-
1
-
-
0032312612
-
A Public key watermarking for image verification and authentication
-
P.W. Wong (1998), "A Public Key Watermarking for Image Verification and Authentication," Int. Conf. Image Processing, pp. 455-459.
-
(1998)
Int. Conf. Image Processing
, pp. 455-459
-
-
Wong, P.W.1
-
2
-
-
0033872149
-
Counterfeiting attacks on oblivious block-wise independent invisible watermarking schemes
-
M. Holliman and N. Memon (2000), "Counterfeiting Attacks on Oblivious Block-Wise Independent Invisible Watermarking Schemes," IEEE Trans. Image Processing, Vol. 9, pp. 432-441.
-
(2000)
IEEE Trans. Image Processing
, vol.9
, pp. 432-441
-
-
Holliman, M.1
Memon, N.2
-
3
-
-
0032650557
-
Content-based digital signature for motion pictures authentication and content-fragile watermarking
-
J. Dittmann, A. Steinmetz, and R. Steinmetz (1999), "Content-Based Digital Signature for Motion Pictures Authentication and Content-Fragile Watermarking," Int. Conf. Multimedia Computing and Systems, Vol.2, pp. 209-213.
-
(1999)
Int. Conf. Multimedia Computing and Systems
, vol.2
, pp. 209-213
-
-
Dittmann, J.1
Steinmetz, A.2
Steinmetz, R.3
-
4
-
-
0036611838
-
Hierarchical watermarking for secure image authentication with localization
-
M.U. Celik, G. Sharma, E. Saber, and A.M. Tekalp (2002), "Hierarchical Watermarking for Secure Image Authentication With Localization," IEEE Trans. Image Processing, Vol. 11, No. 6, pp. 585-595.
-
(2002)
IEEE Trans. Image Processing
, vol.11
, Issue.6
, pp. 585-595
-
-
Celik, M.U.1
Sharma, G.2
Saber, E.3
Tekalp, A.M.4
-
5
-
-
0032648596
-
Digital watermarking for telltale tamper proofing and authentication
-
D. Kundur and D. Hatzinakos (1999), "Digital Watermarking for Telltale Tamper Proofing and Authentication," Proceedings of the IEEE, Vol. 87, pp.1167-1180.
-
(1999)
Proceedings of the IEEE
, vol.87
, pp. 1167-1180
-
-
Kundur, D.1
Hatzinakos, D.2
-
6
-
-
0031378592
-
An invisible watermarking technique for image verification
-
M. Yeung, and F. Mintzer (1997), "An Invisible Watermarking Technique for Image Verification," Int. Conf. Image Processing, pp. 680-683.
-
(1997)
Int. Conf. Image Processing
, pp. 680-683
-
-
Yeung, M.1
Mintzer, F.2
-
8
-
-
0035786867
-
Digital watermarking technique for image authentication by neighboring block similarity measure
-
N. Chotikakamthorn and W. Sangiamkun (2001), "Digital Watermarking Technique for Image Authentication by Neighboring Block Similarity Measure," Int. Conf. Electrical and Electronic Technology, pp. 743-747.
-
(2001)
Int. Conf. Electrical and Electronic Technology
, pp. 743-747
-
-
Chotikakamthorn, N.1
Sangiamkun, W.2
-
9
-
-
0035388316
-
Mean quantization-based fragile watermarking for image authentication
-
G.J. Yu, C.S. Lu, and H.Y.M. Liao (2001), "Mean Quantization-Based Fragile Watermarking for Image Authentication," Optical Engineering, Vol. 40, No. 7, pp. 1396-1408.
-
(2001)
Optical Engineering
, vol.40
, Issue.7
, pp. 1396-1408
-
-
Yu, G.J.1
Lu, C.S.2
Liao, H.Y.M.3
-
11
-
-
0034444323
-
Wavelet packet and adaptive spatial transformation of watermark for digital image authentication
-
September 10-13, Vancouver, Canada
-
M.J. Tsai, K.Y. Yu, and Y.Z. Chen (2000), "Wavelet Packet and Adaptive Spatial Transformation of Watermark for Digital Image Authentication," Int. Conf. Image Processing, September 10-13, Vancouver, Canada.
