Fridrich JJ, Du R (2002) Distortion-free data embedding for images. In: Proceedings of the 4th international workshop on information hiding, April 25-27, 2001, pp 27-41
-
(2002)
Proceedings of the 4th International Workshop on Information Hiding
, pp. 27-41
-
-
Goljan, M.1
Fridrich, J.J.2
Du, R.3
-
42
-
-
0002843657
-
Decomposition of function into wavelets of constant shape and related transforms
-
Streit L (ed) World Scientific
-
Grossmann A, Morlet J (1987) Decomposition of function into wavelets of constant shape and related transforms. In: Streit L (ed) Mathematics and physics, lectures on recent results. World Scientific
-
(1987)
Mathematics and Physics, Lectures on Recent Results
-
-
Grossmann, A.1
Morlet, J.2
-
43
-
-
0032268952
-
Extended Kasami algorithm for cyclic codes
-
Sydney, Australia
-
Hai Pang H, Sweeney P, Paffett J (1998) Extended Kasami algorithm for cyclic codes. In: Proceedings of the IEEE GLOBECOM 1998 (Cat. no. 98CH36250), vol 5. Sydney, Australia, pp 2834-2839
-
(1998)
Proceedings of the IEEE GLOBECOM 1998 (Cat. No. 98CH36250)
, vol.5
, pp. 2834-2839
-
-
Hai Pang, H.1
Sweeney, P.2
Paffett, J.3
-
44
-
-
0026851046
-
Technical features of the JBIG standard for progressive bi-level image compression
-
2
-
Hampel H, Arps R, Chamzas C (1992) Technical features of the JBIG standard for progressive bi-level image compression. Signal Process Image Commun 4(2):103-111
-
(1992)
Signal Process Image Commun
, vol.4
, pp. 103-111
-
-
Hampel, H.1
Arps, R.2
Chamzas, C.3
-
45
-
-
0028762624
-
New digital signature scheme based on discrete logarithm
-
5
-
Harn L (1994) New digital signature scheme based on discrete logarithm. Electron Lett 30(5):396-398
-
(1994)
Electron Lett
, vol.30
, pp. 396-398
-
-
Harn, L.1
-
48
-
-
0033872149
-
Counterfeiting attacks on oblivious block-wise independant invisible watermarking schemes
-
Holliman M, Memon N (1997) Counterfeiting attacks on oblivious block-wise independant invisible watermarking schemes. IEEE Trans Image Process 6:432-441
-
(1997)
IEEE Trans Image Process
, vol.6
, pp. 432-441
-
-
Holliman, M.1
Memon, N.2
-
50
-
-
0033885611
-
A digital watermark for images using the wavelet transform
-
2
-
Inoue H, Miyazaki A, Katsura T (2000) A digital watermark for images using the wavelet transform. Integr Comput Aided Eng 7(2):105-115
-
(2000)
Integr Comput Aided Eng
, vol.7
, pp. 105-115
-
-
Inoue, H.1
Miyazaki, A.2
Katsura, T.3
-
54
-
-
0001769898
-
Attacks on fast double block length hash functions
-
1
-
Knudsen LR, Xuejia L (1998) Attacks on fast double block length hash functions. J Cryptol 11(1):59-72
-
(1998)
J Cryptol
, vol.11
, pp. 59-72
-
-
Knudsen, L.R.1
Xuejia, L.2
-
56
-
-
84948672864
-
Colour image authentication based on a self-embedding technique
-
Santorini, Greece
-
Kostopoulos I, Gilani SAM, Skodras AN (2002) Colour image authentication based on a self-embedding technique. In: Proceedings of the 14th international conference on digital signal processing (DSP2002) vol 2, Santorini, Greece, pp 733-736
-
(2002)
Proceedings of the 14th International Conference on Digital Signal Processing (DSP2002)
, vol.2
, pp. 733-736
-
-
Kostopoulos, I.1
Sam, G.2
Skodras, A.N.3
-
57
-
-
0032648596
-
Digital watermarking for telltale tamper proofing and authentication
-
7
-
