-
1
-
-
1942486239
-
Geometric Invariance in Image Watermarking
-
Feb
-
Alghoniemy, M. and Tewfik, A. H., "Geometric Invariance in Image Watermarking," IEEE Trans. Image Process, Vol. 13, No. 2, pp. 145-153, Feb. 2004.
-
(2004)
IEEE Trans. Image Process
, vol.13
, Issue.2
, pp. 145-153
-
-
Alghoniemy, M.1
Tewfik, A.H.2
-
4
-
-
0033872149
-
Counterfeiting Attacks on Oblivious Block-wise Independent Invisible Watermarking Schemas
-
Holliman, M. and Memon, N., "Counterfeiting Attacks on Oblivious Block-wise Independent Invisible Watermarking Schemas," IEEE Trans. on Image Processing, Vol. 9, No. 3, pp. 432-441, 2000.
-
(2000)
IEEE Trans. on Image Processing
, vol.9
, Issue.3
, pp. 432-441
-
-
Holliman, M.1
Memon, N.2
-
5
-
-
4344690634
-
On the Need for Image Dependent Keys for Watermarking
-
NJIT
-
Holliman, M., Memon, N. and Yeung, M., "On the Need for Image Dependent Keys for Watermarking," in Proc. of the Second Workshop on Multimedia, NJIT, 1999.
-
(1999)
Proc. of the Second Workshop on Multimedia
-
-
Holliman, M.1
Memon, N.2
Yeung, M.3
-
6
-
-
20444458213
-
Image Authentication Surviving Acceptable Modifications Using Statistical Measures and K-Mean Segmentation
-
June
-
Kailasanathan, C. and Naini, R. C., "Image Authentication Surviving Acceptable Modifications Using Statistical Measures and K-Mean Segmentation," IEEE-EURASIP Work. Nonlinear Sig. and Image Proc., June 2001.
-
(2001)
IEEE-EURASIP Work. Nonlinear Sig. and Image Proc
-
-
Kailasanathan, C.1
Naini, R.C.2
-
7
-
-
20444500587
-
Robust Perceptual Image Hashing via Matrix Invariants
-
Singapore, Oct
-
Kozat, S. S., Venkatesan, R. and Mihçak, M. K., "Robust Perceptual Image Hashing via Matrix Invariants," in Proc. IEEE Int. Conf. Image Processing, Singapore, Vol. 5, pp. 3443-3446, Oct. 2004.
-
(2004)
Proc. IEEE Int. Conf. Image Processing
, vol.5
, pp. 3443-3446
-
-
Kozat, S.S.1
Venkatesan, R.2
Mihçak, M.K.3
-
8
-
-
0141638481
-
Invariant Image Watermark Using Zernike Moments
-
Aug
-
Kim, H.S. and Lee, H. K., "Invariant Image Watermark Using Zernike Moments," IEEE Trans. Circuits Syst. Video Technol., Vol. 13, No. 8, pp. 766-775, Aug. 2003.
-
(2003)
IEEE Trans. Circuits Syst. Video Technol
, vol.13
, Issue.8
, pp. 766-775
-
-
Kim, H.S.1
Lee, H.K.2
-
9
-
-
0035248504
-
A Robust Image Authentication Method Distinguishing JPEG Compression from Malicious Manipulation
-
Lin, C. Y. and Chang, S. F., "A Robust Image Authentication Method Distinguishing JPEG Compression from Malicious Manipulation," IEEE Trans. on Circuits and Systems for Video Technology, Vol.11, No.2, pp. 153-168, 2001.
-
(2001)
IEEE Trans. on Circuits and Systems for Video Technology
, vol.11
, Issue.2
, pp. 153-168
-
-
Lin, C.Y.1
Chang, S.F.2
-
10
-
-
33744760329
-
The Randlet Transform: Applications to Universal Perceptual Hashing and Image Authentication
-
Monticello, IL
-
Malkin, M. and Venkatesan, R., "The Randlet Transform: Applications to Universal Perceptual Hashing and Image Authentication", in Proc. Allerton Conf., Monticello, IL, 2004.
-
(2004)
Proc. Allerton Conf
-
-
Malkin, M.1
Venkatesan, R.2
-
11
-
-
0141850639
-
New Iterative Geometric Methods for Robust Perceptual Image Hashing
-
Philadelphia, PA, Nov
-
Mihçak, M. K. and Venkatesan, R., "New Iterative Geometric Methods for Robust Perceptual Image Hashing," in Proc. ACM Workshop Security and Privacy in Digital Rights Management, Philadelphia, PA, Nov. 2001.
-
(2001)
Proc. ACM Workshop Security and Privacy in Digital Rights Management
-
-
Mihçak, M.K.1
Venkatesan, R.2
-
12
-
-
0035163017
-
On the Security of the SARI Image Authentication System
-
Radhakrishnan, R. and Memon, N., "On the Security of the SARI Image Authentication System," in Proc. IEEE Int. Conf. on Image Proc., Vol. 3, pp 971-974, 2001.
