-
2
-
-
0032308292
-
-
Bhattacharjee, S., & Kutter, M. (1998). Compression tolerant image authentication. In Proceedings of IEEE international conference on image processing (pp. 435-439).
-
Bhattacharjee, S., & Kutter, M. (1998). Compression tolerant image authentication. In Proceedings of IEEE international conference on image processing (pp. 435-439).
-
-
-
-
3
-
-
0036611838
-
Hierarchical watermarking for secure image authentication with localization
-
Celik M.U., Sharma G., Saber E., and Tekalp A.M. Hierarchical watermarking for secure image authentication with localization. IEEE Transactions on Image Processing 11 6 (2000) 585-595
-
(2000)
IEEE Transactions on Image Processing
, vol.11
, Issue.6
, pp. 585-595
-
-
Celik, M.U.1
Sharma, G.2
Saber, E.3
Tekalp, A.M.4
-
4
-
-
32644434350
-
A watermarking-based image ownership and tampering authentication scheme
-
Chang C.C., Hu Y.S., and Lu T.C. A watermarking-based image ownership and tampering authentication scheme. Pattern Recognition Letters 27 5 (2006) 439-446
-
(2006)
Pattern Recognition Letters
, vol.27
, Issue.5
, pp. 439-446
-
-
Chang, C.C.1
Hu, Y.S.2
Lu, T.C.3
-
5
-
-
85143190515
-
-
Eggers, J. J., & Girod, B. (2001). Blind watermarking applied to image authentication. In Proceedings of IEEE international conference on acoustics, speech and signal processing (pp. 1977-1980).
-
Eggers, J. J., & Girod, B. (2001). Blind watermarking applied to image authentication. In Proceedings of IEEE international conference on acoustics, speech and signal processing (pp. 1977-1980).
-
-
-
-
6
-
-
0034443602
-
-
Fridrich, J., Goljan, M., & Baldoza, A. C. (2000). New fragile authentication watermark for images. In Proceedings of IEEE international conference on image processing (pp. 446-449).
-
Fridrich, J., Goljan, M., & Baldoza, A. C. (2000). New fragile authentication watermark for images. In Proceedings of IEEE international conference on image processing (pp. 446-449).
-
-
-
-
7
-
-
0033872149
-
Counterfeiting attacks on oblivious block-wise independent invisible watermarking schemes
-
Holliman M., and Memon N. Counterfeiting attacks on oblivious block-wise independent invisible watermarking schemes. IEEE Transactions on Image Processing 9 3 (2000) 432-441
-
(2000)
IEEE Transactions on Image Processing
, vol.9
, Issue.3
, pp. 432-441
-
-
Holliman, M.1
Memon, N.2
-
8
-
-
0032648596
-
-
Kundur, D., & Hatzinakos, D. (1999) Digital watermarking for telltale tamper proofing and authentication. In Proceedings of the IEEE special issue on identification and protection of multimedia information (pp. 1167-1180).
-
Kundur, D., & Hatzinakos, D. (1999) Digital watermarking for telltale tamper proofing and authentication. In Proceedings of the IEEE special issue on identification and protection of multimedia information (pp. 1167-1180).
-
-
-
-
9
-
-
33947277938
-
Digital watermarking scheme exploiting nondeterministic dependence for image authentication
-
Li C.-T., and Yuan Y. Digital watermarking scheme exploiting nondeterministic dependence for image authentication. Optical Engineering 45 12 (2006) 127001
-
(2006)
Optical Engineering
, vol.45
, Issue.12
, pp. 127001
-
-
Li, C.-T.1
Yuan, Y.2
-
10
-
-
0033688392
-
-
Lin, C. Y., & Chang, S. F. (2000). Semi-fragile watermarking for authenticating JPEG visual content. In Proceedings of SPIE conference on security and watermarking of multimedia contents II (pp. 140-151).
-
Lin, C. Y., & Chang, S. F. (2000). Semi-fragile watermarking for authenticating JPEG visual content. In Proceedings of SPIE conference on security and watermarking of multimedia contents II (pp. 140-151).
-
-
-
-
11
-
-
56349163138
-
-
Lin, E. T., & Delp, E. J. (1999). A review of fragile image watermarks. In Proceedings of the ACM multimedia and security workshop (pp. 25-29).
-
Lin, E. T., & Delp, E. J. (1999). A review of fragile image watermarks. In Proceedings of the ACM multimedia and security workshop (pp. 25-29).
