-
1
-
-
48149099153
-
-
P.S.L.M. Barreto, H.Y. Kim, V. Rijmen, Toward secure public-key blockwise fragile authentication watermarking, in: IEE Proceedings-Vision, Image, and Signal Processing, vol. 27(5), 2006, pp. 439-446.
-
P.S.L.M. Barreto, H.Y. Kim, V. Rijmen, Toward secure public-key blockwise fragile authentication watermarking, in: IEE Proceedings-Vision, Image, and Signal Processing, vol. 27(5), 2006, pp. 439-446.
-
-
-
-
2
-
-
33750969337
-
Joint near-lossless compression and watermarking of still images for authentication and tamper localization
-
Caldelli R., Filippini F., and Barni M. Joint near-lossless compression and watermarking of still images for authentication and tamper localization. Signal Process. Image Commun. 21 10 (2006) 890-903
-
(2006)
Signal Process. Image Commun.
, vol.21
, Issue.10
, pp. 890-903
-
-
Caldelli, R.1
Filippini, F.2
Barni, M.3
-
3
-
-
0036611838
-
Hierarchical watermarking for secure image authentication with localization
-
Celik M.U., Sharma G., Saber E., and Tekalp A.M. Hierarchical watermarking for secure image authentication with localization. IEEE Trans. Image Process. 11 6 (2002) 585-595
-
(2002)
IEEE Trans. Image Process.
, vol.11
, Issue.6
, pp. 585-595
-
-
Celik, M.U.1
Sharma, G.2
Saber, E.3
Tekalp, A.M.4
-
4
-
-
34848926024
-
Four-scanning attack on hierarchical digital watermarking method for image tamper detection and recovery
-
Chang C.-C., Fan Y.-H., and Tai W.-L. Four-scanning attack on hierarchical digital watermarking method for image tamper detection and recovery. Pattern Recognition 41 2 (2008) 654-661
-
(2008)
Pattern Recognition
, vol.41
, Issue.2
, pp. 654-661
-
-
Chang, C.-C.1
Fan, Y.-H.2
Tai, W.-L.3
-
5
-
-
32644434350
-
A watermarking-based image ownership and tampering authentication scheme
-
Chang C.-C., Hu Y.-S., and Lu T.-C. A watermarking-based image ownership and tampering authentication scheme. Pattern Recognition Lett. 27 5 (2006) 439-446
-
(2006)
Pattern Recognition Lett.
, vol.27
, Issue.5
, pp. 439-446
-
-
Chang, C.-C.1
Hu, Y.-S.2
Lu, T.-C.3
-
6
-
-
0036489322
-
A data-hiding technique with authentication, integration, and confidentiality for electronic patient records
-
Chao H.M., Hsu C.M., and Miaou S.G. A data-hiding technique with authentication, integration, and confidentiality for electronic patient records. IEEE Trans. Inf. Technol. Biomed. 6 1 (2002) 46-53
-
(2002)
IEEE Trans. Inf. Technol. Biomed.
, vol.6
, Issue.1
, pp. 46-53
-
-
Chao, H.M.1
Hsu, C.M.2
Miaou, S.G.3
-
7
-
-
10644225222
-
A robust watermarking scheme using phase shift keying with the combination of amplitude boost and low amplitude block selection
-
Chen W.-Y., and Chen C.-H. A robust watermarking scheme using phase shift keying with the combination of amplitude boost and low amplitude block selection. Pattern Recognition 38 4 (2005) 587-598
-
(2005)
Pattern Recognition
, vol.38
, Issue.4
, pp. 587-598
-
-
Chen, W.-Y.1
Chen, C.-H.2
-
8
-
-
0032074580
-
Resolving rightful ownership with invisible watermarking techniques: limitations, attacks, and implications
-
Craver S., Memon N., Yeo B.-L., and Yeung M.M. Resolving rightful ownership with invisible watermarking techniques: limitations, attacks, and implications. IEEE J. Sel. Areas Commun. 16 4 (1998) 573-586
-
(1998)
IEEE J. Sel. Areas Commun.