Kundur D, Hatzinakos D (1999) Digital watermarking for telltale tamper proofing and authentication. Proc IEEE 87(7):1167-1180
-
(1999)
Proc IEEE
, vol.87
, pp. 1167-1180
-
-
Kundur, D.1
Hatzinakos, D.2
-
58
-
-
0001001980
-
Digital watermaking of color images using amplitude modulation
-
2
-
Kutter M, Jordan F, Bossen F (1998) Digital watermaking of color images using amplitude modulation. J Electron Imaging 7(2):326-332
-
(1998)
J Electron Imaging
, vol.7
, pp. 326-332
-
-
Kutter, M.1
Jordan, F.2
Bossen, F.3
-
59
-
-
0033701078
-
The watermark copy attack
-
San Jose, California, USA
-
Kutter M, Voloshynocskiy S, Herrigel, A (2000) The watermark copy attack. In: Proceedings of SPIE security and watermarking of multimedia content II, vol 3971, San Jose, California, USA
-
(2000)
Proceedings of SPIE Security and Watermarking of Multimedia Content II
, vol.3971
-
-
Kutter, M.1
Voloshynocskiy, S.2
Herrigel, A.3
-
63
-
-
33646809377
-
An SVD-based watermarking method for image content authentication with improved security
-
Lee S, Jang D, Yoo CD (2005) An SVD-based watermarking method for image content authentication with improved security. In: Proceedings of the IEEE international conference on acoustics, speech, and signal processing, vol 2, pp 525-528
-
(2005)
Proceedings of the IEEE International Conference on Acoustics, Speech, and Signal Processing
, vol.2
, pp. 525-528
-
-
Lee, S.1
Jang, D.2
Yoo, C.D.3
-
64
-
-
0345565903
-
Reversible image watermarking
-
September 2003
-
Leest A, Veen M, Bruekers F (2003) Reversible image watermarking. In: Proceedings of the ICIP'03, vol 2, September 2003, pp 731-734
-
(2003)
Proceedings of the ICIP'03
, vol.2
, pp. 731-734
-
-
Leest, A.1
Veen, M.2
Bruekers, F.3
-
66
-
-
0008719828
-
Lossless compression of continuous-tone images by combined inter-bit-plane decorrelation and JBIG coding
-
2
-
Liang S, Rangayyan RM (1997) Lossless compression of continuous-tone images by combined inter-bit-plane decorrelation and JBIG coding. J Electron Imaging 6(2):198-207
-
(1997)
J Electron Imaging
, vol.6
, pp. 198-207
-
-
Liang, S.1
Rangayyan, R.M.2
-
68
-
-
1842438950
-
A robust image authentication method distinguishing JPEG compression from malicious manipulation
-
Lin CY, Chang SF (1997) A robust image authentication method distinguishing JPEG compression from malicious manipulation. CU/CTR Technical Report 486-97-19
-
(1997)
CU/CTR Technical Report 486-97-19
-
-
Lin, C.Y.1
Chang, S.F.2
-
71
-
-
0033717154
-
Detection of image alterations using semi-fragile watermarks
-
San Jose, CA, USA
-
Lin ET, Christine I, Podilchuk B, Delp EJ (2000) Detection of image alterations using semi-fragile watermarks. In: Proceedings of the SPIE international conference on security and watermarking of multimedia contents II, vol 3971, San Jose, CA, USA
-
(2000)
Proceedings of the SPIE International Conference on Security and Watermarking of Multimedia Contents II
, vol.3971
-
-
Lin, E.T.1
Christine, I.2
Podilchuk, B.3
Delp, E.J.4
-
72
-
-
0035763338
-
Using self-authentication-and-recovery for error concealment in wireless environments
-
Lin CY, Sow D, Chang SF (2001) Using self-authentication-and-recovery for error concealment in wireless environments. In: Proceedings of SPIE, vol 4518
-
(2001)
Proceedings of SPIE
, vol.4518
-
-
Lin, C.Y.1
Sow, D.2
Chang, S.F.3
-
74
-
-
0033747098
-
ECC performance evaluation for MDFE read channel