-
-
-
-
12
-
-
0033717154
-
-
Lin, E. T., Podilchuk, C. I., & Delp, E. J. (2000). Detection of image alterations using semi-fragile watermarks. In Proceedings of SPIE conference on security and watermarking of multimedia contents II (pp. 152-163).
-
Lin, E. T., Podilchuk, C. I., & Delp, E. J. (2000). Detection of image alterations using semi-fragile watermarks. In Proceedings of SPIE conference on security and watermarking of multimedia contents II (pp. 152-163).
-
-
-
-
13
-
-
25144448272
-
A hierarchical digital watermarking method for image tamper detection and recovery
-
Lin P.-L., Hsieh C.-K., and Huang P.-W. A hierarchical digital watermarking method for image tamper detection and recovery. Pattern Recognition 38 12 (2005) 2519-2529
-
(2005)
Pattern Recognition
, vol.38
, Issue.12
, pp. 2519-2529
-
-
Lin, P.-L.1
Hsieh, C.-K.2
Huang, P.-W.3
-
14
-
-
0035473830
-
Multipurpose watermarking for image authentication and protection
-
Lu C.-S., and Liao H.-Y. Multipurpose watermarking for image authentication and protection. IEEE Transactions on Image Processing 10 10 (2001) 1579-1592
-
(2001)
IEEE Transactions on Image Processing
, vol.10
, Issue.10
, pp. 1579-1592
-
-
Lu, C.-S.1
Liao, H.-Y.2
-
15
-
-
0036522407
-
FVC2000: Fingerprint verification competition
-
Maio D., Maltoni D., Cappelli R., Wayman J.L., and Jain A.K. FVC2000: Fingerprint verification competition. IEEE Transactions on Pattern Analysis and Machine Intelligence 24 3 (2002) 402-412
-
(2002)
IEEE Transactions on Pattern Analysis and Machine Intelligence
, vol.24
, Issue.3
, pp. 402-412
-
-
Maio, D.1
Maltoni, D.2
Cappelli, R.3
Wayman, J.L.4
Jain, A.K.5
-
16
-
-
84944878354
-
-
CRC, Boca Raton, FL
-
Menezes A., Oorschot P.v., and Vanstone S. Handbook of applied cryptography (1997), CRC, Boca Raton, FL
-
(1997)
Handbook of applied cryptography
-
-
Menezes, A.1
Oorschot, P.v.2
Vanstone, S.3
-
19
-
-
8344236008
-
Fragile image watermarking using a gradient image for improved localization and security
-
Suthaharan S. Fragile image watermarking using a gradient image for improved localization and security. Pattern Recognition Letters 25 16 (2004) 1893-1903
-
(2004)
Pattern Recognition Letters
, vol.25
, Issue.16
, pp. 1893-1903
-
-
Suthaharan, S.1
-
20
-
-
0032312612
-
-
Wong, P. W. (1998). A public key watermark for image verification and authentication. In Proceedings of IEEE international conference on image processing (pp. 455-459).
-
Wong, P. W. (1998). A public key watermark for image verification and authentication. In Proceedings of IEEE international conference on image processing (pp. 455-459).
-
-
-
-
21
-
-
0035473831
-
Secret and public key image watermarking schemes for image authentication and ownership verification
-
Wong P.W., and Memon N. Secret and public key image watermarking schemes for image authentication and ownership verification. IEEE Transactions on Image Processing 10 10 (2001) 1593-1601
-
(2001)
IEEE Transactions on Image Processing
, vol.10
, Issue.10
, pp. 1593-1601
-
-
Wong, P.W.1
Memon, N.2
-
22
-
-
0032292342
-
-
Wu, M., & Liu, B. (1998). Watermarking for image authentication. In Proceedings of IEEE international conference on image processing (pp. 437-441).
-
Wu, M., & Liu, B. (1998). Watermarking for image authentication. In Proceedings of IEEE international conference on image processing (pp. 437-441).
-
-
-
-
23
-
-
0031378592
-
-
Yeung, M., & Mintzer, F. (1997). An invisible watermarking technique for image verification. In Proceedings of IEEE international conference on image processing (pp. 680-683).
-
Yeung, M., & Mintzer, F. (1997). An invisible watermarking technique for image verification. In Proceedings of IEEE international conference on image processing (pp. 680-683).
-
-
-
|