-
1
-
-
0035473831
-
Secret and public key image watermarking schemes for image authentication and ownership verification
-
P. W. Wong and N. Memon, Secret and public key image watermarking schemes for image authentication and ownership verification, IEEE Trans. Image Process. 10 (2001) 1593-1601.
-
(2001)
IEEE Trans. Image Process
, vol.10
, pp. 1593-1601
-
-
Wong, P.W.1
Memon, N.2
-
2
-
-
32644434350
-
A watermarking-based image ownership and tampering authentication scheme
-
C.-C. Chang, Y.-S. Hu and T.-C. Lu, A watermarking-based image ownership and tampering authentication scheme, Pattern Recogn. Lett. 27 (2006) 439-446.
-
(2006)
Pattern Recogn. Lett
, vol.27
, pp. 439-446
-
-
Chang, C.-C.1
Hu, Y.-S.2
Lu, T.-C.3
-
3
-
-
48349088625
-
-
Y. Ueno and K. Murakami, A robust digital watermarking system by specifying the embedded position using wavelet transform, Int. J. Wavelets Multiresolut. Inf. Process. 2 (2004) 173-180.
-
Y. Ueno and K. Murakami, A robust digital watermarking system by specifying the embedded position using wavelet transform, Int. J. Wavelets Multiresolut. Inf. Process. 2 (2004) 173-180.
-
-
-
-
4
-
-
33846314767
-
-
R. Ni, Q. Ruan and J. Lu, Adaptive watermarking and performance analysis based on image content, Int. J. Wavelets Multiresolut. Inf. Process. 5 (2007) 173-185.
-
R. Ni, Q. Ruan and J. Lu, Adaptive watermarking and performance analysis based on image content, Int. J. Wavelets Multiresolut. Inf. Process. 5 (2007) 173-185.
-
-
-
-
5
-
-
33748030108
-
Approaching optimal value expansion for reversible watermarking
-
New York, USA
-
B. Yang, M. Schmucker, C. Busch et al., Approaching optimal value expansion for reversible watermarking, in Proc. 7th Workshop on Multimedia and Security, New York, USA (2005), pp. 95-102.
-
(2005)
Proc. 7th Workshop on Multimedia and Security
, pp. 95-102
-
-
Yang, B.1
Schmucker, M.2
Busch, C.3
-
6
-
-
33845467262
-
Reversible watermarking: Current status and key issues
-
J.-B. Feng, I.-C. Lin, C.-S. Tsai et al., Reversible watermarking: Current status and key issues, Int. J. Network Security 12 (2006) 161-171.
-
(2006)
Int. J. Network Security
, vol.12
, pp. 161-171
-
-
Feng, J.-B.1
Lin, I.-C.2
Tsai, C.-S.3
-
7
-
-
0003966349
-
Lossless recovery of an original image containing embedded data,
-
US Patent, US6278791
-
C. Honsinger, P. Jones and P. M. Rabbani, Lossless recovery of an original image containing embedded data, US Patent, US6278791 (1999).
-
(1999)
-
-
Honsinger, C.1
Jones, P.2
Rabbani, P.M.3
-
8
-
-
3843102623
-
Reversible watermark using the difference expansion of a generalized integer transform
-
A. M. Alattar, Reversible watermark using the difference expansion of a generalized integer transform, IEEE Trans. Image Process. 13 (2004) 1147-1156.
-
(2004)
IEEE Trans. Image Process
, vol.13
, pp. 1147-1156
-
-
Alattar, A.M.1
-
9
-
-
13344259248
-
Reversible image watermarking by histogram modification for integer dct coefficients
-
Siena, Italy
-
B. Yang, M. Schmucker, X. Niu et al., Reversible image watermarking by histogram modification for integer dct coefficients, in Proc. IEEE 6th Workshop on Multimedia Signal Processing, Siena, Italy (2004), pp. 143-146.
-
(2004)
Proc. IEEE 6th Workshop on Multimedia Signal Processing
, pp. 143-146
-
-
Yang, B.1
Schmucker, M.2
Niu, X.3
-
10
-
-
0036488240
-
Lossless data embedding-new paradigm in digital watermarking
-
J. Fridrich, M. Goljan and R. Du, Lossless data embedding-new paradigm in digital watermarking, EURASIP J. Appl. Signal Process. 2 (2002) 185-196.
-
(2002)
EURASIP J. Appl. Signal Process
, vol.2
, pp. 185-196
-
-
Fridrich, J.1
Goljan, M.2
Du, R.3
-
11
-
-
20444476732
-
Prediction-error based reversible watermarking
-
Singapore
-
D. M. Thodi and J. J. Rodriguez, Prediction-error based reversible watermarking, in Proc. ICIP Int. Conf. Image Processing, Vol. 3, Singapore (2004), pp. 1549-1552.
-
(2004)
Proc. ICIP Int. Conf. Image Processing
, vol.3
, pp. 1549-1552
-
-
Thodi, D.M.1
Rodriguez, J.J.2
-
12
-
-
14744284326
-
A new multi-secret image sharing scheme using Largrange's interpolation
-
J. B. Feng, H. C. Wu, C. S. Tsai and Y. P. Chu, A new multi-secret image sharing scheme using Largrange's interpolation, J. Syst. Software 76 (2005) 327-339.
-
(2005)
J. Syst. Software
, vol.76
, pp. 327-339
-
-
Feng, J.B.1
Wu, H.C.2
Tsai, C.S.3
Chu, Y.P.4
-
13
-
-
1342306864
-
A symmetric image encryption scheme based on 3D chaotic cat maps
-
G. Chen, Y. B. Mao and C. K. Chui, A symmetric image encryption scheme based on 3D chaotic cat maps, Chaos Solitons Fractals 21 (2004) 749-761.
-
(2004)
Chaos Solitons Fractals
, vol.21
, pp. 749-761
-
-
Chen, G.1
Mao, Y.B.2
Chui, C.K.3
-
14
-
-
41849097790
-
Image encryption based on a new total shuffling algorithm
-
T. Gao and Z. Chen, Image encryption based on a new total shuffling algorithm, Chaos Solitons Fractals 38 (2008) 213-220.
-
(2008)
Chaos Solitons Fractals
, vol.38
, pp. 213-220
-
-
Gao, T.1
Chen, Z.2
|