-
2
-
Liu B, Wang X (2000) ECC performance evaluation for MDFE read channel. Chin J Electron 9(2):144-148
-
(2000)
Chin J Electron
, vol.9
, pp. 144-148
-
-
Liu, B.1
Wang, X.2
-
77
-
-
0034140535
-
Fault resilient and compression tolerant digital signature for image authentication
-
Lou DC, Liu JL (2000) Fault resilient and compression tolerant digital signature for image authentication. IEEE Trans Consum Electron 46:31-39
-
(2000)
IEEE Trans Consum Electron
, vol.46
, pp. 31-39
-
-
Lou, D.C.1
Liu, J.L.2
-
78
-
-
0013106830
-
Structural digital signature for image authentication: An incidental distortion resistant scheme
-
Lu C-S (2000) Structural digital signature for image authentication: an incidental distortion resistant scheme. In: Proceedings of the ACM multimedia workshops, pp 115-118
-
(2000)
Proceedings of the ACM Multimedia Workshops
, pp. 115-118
-
-
Lu, C.-S.1
-
79
-
-
0037869332
-
Fragile watermarking scheme for image authentication
-
12
-
Lu H, Shen R, Chung F-L (2003) Fragile watermarking scheme for image authentication. Electron Lett 39(12):898-900
-
(2003)
Electron Lett
, vol.39
, pp. 898-900
-
-
Lu, H.1
Shen, R.2
Chung, F.-L.3
-
80
-
-
0037426973
-
Semi-fragile image watermarking method based on index constrained vector quantization
-
1
-
Lu Z-M, Liu C-H, Xu D-G (2003) Semi-fragile image watermarking method based on index constrained vector quantization. Electron Lett 39(1):35-36
-
(2003)
Electron Lett
, vol.39
, pp. 35-36
-
-
Lu, Z.-M.1
Liu, C.-H.2
Xu, D.-G.3
-
81
-
-
20444378085
-
Multipurpose image watermarking algorithm based on multistage vector quantization
-
6
-
Lu Z-M, Xu D-G, Sun S-H (2005) Multipurpose image watermarking algorithm based on multistage vector quantization. IEEE Trans Image Process. 14(6):822-831
-
(2005)
IEEE Trans Image Process
, vol.14
, pp. 822-831
-
-
Lu, Z.-M.1
Xu, D.-G.2
Sun, S.-H.3
-
82
-
-
0030130001
-
A new approach to image feature detection with applications
-
Manjunath BS, Shekhar C, Chellappa R (1996) A new approach to image feature detection with applications. Pattern Recogn 31:627-640
-
(1996)
Pattern Recogn
, vol.31
, pp. 627-640
-
-
Manjunath, B.S.1
Shekhar, C.2
Chellappa, R.3
-
87
-
-
33750899258
-
Further attacks on the Yeung-Mintzer fragile watermark
-
San Jose, California, USA
-
Memon ND, Fridrich J (2000) Further attacks on the Yeung-Mintzer fragile watermark. In: Proceedings of the SPIE international conference on security and watermarking of multimedia content II, vol 3971, San Jose, California, USA
-
(2000)
Proceedings of the SPIE International Conference on Security and Watermarking of Multimedia Content II
, vol.3971
-
-
Memon, N.D.1
Fridrich, J.2
-
89
-
-
0033686485
-
Distortion bounded authentication techniques
-
Memon N, Poorvi V, Boon-Lock Y, Yeung M (2000) Distortion bounded authentication techniques. In: Proceedings of the SPIE international conference on security and watermarking of multimedia contents II, vol 3971, pp 164-174
-
(2000)
Proceedings of the SPIE International Conference on Security and Watermarking of Multimedia Contents II
, vol.3971
, pp. 164-174
-
-
Memon, N.1
Poorvi, V.2
Boon-Lock, Y.3
Yeung, M.4
-
91
-
-
0242410360
-
A practical (t, n) threshold proxy signature scheme based on the RSA cryptosystem
-
6
-