-
(2000)
Int. Conf. Image Processing
-
-
Tsai, M.J.1
Yu, K.Y.2
Chen, Y.Z.3
-
12
-
-
0034443405
-
Robust image watermark with wavelet transform and spread spectrum techniques
-
Y.P. Wang, M.J. Chen, and P.Y. Cheng (2000), "Robust Image Watermark with Wavelet Transform and Spread Spectrum Techniques," Int. Conf. Systems and Computers, Vol. 2, pp. 1846-1850.
-
(2000)
Int. Conf. Systems and Computers
, vol.2
, pp. 1846-1850
-
-
Wang, Y.P.1
Chen, M.J.2
Cheng, P.Y.3
-
13
-
-
8644267842
-
Oblivious fragile watermarking scheme for image authentication
-
C.T. Li, F.M. Yan, and C.S. Lee (2002), "Oblivious Fragile Watermarking Scheme for Image Authentication," Int. Conf. Acoustics, Speech, and Signal Processing, Vol. 4, pp. 3445-3448.
-
(2002)
Int. Conf. Acoustics, Speech, and Signal Processing
, vol.4
, pp. 3445-3448
-
-
Li, C.T.1
Yan, F.M.2
Lee, C.S.3
-
15
-
-
0032292342
-
Watermarking for image authentication
-
M. Wu and B. Liu (1998), "Watermarking for Image Authentication," Int. Conf. Image Processing, Vol. 2, pp. 437-441.
-
(1998)
Int. Conf. Image Processing
, vol.2
, pp. 437-441
-
-
Wu, M.1
Liu, B.2
-
16
-
-
0035473830
-
Multipurpose watermarking for image authentication and protection
-
G.J. Yu, C.S. Lu, and H.Y.M. Liao (2001), "Multipurpose Watermarking for Image Authentication and Protection," IEEE Trans. Image Processing, Vol. 10, pp. 1579-1592.
-
(2001)
IEEE Trans. Image Processing
, vol.10
, pp. 1579-1592
-
-
Yu, G.J.1
Lu, C.S.2
Liao, H.Y.M.3
-
18
-
-
0034140162
-
Digital watermarking using zerotree of DCT
-
C.F. Wu and W.S. Hsieh (2000), "Digital Watermarking Using Zerotree of DCT," IEEE Trans. Consumer Electronics, Vol. 46, pp. 87-94.
-
(2000)
IEEE Trans. Consumer Electronics
, vol.46
, pp. 87-94
-
-
Wu, C.F.1
Hsieh, W.S.2
-
19
-
-
0037153490
-
Image fragile watermarking based on fusion of multi-resolution tamper detection
-
J. Hu, J. Huang, D. Huang, and Y.Q. Shi (2002), "Image Fragile Watermarking Based on Fusion of Multi-Resolution Tamper Detection," Electronics Letters, Vol. 38, pp. 1512-1513.
-
(2002)
Electronics Letters
, vol.38
, pp. 1512-1513
-
-
Hu, J.1
Huang, J.2
Huang, D.3
Shi, Y.Q.4
-
20
-
-
0037818310
-
Structural digital signature for image authentication: An incidental distortion resistant scheme
-
G.J. Yu, C.S. Lu, and H.Y.M. Liao (2003), "Structural Digital Signature for Image Authentication: An Incidental Distortion Resistant Scheme," IEEE Trans. Multimedia, Vol. 5, pp.161-173.
-
(2003)
IEEE Trans. Multimedia
, vol.5
, pp. 161-173
-
-
Yu, G.J.1
Lu, C.S.2
Liao, H.Y.M.3
-
21
-
-
0037096996
-
A public verifiable copy protection technique for still images
-
W.B. Lee and T.H. Chen (2002), "A Public Verifiable Copy Protection Technique for Still Images," Journal of systems and Software, Vol. 62, No. 3, pp. 195-204.
-
(2002)
Journal of Systems and Software
, vol.62
, Issue.3
, pp. 195-204
-
-
Lee, W.B.1
Chen, T.H.2
-
22
-
-
0141909303
-
Blind watermarking method based on DWT middle frequency pair
-
Q. Yuan, H. Yao, W. Gao, and S. Joo (2002) "Blind Watermarking Method Based on DWT Middle Frequency Pair," Int. Conf. Multimedia and Expo, Vol. 2, pp.473-476.
-
(2002)
Int. Conf. Multimedia and Expo
, vol.2
, pp. 473-476
-
-
Yuan, Q.1
Yao, H.2
Gao, W.3
Joo, S.4
|