, vol.16
, Issue.4
, pp. 573-586
-
-
Craver, S.1
Memon, N.2
Yeo, B.-L.3
Yeung, M.M.4
-
9
-
-
34250863233
-
Speaker identification security improvement by means of speech watermarking
-
Faundez-Zanuy M., Hagmuller M., and Kubin G. Speaker identification security improvement by means of speech watermarking. Pattern Recognition 40 11 (2007) 3027-3034
-
(2007)
Pattern Recognition
, vol.40
, Issue.11
, pp. 3027-3034
-
-
Faundez-Zanuy, M.1
Hagmuller, M.2
Kubin, G.3
-
10
-
-
25144524731
-
Quickly tracing detection for spread spectrum watermark based on effect estimation of the affine transform
-
Feng G.-R., Jiang L.-G., Wang D.-J., and He C. Quickly tracing detection for spread spectrum watermark based on effect estimation of the affine transform. Pattern Recognition 38 12 (2005) 2530-2536
-
(2005)
Pattern Recognition
, vol.38
, Issue.12
, pp. 2530-2536
-
-
Feng, G.-R.1
Jiang, L.-G.2
Wang, D.-J.3
He, C.4
-
11
-
-
33845427446
-
A novel image watermarking scheme based on amplitude attack
-
Hsieh C.-H., and Liao C.-J. A novel image watermarking scheme based on amplitude attack. Pattern Recognition 40 4 (2007) 1342-1354
-
(2007)
Pattern Recognition
, vol.40
, Issue.4
, pp. 1342-1354
-
-
Hsieh, C.-H.1
Liao, C.-J.2
-
12
-
-
34547699505
-
Fusion of color edge detection and color quantization for color image watermarking using principal axes analysis
-
Kuo C.-T., and Cheng S.-C. Fusion of color edge detection and color quantization for color image watermarking using principal axes analysis. Pattern Recognition 40 12 (2007) 3691-3704
-
(2007)
Pattern Recognition
, vol.40
, Issue.12
, pp. 3691-3704
-
-
Kuo, C.-T.1
Cheng, S.-C.2
-
13
-
-
0035372202
-
Lossless image compression and encryption using SCAN
-
Maniccam S.S., and Bourbakis N. Lossless image compression and encryption using SCAN. Pattern Recognition 34 6 (2001) 1229-1245
-
(2001)
Pattern Recognition
, vol.34
, Issue.6
, pp. 1229-1245
-
-
Maniccam, S.S.1
Bourbakis, N.2
-
14
-
-
0348108146
-
Lossless compression and information hiding in images
-
Maniccam S.S., and Bourbakis N. Lossless compression and information hiding in images. Pattern Recognition 37 3 (2004) 475-486
-
(2004)
Pattern Recognition
, vol.37
, Issue.3
, pp. 475-486
-
-
Maniccam, S.S.1
Bourbakis, N.2
-
15
-
-
10044224284
-
Secure semi-blind watermarking based on iteration mapping and image features
-
Ni R., Ruan Q., and Cheng H.D. Secure semi-blind watermarking based on iteration mapping and image features. Pattern Recognition 38 3 (2005) 357-368
-
(2005)
Pattern Recognition
, vol.38
, Issue.3
, pp. 357-368
-
-
Ni, R.1
Ruan, Q.2
Cheng, H.D.3
-
16
-
-
2442530553
-
Localized image watermarking based on feature points of scale-space representation
-
Seo J.S., Chang C.D., and Yoo D. Localized image watermarking based on feature points of scale-space representation. Pattern Recognition 37 7 (2004) 1365-1375
-
(2004)
Pattern Recognition
, vol.37
, Issue.7
, pp. 1365-1375
-
-
Seo, J.S.1
Chang, C.D.2
Yoo, D.3
-
17
-
-