Min-Shiang H, Jui-Lin L, Iuon-Chang L (2003) A practical (t, n) threshold proxy signature scheme based on the RSA cryptosystem. IEEE Trans Knowl Data Eng 15(6):1552-1560
-
(2003)
IEEE Trans Knowl Data Eng
, vol.15
, pp. 1552-1560
-
-
Min-Shiang, H.1
Jui-Lin, L.2
Iuon-Chang, L.3
-
92
-
-
0031338360
-
Effective and ineffective digital watermarks
-
Santa Barbara, CA, USA
-
Mintzer F, Braudaway G, Yeung M (1998) Effective and ineffective digital watermarks. In: Proceedings of the ICIP'97, Santa Barbara, CA, USA
-
(1998)
Proceedings of the ICIP'97
-
-
Mintzer, F.1
Braudaway, G.2
Yeung, M.3
-
95
-
-
84948995055
-
Can DSA be improved? Complexity trade-offs with the digital signature standard
-
Workshop on the theory and application of cryptographic techniques
-
Naccache D, M'raïhi D, Vaudenay S, Raphaeli D (1995) Can DSA be improved? Complexity trade-offs with the digital signature standard. In: Proceedings of advances in cryptology-EUROCRYPT '94. Workshop on the theory and application of cryptographic techniques, pp 77-85
-
(1995)
Proceedings of Advances in Cryptology-EUROCRYPT '94
, pp. 77-85
-
-
Naccache, D.1
M'Raïhi, D.2
Vaudenay, S.3
Raphaeli, D.4
-
97
-
-
0018306059
-
A threshold selection method from gray-level histograms
-
1
-
Otsu N (1979) A threshold selection method from gray-level histograms. IEEE Trans Syst Man Cybern 9(1):62-66
-
(1979)
IEEE Trans Syst Man Cybern
, vol.9
, pp. 62-66
-
-
Otsu, N.1
-
98
-
-
0036064966
-
Wavelet-based digital watermarking for image authentication
-
Winnipeg, Manitoba, Canada
-
Paquet AH, Ward RK (2002) Wavelet-based digital watermarking for image authentication. In: Proceedings of the IEEE Canadian conference on electrical and computer engineering, vol I. Winnipeg, Manitoba, Canada, pp 879-884
-
(2002)
Proceedings of the IEEE Canadian Conference on Electrical and Computer Engineering
, vol.1
, pp. 879-884
-
-
Paquet, A.H.1
Ward, R.K.2
-
102
-
-
0343163041
-
Digital signature schemes: General framework and fail-stop signatures
-
Springer, Berlin, Allemagne
-
Pfitzmann B (1996) Digital signature schemes: general framework and fail-stop signatures. Lecture notes in computer science, vol 1100. Springer, Berlin, Allemagne
-
(1996)
Lecture Notes in Computer Science
, vol.1100
-
-
Pfitzmann, B.1
-
105
-
-
44949152367
-
Compression factor and error sensitivity of the modified READ method. Communication, control and signal processing
-
Queluz MP, Salema C (1990) Compression factor and error sensitivity of the modified READ method. Communication, control and signal processing. In: Proceedings of the 1990 Bilkent international conference on new trends in communication, control and signal processing, vol 2, pp 1446-1452
-
(1990)
Proceedings of the 1990 Bilkent International Conference on New Trends in Communication, Control and Signal Processing
, vol.2
, pp. 1446-1452
-
-
Queluz, M.P.1
Salema, C.2
-
108
-
-
0031360267
-
New technique to derive invariant features for unequally scaled images
-
Raveendran P, Ornatu S, Chew P (1997) New technique to derive invariant features for unequally scaled images. In: Proceedings of the IEEE international conference on systems, man and cybernetics, vol 4, pp 3158-3163
-
(1997)
Proceedings of the IEEE International Conference on Systems, Man and Cybernetics
, vol.4
, pp. 3158-3163
-
-
Raveendran, P.1
Ornatu, S.2
Chew, P.3
-
109
-
-
0003195066
-
The MD4 message digest algorithm
