-
1
-
-
0036544390
-
Toward a secure public-key blockwise fragile authentication watermarking
-
Barreto, P. S. L. M., H. Y. Kim and V. Rijmen, Toward a secure public-key blockwise fragile authentication watermarking, IEE Proceedings - Vision, Image and Signal Processing, vol.149, no.2, pp.57-62, 2002.
-
(2002)
IEE Proceedings - Vision, Image and Signal Processing
, vol.149
, Issue.2
, pp. 57-62
-
-
Barreto, P.S.L.M.1
Kim, H.Y.2
Rijmen, V.3
-
2
-
-
33947720908
-
Toward a robust image authentication method surviving JPEG lossy compression
-
Chen, C. C. and C. S. Lin, Toward a robust image authentication method surviving JPEG lossy compression, Journal of Information Science and Engineering, vol.23, no.2, pp.511-524, 2007.
-
(2007)
Journal of Information Science and Engineering
, vol.23
, Issue.2
, pp. 511-524
-
-
Chen, C.C.1
Lin, C.S.2
-
3
-
-
0038612961
-
DCT-based image watermarking using subsampling
-
Chu, W. C, DCT-based image watermarking using subsampling, IEEE Transactions on Multimedia, vol.5, pp.34-38, 2003
-
(2003)
IEEE Transactions on Multimedia
, vol.5
, pp. 34-38
-
-
Chu, W.C.1
-
5
-
-
0035338404
-
Image based document authentication using DCT
-
Garg, G., P. K. Sharma and S. Chaudhury, Image based document authentication using DCT, Pattern Recognition Letters, vol.22, pp.725-729, 2001.
-
(2001)
Pattern Recognition Letters
, vol.22
, pp. 725-729
-
-
Garg, G.1
Sharma, P.K.2
Chaudhury, S.3
-
7
-
-
3042694654
-
Semi-fragile watermarking scheme for authentication of JPEG Images
-
Ho, K. and C. T. Li, Semi-fragile watermarking scheme for authentication of JPEG Images, Proc. of the IEEE International Conference on Information Technology: Coding and Computing, vol.l, pp.7-11, 2004.
-
(2004)
Proc. of the IEEE International Conference on Information Technology: Coding and Computing
, vol.50
, pp. 7-11
-
-
Ho, K.1
Li, C.T.2
-
8
-
-
0032785523
-
Hidden digital watermarks in images
-
Hsu, C. T. and J. L. Wu, Hidden digital watermarks in images, IEEE Transactions on Image Processing, vol.8, no.l, pp.58-68, 1999.
-
(1999)
IEEE Transactions on Image Processing
, vol.8
, Issue.L
, pp. 58-68
-
-
Hsu, C.T.1
Wu, J.L.2
-
10
-
-
0035248504
-
A robust image authentication method distinguishing JPEG compression from malicious manipulation
-
Lin, C. Y. and S. F. Chang, A robust image authentication method distinguishing JPEG compression from malicious manipulation, IEEE Transactions on Circuits and Systems of Video Technology, vol. 11, pp.153-168, 2001.
-
(2001)
IEEE Transactions on Circuits and Systems of Video Technology
, vol.11
, pp. 153-168
-
-
Lin, C.Y.1
Chang, S.F.2
-
11
-
-
0034249378
-
A robust DCT-based watermarking for copyright protection
-
Lin, S. D. and C. F. Chen, A robust DCT-based watermarking for copyright protection, IEEE Transactions on Consumer Electronics, vol.46, no.3, pp.415-421, 2000.
-
(2000)
IEEE Transactions on Consumer Electronics
, vol.46
, Issue.3
, pp. 415-421
-
-
Lin, S.D.1
Chen, C.F.2
-
12
-
-
0346216903
-
Genetic Watermarking based on transformdomain techniques
-
Shieh, C. S., H. C. Huang, F. H. Wang and J. S. Pan, Genetic Watermarking based on transformdomain techniques, Pattern Recognition, vol.37, no.3, pp.555-565, 2004.
-
(2004)
Pattern Recognition
, vol.37
, Issue.3
, pp. 555-565
-
-
Shieh, C.S.1
Huang, H.C.2
Wang, F.H.3
Pan, J.S.4
-
13
-
-
84949210459
-
A SVD and quantization based semi-fragile watermarking technique for image authentication
-
Sun, R., H. Sun and T. Yao, A SVD and quantization based semi-fragile watermarking technique for image authentication, Proc. of the IEEE International Conference on Signal Processing, vol.2, pp.1592-1595, 2002.
-
(2002)
Proc. of the IEEE International Conference on Signal Processing
, vol.2
, pp. 1592-1595
-
-
Sun, R.1
Sun, H.2
Yao, T.3
-
14
-
-
0142029533
-
Using set partitioning in hierarchical trees to authenticate digital images
-
Tsai, P., Y. C. Hu and C. C. Chang, Using set partitioning in hierarchical trees to authenticate digital images, Signal Processing: Image Communication, vol.18, pp.813-822, 2003.
-
(2003)
Signal Processing: Image Communication
, vol.18
, pp. 813-822
-
-
Tsai, P.1
Hu, Y.C.2
Chang, C.C.3
-
15
-
-
0035473831
-
Secret and public key image watermarking schemes for image authentication and ownership verification
-
Wong, P. W. and N. Memon, Secret and public key image watermarking schemes for image authentication and ownership verification, IEEE Transactions on Image Processing, vol.10, pp.1593-1601, 2001.
-
(2001)
IEEE Transactions on Image Processing
, vol.10
, pp. 1593-1601
-
-
Wong, P.W.1
Memon, N.2
-
16
-
-
0032292342
-
Watermarking for image authentication
-
Wu, M. and B. Liu, Watermarking for image authentication, Proc. of the IEEE International Conference on Image Processing, vol.2, pp.437-441, 1998.
-
(1998)
Proc. of the IEEE International Conference on Image Processing
, vol.2
, pp. 437-441
-
-
Wu, M.1
Liu, B.2
-
17
-
-
0031378592
-
An invisible watermarking technique for image verification
-
Yueng, M. and F. Mintzer, An invisible watermarking technique for image verification, Proc. of the IEEE International Conference on Image Processing, vol.2, pp.680-683, 1997.
-
(1997)
Proc. of the IEEE International Conference on Image Processing
, vol.2
, pp. 680-683
-
-
Yueng, M.1
Mintzer, F.2
|