33845397101
-
A robust associative watermarking technique based on similarity diagrams
-
Shen J.-J., and Hsu P.-W. A robust associative watermarking technique based on similarity diagrams. Pattern Recognition 40 4 (2007) 1355-1367
-
(2007)
Pattern Recognition
, vol.40
, Issue.4
, pp. 1355-1367
-
-
Shen, J.-J.1
Hsu, P.-W.2
-
18
-
-
34848924292
-
Automatic image authentication and recovery using fractal code embedding and image inpainting
-
Wang S.-S., and Tsai S.-L. Automatic image authentication and recovery using fractal code embedding and image inpainting. Pattern Recognition 41 2 (2008) 701-712
-
(2008)
Pattern Recognition
, vol.41
, Issue.2
, pp. 701-712
-
-
Wang, S.-S.1
Tsai, S.-L.2
-
19
-
-
12344332735
-
An adjusted-purpose digital watermarking technique
-
Wu Y.-T., and Shih F.Y. An adjusted-purpose digital watermarking technique. Pattern Recognition 37 12 (2004) 2349-2359
-
(2004)
Pattern Recognition
, vol.37
, Issue.12
, pp. 2349-2359
-
-
Wu, Y.-T.1
Shih, F.Y.2
-
20
-
-
34547662251
-
Digital watermarking based on chaotic map and reference register
-
Wu Y.-T., and Shih F.Y. Digital watermarking based on chaotic map and reference register. Pattern Recognition 40 12 (2007) 3753-3763
-
(2007)
Pattern Recognition
, vol.40
, Issue.12
, pp. 3753-3763
-
-
Wu, Y.-T.1
Shih, F.Y.2
-
21
-
-
34547663506
-
Circularly orthogonal moments for geometrically robust image watermarking
-
Xin Y., Liao S., and Pawlak M. Circularly orthogonal moments for geometrically robust image watermarking. Pattern Recognition 40 12 (2007) 3740-3752
-
(2007)
Pattern Recognition
, vol.40
, Issue.12
, pp. 3740-3752
-
-
Xin, Y.1
Liao, S.2
Pawlak, M.3
-
22
-
-
33244461499
-
Multiresolution fragile watermarking using complex chirp signals for content authentication
-
Yu D., Sattar F., and Barkat B. Multiresolution fragile watermarking using complex chirp signals for content authentication. Pattern Recognition 39 5 (2006) 935-952
-
(2006)
Pattern Recognition
, vol.39
, Issue.5
, pp. 935-952
-
-
Yu, D.1
Sattar, F.2
Barkat, B.3
-
23
-
-
18544365818
-
PCA-based watermarking scheme for tamper-proof of web pages
-
Zhao Q., and Lu H. PCA-based watermarking scheme for tamper-proof of web pages. Pattern Recognition 38 8 (2005) 1321-1323
-
(2005)
Pattern Recognition
, vol.38
, Issue.8
, pp. 1321-1323
-
-
Zhao, Q.1
Lu, H.2
-
24
-
-
33845400381
-
PCA-based web page watermarking
-
Zhao Q., and Lu H. PCA-based web page watermarking. Pattern Recognition 40 4 (2007) 1334-1341
-
(2007)
Pattern Recognition
, vol.40
, Issue.4
, pp. 1334-1341
-
-
Zhao, Q.1
Lu, H.2
-
25
-
-
34249908633
-
A new semi-fragile image watermarking with robust tampering restoration using irregular sampling
-
Zhu X., Ho A.T.S., and Marziliano P. A new semi-fragile image watermarking with robust tampering restoration using irregular sampling. Signal Process. Image Commun. 22 5 (2007) 515-528
-
(2007)
Signal Process. Image Commun.
, vol.22
, Issue.5
, pp. 515-528
-
-
Zhu, X.1
Ho, A.T.S.2
Marziliano, P.3
|