-
MIT and RSA Data Security, Inc
-
Rivest R (1992) The MD4 message digest algorithm. RFC 1320, MIT and RSA Data Security, Inc
-
(1992)
RFC
, vol.1320
-
-
Rivest, R.1
-
110
-
-
0017930809
-
A method for obtaining digital signatures and public-key cryptosystems
-
2
-
Rivest RL, Shamir A, Adleman LM (1978) A method for obtaining digital signatures and public-key cryptosystems. Commun ACM 21(2):120-126
-
(1978)
Commun ACM
, vol.21
, pp. 120-126
-
-
Rivest, R.L.1
Shamir, A.2
Adleman, L.M.3
-
111
-
-
38649102081
-
Performance of symmetric ciphers and one-way hash functions. Fast software encryption
-
Roe M (1994) Performance of symmetric ciphers and one-way hash functions. Fast software encryption. In: Proceedings of the Cambridge security workshop, pp 83-89
-
(1994)
Proceedings of the Cambridge Security Workshop
, pp. 83-89
-
-
Roe, M.1
-
112
-
-
1842688775
-
MD2 is not secure without the checksum byte
-
3
-
Rogier N, Chauvaud P (1997) MD2 is not secure without the checksum byte. Designs Codes Cryptogr 12(3):245-251
-
(1997)
Designs Codes Cryptogr
, vol.12
, pp. 245-251
-
-
Rogier, N.1
Chauvaud, P.2
-
113
-
-
0012081094
-
RSA-based undeniable signatures
-
4
-
Rosario G, Krawczyk H (2000) RSA-based undeniable signatures. J Cryptol 13(4):397-416
-
(2000)
J Cryptol
, vol.13
, pp. 397-416
-
-
Rosario, G.1
Krawczyk, H.2
-
114
-
-
0027557552
-
Modified gold codes
-
2
-
Rothaus O (1993) Modified gold codes. IEEE Trans Inf Theory 39(2)654-656
-
(1993)
IEEE Trans Inf Theory
, vol.39
, pp. 654-656
-
-
Rothaus, O.1
-
116
-
-
0019021287
-
Crosscorrelation properties of pseudorandom and related sequences
-
Sarwate DV, Pursley MB (1980) Crosscorrelation properties of pseudorandom and related sequences. Proc IEEE 68:593-619
-
(1980)
Proc IEEE
, vol.68
, pp. 593-619
-
-
Sarwate, D.V.1
Pursley, M.B.2
-
119
-
-
0001574510
-
Image coding based on morphological representation of wavelet data
-
9
-
Sergio D, Servetto KR, Orchard MT (1999) Image coding based on morphological representation of wavelet data. IEEE Trans Image Process 8(9):1161-1174
-
(1999)
IEEE Trans Image Process
, vol.8
, pp. 1161-1174
-
-
Sergio, D.1
Servetto, K.R.2
Orchard, M.T.3
-
120
-
-
0036450244
-
Fragile and semi-fragile image authentication based on image self-similarity image processing
-
Sherif, NE-D, Mansour M (2002) Fragile and semi-fragile image authentication based on image self-similarity image processing. In: Proceedings of the international conference on image processing, vol 2, pp 897-900
-
(2002)
Proceedings of the International Conference on Image Processing
, vol.2
, pp. 897-900
-
-
Sherif1
Ne-D2
Mansour, M.3
-
121
-
-
35248891585
-
New DSA-verifiable signcryption schemes
-
Proceedings of the 5th international conference on information security and cryptology-ICISC 2002 Springer
-
Shin JB, Lee K, Shim K (2002) New DSA-verifiable signcryption schemes. In: Proceedings of the 5th international conference on information security and cryptology-ICISC 2002. Lecture notes in computer science, vol 2587. Springer, pp 35-47
-
(2002)
Lecture Notes in Computer Science
, vol.2587
, pp. 35-47
-
-
Shin, J.B.1
Lee, K.2
Shim, K.3
-
126
-
-
0036448095
-
Semi-fragile image authentication using generic wavelet domain features and ECC
-
Sun Q, Chang SF (2002) Semi-fragile image authentication using generic wavelet domain features and ECC. In: Proceedings of the ICIP