-
(2001)
Proc. IEEE Int. Conf. on Image Proc
, vol.3
, pp. 971-974
-
-
Radhakrishnan, R.1
Memon, N.2
-
13
-
-
20144382789
-
On the Security of the Visual Hash Function
-
Radhakrishnan, R., Xiong, Z. and Memon, N., "On the Security of the Visual Hash Function," Journal of Electronic Imaging, Vol. 14, No. 1, pp. 1-10, 2005.
-
(2005)
Journal of Electronic Imaging
, vol.14
, Issue.1
, pp. 1-10
-
-
Radhakrishnan, R.1
Xiong, Z.2
Memon, N.3
-
14
-
-
0036627368
-
A Survey of Watermarking Algorithms for Image Authentication
-
Rey, C. and Dugelay, J. L., "A Survey of Watermarking Algorithms for Image Authentication," EURASIP Journal on Applied Signal Processing, Vol. 6, No. 3, pp 613-621, 2002.
-
(2002)
EURASIP Journal on Applied Signal Processing
, vol.6
, Issue.3
, pp. 613-621
-
-
Rey, C.1
Dugelay, J.L.2
-
15
-
-
0030409375
-
A Robust Content Based Digital Signature for Image Authentication
-
Lausanne, Switzerland, Sep
-
Schneider, M. and Chang, S. F., "A Robust Content Based Digital Signature for Image Authentication," in Proc. IEEE Int. Conf. Image Processing, Lausanne, Switzerland, Vol. 3, pp. 227-230, Sep. 1996.
-
(1996)
Proc. IEEE Int. Conf. Image Processing
, vol.3
, pp. 227-230
-
-
Schneider, M.1
Chang, S.F.2
-
16
-
-
0141527387
-
Robust Image Watermarking Based on Generalized Radon Transformations
-
Simitopoulos, D., Koutsonanos, D. E. and Strintzis, M.G., "Robust Image Watermarking Based on Generalized Radon Transformations," IEEE Trans. on Circuits and Systems for Video Technology , Vol. 13, No. 8, pp 732-745 , 2003.
-
(2003)
IEEE Trans. on Circuits and Systems for Video Technology
, vol.13
, Issue.8
, pp. 732-745
-
-
Simitopoulos, D.1
Koutsonanos, D.E.2
Strintzis, M.G.3
-
17
-
-
33744764278
-
Robust and Secure Image Hashing
-
June
-
Swaminathan, A., Mao, Y. and Wu, M., "Robust and Secure Image Hashing," IEEE Transactions on Information Forensics and Security, Vol. 1, No. 2, pp. 215-230, June 2006.
-
(2006)
IEEE Transactions on Information Forensics and Security
, vol.1
, Issue.2
, pp. 215-230
-
-
Swaminathan, A.1
Mao, Y.2
Wu, M.3
-
18
-
-
0034444578
-
Robust Image Hashing
-
Sept
-
Venkatesan, R., Koon, S. M., Jakubowski, M. H. and Moulin, P., "Robust Image Hashing," Proc. IEEE Conf. on Image Processing, pp. 664-666, Sept. 2000.
-
(2000)
Proc. IEEE Conf. on Image Processing
, pp. 664-666
-
-
Venkatesan, R.1
Koon, S.M.2
Jakubowski, M.H.3
Moulin, P.4
-
19
-
-
0032312612
-
A Public Key Watermark for Image Verification and Authentication
-
Wong, P. W., "A Public Key Watermark for Image Verification and Authentication," in Proc. IEEE ICIP, pp. 425-429, 1998.
-
(1998)
Proc. IEEE ICIP
, pp. 425-429
-
-
Wong, P.W.1
-
20
-
-
11244341366
-
Efficient Oracle Attacks on Yeng-Mintzer and Variant Authentication Schemes
-
Taiwan
-
Wu J., Zhu B., Li S., and Lin F., "Efficient Oracle Attacks on Yeng-Mintzer and Variant Authentication Schemes," in Proc. of the IEEE International Conference on Multimedia & Expo ( ICME'04), Taiwan , 2004
-
(2004)
Proc. of the IEEE International Conference on Multimedia & Expo ( ICME'04)
-
-
Wu, J.1
Zhu, B.2
Li, S.3
Lin, F.4
-
21
-
-
24944469705
-
On the Security of an SVD-Based Ownership Watermarking
-
Wu, Y., "On the Security of an SVD-Based Ownership Watermarking," IEEE Trans. on Multimedia, Vol. 7, No. 4, pp624-627, 2005.
-
(2005)
IEEE Trans. on Multimedia
, vol.7
, Issue.4
, pp. 624-627
-
-
Wu, Y.1
|