-
1
-
-
0034444578
-
Robust Image Hashing
-
Sept
-
R. Venkatesan, S. M. Koon, M. H. Jakubowski and P. Moulin, "Robust Image Hashing," Proceedings IEEE International Conference on Image Processing (ICIP), Vol. 3, pp. 664-666, Sept. 2000.
-
(2000)
Proceedings IEEE International Conference on Image Processing (ICIP)
, vol.3
, pp. 664-666
-
-
Venkatesan, R.1
Koon, S.M.2
Jakubowski, M.H.3
Moulin, P.4
-
2
-
-
0035248504
-
A Robust Image Authentication Method Distinguishing JPEG Compression from Malicious Manipulation
-
Feb
-
C-Y. Lin and S-F. Chang, "A Robust Image Authentication Method Distinguishing JPEG Compression from Malicious Manipulation," IEEE Trans. on Circuits and Systems of Video Technology, Vol. 11, No. 2, pp. 153-168, Feb. 2001.
-
(2001)
IEEE Trans. on Circuits and Systems of Video Technology
, vol.11
, Issue.2
, pp. 153-168
-
-
Lin, C.-Y.1
Chang, S.-F.2
-
3
-
-
84944325291
-
An Extendible Hash for Multi-precision Similarity Querying of Image Databases
-
Roma, Italy
-
S. Lin, M. T. Ozsu, V. Oria and R. Ng, "An Extendible Hash for Multi-precision Similarity Querying of Image Databases," in Proceedings of 27th VLDB Conference, Roma, Italy, 2001.
-
(2001)
Proceedings of 27th VLDB Conference
-
-
Lin, S.1
Ozsu, M.T.2
Oria, V.3
Ng, R.4
-
5
-
-
47849114125
-
Capturing Online Video Pirates - Can video fingerprinting and watermarking technology stop copyright violators?
-
Aug
-
W. Roush: "Capturing Online Video Pirates - Can video fingerprinting and watermarking technology stop copyright violators?" MIT Technology Review, Aug. 2006.
-
(2006)
MIT Technology Review
-
-
Roush, W.1
-
7
-
-
13144275283
-
Statistical Invisibility for Collusion-resistant Digital Video Watermarking
-
Feb
-
K. Su, D. Kundur and D. Hatzinakos, "Statistical Invisibility for Collusion-resistant Digital Video Watermarking," IEEE Trans. on Multimedia, Vol. 7, No. 1, pp. 43-51, Feb. 2005.
-
(2005)
IEEE Trans. on Multimedia
, vol.7
, Issue.1
, pp. 43-51
-
-
Su, K.1
Kundur, D.2
Hatzinakos, D.3
-
9
-
-
0030409375
-
A Robust Content Based Digital Signature for Image Authentication
-
Sept
-
M. Schneider and S-F. Chang, "A Robust Content Based Digital Signature for Image Authentication," Proc. IEEE Int'l Conf. on Image Proc. (ICIP), Vol. 3, pp. 227-230, Sept. 1996.
-
(1996)
Proc. IEEE Int'l Conf. on Image Proc. (ICIP)
, vol.3
, pp. 227-230
-
-
Schneider, M.1
Chang, S.-F.2
-
10
-
-
85007375266
-
Towards Robust, Content Based Techniques for Image Authentication
-
Dec
-
M. P. Queluz, "Towards Robust, Content Based Techniques for Image Authentication," IEEE Workshop on Multimedia Signal Proc. (MMSP), pp. 297-302, Dec. 1998.
-
(1998)
IEEE Workshop on Multimedia Signal Proc. (MMSP)
, pp. 297-302
-
-
Queluz, M.P.1
-
12
-
-
33744764278
-
Robust and Secure Image hashing
-
June
-
A. Swaminathan, Y. Mao and M.Wu, "Robust and Secure Image hashing," IEEE Trans. on Information Forensics and Security, vol. 1, no. 2, pp 215-230, June 2006.
-
(2006)
IEEE Trans. on Information Forensics and Security
, vol.1
, Issue.2
, pp. 215-230
-
-
Swaminathan, A.1
Mao, Y.2
Wu, M.3
-
13
-
-
0035362493
-
Approximate Image Message Authentication Codes
-
June
-
L. Xie, G. R. Arce and R. F. Graveman, "Approximate Image Message Authentication Codes," IEEE Trans. on Multimedia, Vol. 3, No. 2, pp. 242-252, June 2001.
-
(2001)
IEEE Trans. on Multimedia
, vol.3
, Issue.2
, pp. 242-252
-
-
Xie, L.1
Arce, G.R.2
Graveman, R.F.3
-
14
-
-
33645004781
-
A Clustering Based Approach to Perceptual Image Hashing
-
Mar
-
V. Monga, A. Banerjee and B. L. Evans, "A Clustering Based Approach to Perceptual Image Hashing," IEEE Tran. on Information Forensics and Security, vol. 1, no. 1, pp. 68-79, Mar. 2006.
-
(2006)
IEEE Tran. on Information Forensics and Security
, vol.1
, Issue.1
, pp. 68-79
-
-
Monga, V.1
Banerjee, A.2
Evans, B.L.3
-
20
-
-
84890522850
-
Communication Theory of Secrecy Systems
-
C. E. Shannon, "Communication Theory of Secrecy Systems," Bell System Technical Journal, Vol. 28-4, pp. 656-715, 1949.
-
(1949)
Bell System Technical Journal
, vol.28 -4
, pp. 656-715
-
-
Shannon, C.E.1
|