-
(2002)
Proceedings of the ICIP
-
-
Sun, Q.1
Chang, S.F.2
-
127
-
-
20444390631
-
A secure and robust digital signature scheme for JPEG 2000 image authentication
-
3
-
Sun Q, Chang SF (2005) A secure and robust digital signature scheme for JPEG 2000 image authentication. IEEE Trans Multimedia 7(3):480-494
-
(2005)
IEEE Trans Multimedia
, vol.7
, pp. 480-494
-
-
Sun, Q.1
Chang, S.F.2
-
128
-
-
0025432029
-
Duplex modified-READ coding scheme for facsimile transmission of documents
-
5
-
Tanaka K, Nakamura Y, Matsui K (1990) Duplex modified-READ coding scheme for facsimile transmission of documents. Electron Commun Jpn Part 1 Commun 73(5):46-56
-
(1990)
Electron Commun Jpn Part 1 Commun
, vol.73
, pp. 46-56
-
-
Tanaka, K.1
Nakamura, Y.2
Matsui, K.3
-
129
-
-
0028419042
-
Incoherent asynchronous optical CDMA using gold codes
-
9
-
Tancevski L, Bazgaloski L, Andonovic I (1994) Incoherent asynchronous optical CDMA using gold codes. Electron Lett 30(9):721-723
-
(1994)
Electron Lett
, vol.30
, pp. 721-723
-
-
Tancevski, L.1
Bazgaloski, L.2
Andonovic, I.3
-
131
-
-
0003547502
-
-
Kluwer Boston
-
Taubman D, Marcellin S, Michael W (2002) JPEG2000: image compression fundamentals, standards, and practice. Kluwer, Boston
-
(2002)
JPEG2000: Image Compression Fundamentals, Standards, and Practice
-
-
Taubman, D.1
Marcellin, S.2
Michael, W.3
-
132
-
-
44949212670
-
Image processing toolbox
-
The Mathworks Inc.
-
The Mathworks Inc. image processing toolbox. User's guide. Version 3
-
User's Guide. Version 3
-
-
-
133
-
-
2642526212
-
Reversible watermarking by difference expansion
-
December 2002
-
Tian J (2002) Reversible watermarking by difference expansion. In: Proceedings of workshop on multimedia and security, December 2002, pp 19-22
-
(2002)
Proceedings of Workshop on Multimedia and Security
, pp. 19-22
-
-
Tian, J.1
-
134
-
-
0002167987
-
-
DICTA-93. Macquarie University, Sydney, Australia
-
Tirkel AZ, Rankin GA, Schyndel van RG, Osborne CF (1993) Electronic watermark. DICTA-93. Macquarie University, Sydney, Australia, pp 666-672
-
(1993)
Electronic Watermark
, pp. 666-672
-
-
Tirkel, A.Z.1
Rankin, G.A.2
Van Rg, S.3
Osborne, C.F.4
-
136
-
-
0022266946
-
Moment-preserving thresholding: A new approach
-
Tsai WH (1985) Moment-preserving thresholding: a new approach. Comput Vis Graph Image Process 29:377-393
-
(1985)
Comput Vis Graph Image Process
, vol.29
, pp. 377-393
-
-
Tsai, W.H.1
-
142
-
-
0029292158
-
Information authentication for a slippery new age
-
4
-
Walton S (1995) Information authentication for a slippery new age. Dr Dobb's J 20(4):18-26
-
(1995)
Dr Dobb's J
, vol.20
, pp. 18-26
-
-
Walton, S.1
-
143
-
-
0036529692
-
A new ECC/RLL coding scheme
-
2
-
Wang X, Liu B (2002) A new ECC/RLL coding scheme. Chin J Electron 11(2):186-191
-
(2002)
Chin J Electron
, vol.11
, pp. 186-191
-
-
Wang, X.1
Liu, B.2
-
145
-
-
0008779206
-
Techniques for watermarking digital imagery: Further studies
-
Las Vegas, Nevada, USA
-
Wolfgang RB, Delp EJ (1997) Techniques for watermarking digital imagery: further studies. In: Proceedings of the international conference on imaging science, systems, and technology, vol 1. Las Vegas, Nevada, USA, pp 279-287
-
(1997)
Proceedings of the International Conference on Imaging Science, Systems, and Technology
, vol.1
, pp. 279-287
-
-
Wolfgang, R.B.1
Delp, E.J.2
-
147
-
-
0002956093
-
A watermark for image integrity and ownership verification
-
Portland, OR, USA
-
Wong PW (1998a) A watermark for image integrity and ownership verification. In: Proceedings of the IS&T PIC conference, Portland, OR, USA
-
(1998)
Proceedings of the IS&T PIC Conference
-
-
Wong, P.W.1
-
148
-
-
0032312612
-
A public key watermark for image verification and authentication
-
Chicago, IL, USA
-
Wong PW (1998b) A public key watermark for image verification and authentication. In: Proceedings of the ICIP, Chicago, IL, USA
-
(1998)
Proceedings of the ICIP
-
-
Wong, P.W.1
-
149
-
-
44949220013
-
-
San Jose, California, USA
-
Wong PW, Delp EJ (1999) Security and watermarking of multimedia contents, vol 3657. San Jose, California, USA, pp 204-213
-
(1999)
Security and Watermarking of Multimedia Contents
, vol.3657
, pp. 204-213
-
-
Wong, P.W.1
Delp, E.J.2
-
150
-
-
0035473831
-
Secret and public key image watermarking schemes for image authentication and ownership verification
-
Wong PW, Memon N (2001) Secret and public key image watermarking schemes for image authentication and ownership verification. IEEE Trans Image Process 10:1593-1601
-
(2001)
IEEE Trans Image Process
, vol.10
, pp. 1593-1601
-
-
Wong, P.W.1
Memon, N.2
-
152
-
-
0036755019
-
On the design of content based multimedia authentication systems
-
3
-
Wu CW (2002) On the design of content based multimedia authentication systems. IEEE Trans Multimedia 4(3):385-393
-
(2002)
IEEE Trans Multimedia
, vol.4
, pp. 385-393
-
-
Wu, C.W.1
-
155
-
-
0003031033
-
A blind wavelet based digital signature for image authentication
-
Xie L, Arce GR, (1998b) A blind wavelet based digital signature for image authentication. In: Proceedings of the EUSIPCO-98
-
(1998)
Proceedings of the EUSIPCO-98
-
-
Xie, L.1
Arce, G.R.2
-
156
-
-
0032291652
-
Joint wavelet compression and authentication watermarking
-
Xie L, Arce GR (1998c) Joint wavelet compression and authentication watermarking. In: Proceedings of the ICIP'98
-
(1998)
Proceedings of the ICIP'98
-
-
Xie, L.1
Arce, G.R.2
-
158
-
-
0043201448
-
Digital watermarking introduction
-
7
-
Yeung MM (1998) Digital watermarking introduction. Commun ACM 41(7):31-33
-
(1998)
Commun ACM
, vol.41
, pp. 31-33
-
-
Yeung, M.M.1
-
159
-
-
0031378592
-
An invisible watermarking technique for image verification
-
Santa Barbara, CA
-
Yeung M, Mintzer F (1997) An invisible watermarking technique for image verification. In: Proceedings of the ICIP'97, Santa Barbara, CA
-
(1997)
Proceedings of the ICIP'97
-
-
Yeung, M.1
Mintzer, F.2
-
160
-
-
21244463550
-
Content based watermarking scheme for image authentication
-
Yu S, Hu Y, Zhou J (2004) Content based watermarking scheme for image authentication. In: Proceedings of the control, automation, robotics and vision conference 2004, vol 2, pp 1083-1087
-
(2004)
Proceedings of the Control, Automation, Robotics and Vision Conference 2004
, vol.2
, pp. 1083-1087
-
-
Yu, S.1
Hu, Y.2
Zhou, J.3
-
161
-
-
0027624160
-
A computational vision approach to image registration
-
Zheng Q, Chellappa R (1993) A computational vision approach to image registration. IEEE Trans Image Process 2(3):311-326
-
(1993)
IEEE Trans Image Process
, vol.2
, Issue.3
, pp. 311-326
-
-
Zheng, Q.1
Chellappa, R.2
|