-
1
-
-
33749166906
-
Multiscale fragile watermarking based on the Gaussian mixture model
-
Yuan, H., Zhang, X.-P.: Multiscale fragile watermarking based on the Gaussian mixture model. IEEE Trans. Image process 15(10), 3189-3200 (2006)
-
(2006)
IEEE Trans. Image process
, vol.15
, Issue.10
, pp. 3189-3200
-
-
Yuan, H.1
Zhang, X.-P.2
-
2
-
-
0032312612
-
A public key watermark for image verification and authentication
-
Chicago, IL, pp
-
Wong, P.: A public key watermark for image verification and authentication. In: Proc. IEEE Int. Conf. Image Process., Chicago, IL, pp. 425-429 (1998)
-
(1998)
Proc. IEEE Int. Conf. Image Process
, pp. 425-429
-
-
Wong, P.1
-
3
-
-
0033872149
-
Counterfeiting attacks on oblivious block-wise independent invisible watermarking schemes
-
Holliman, H., Memon, N.: Counterfeiting attacks on oblivious block-wise independent invisible watermarking schemes. IEEE Trans. Image Process 9(3), 432-441 (2000)
-
(2000)
IEEE Trans. Image Process
, vol.9
, Issue.3
, pp. 432-441
-
-
Holliman, H.1
Memon, N.2
-
4
-
-
0036530306
-
Cryptanalysis of the Yeung-Mintzer fragile watermarking technique
-
Fridrich, J., Goljan, M., Memon, N.: Cryptanalysis of the Yeung-Mintzer fragile watermarking technique. J. Electronic Imaging 11, 262-274 (2002)
-
(2002)
J. Electronic Imaging
, vol.11
, pp. 262-274
-
-
Fridrich, J.1
Goljan, M.2
Memon, N.3
-
5
-
-
0035473831
-
Secret and public key image watermarking schemes for image authentication and ownership verification
-
Wong, P., Memon, N.: Secret and public key image watermarking schemes for image authentication and ownership verification. IEEE Trans. Image Process. 10, 1593-1601 (2001)
-
(2001)
IEEE Trans. Image Process
, vol.10
, pp. 1593-1601
-
-
Wong, P.1
Memon, N.2
-
6
-
-
0036030626
-
Security of fragile authentication watermarks with localization
-
San Jose, CA, January
-
Fridrich, J.: Security of fragile authentication watermarks with localization. In: Proc. SPIE. Security and Watermarking of Multimedia Contents, San Jose, CA, vol. 4675, pp. 691-700 (January 2002)
-
(2002)
Proc. SPIE. Security and Watermarking of Multimedia Contents
, vol.4675
, pp. 691-700
-
-
Fridrich, J.1
-
7
-
-
0036611838
-
Hierarchical watermarking for secure image authentication with localization
-
Celik, M., Sharma, G., Saber, E., Tekalp, A.M.: Hierarchical watermarking for secure image authentication with localization. IEEE Trans. Image Process. 11(6), 585-595 (2002)
-
(2002)
IEEE Trans. Image Process
, vol.11
, Issue.6
, pp. 585-595
-
-
Celik, M.1
Sharma, G.2
Saber, E.3
Tekalp, A.M.4
-
8
-
-
0036544390
-
-
Barreto, P., Kim, H., Rijmen, V.: Toward secure public-key block-wise fragile authentication watermarking. IEE Proc. -Vision, Image and Signal Process. 149(2), 57-62 (2002)
-
Barreto, P., Kim, H., Rijmen, V.: Toward secure public-key block-wise fragile authentication watermarking. IEE Proc. -Vision, Image and Signal Process. 149(2), 57-62 (2002)
-
-
-
-
9
-
-
8344236008
-
Fragile image watermarking using a gradient image for improved localization and security
-
Suthaharan, S.: Fragile image watermarking using a gradient image for improved localization and security. Pattern Recognition Letters 25, 1893-1903 (2004)
-
(2004)
Pattern Recognition Letters
, vol.25
, pp. 1893-1903
-
-
Suthaharan, S.1
-
10
-
-
0042823352
-
Secure hybrid robust watermarking resistant against tampering and copy attack
-
Deguillaume, F., Voloshynovskiy, S., Pun, T.: Secure hybrid robust watermarking resistant against tampering and copy attack. Signal Process 83, 2133-2170 (2003)
-
(2003)
Signal Process
, vol.83
, pp. 2133-2170
-
-
Deguillaume, F.1
Voloshynovskiy, S.2
Pun, T.3
-
11
-
-
34548064855
-
Reversible image watermarking based on integer-to-integer wavelet transform
-
Lee, S., Yoo, C.D., Kalker, T.: Reversible image watermarking based on integer-to-integer wavelet transform. IEEE Trans. Inf. forensics security 2(3), 321-330 (2007)
-
(2007)
IEEE Trans. Inf. forensics security
, vol.2
, Issue.3
, pp. 321-330
-
-
Lee, S.1
Yoo, C.D.2
Kalker, T.3
-
12
-
-
25144448272
-
A hierarchical digital watermarking method for image tamper detection and recovery
-
Lin, P.L., Hsieh, C.K., Huang, P.W.: A hierarchical digital watermarking method for image tamper detection and recovery. Pattern Recognition 38(12), 2519-2529 (2005)
-
(2005)
Pattern Recognition
, vol.38
, Issue.12
, pp. 2519-2529
-
-
Lin, P.L.1
Hsieh, C.K.2
Huang, P.W.3
-
13
-
-
34548765996
-
Statistical fragile watermarking capable of locating individual tampered pixels
-
Zhang, X., Wang, S.: Statistical fragile watermarking capable of locating individual tampered pixels. IEEE Signal Process. Lett. 14(10), 727-731 (2007)
-
(2007)
IEEE Signal Process. Lett
, vol.14
, Issue.10
, pp. 727-731
-
-
Zhang, X.1
Wang, S.2
-
14
-
-
56749091354
-
-
He, H.J., Zhang, J.S., Wang, H.X.: Synchronous counterfeiting attacks on self-embedding watermarking schemes. Intern. J. Comput. Sci. Network Security 6(1), 251-257 (2006)
-
He, H.J., Zhang, J.S., Wang, H.X.: Synchronous counterfeiting attacks on self-embedding watermarking schemes. Intern. J. Comput. Sci. Network Security 6(1), 251-257 (2006)
-
-
-
-
15
-
-
0033309988
-
Images with self-correcting capabilities
-
Kobe, Japan, October 25-28
-
Fridrich, J., Goljan, M.: Images with self-correcting capabilities. In: Proc. ICIP 1999, Kobe, Japan, October 25-28 (1999)
-
(1999)
Proc. ICIP
-
-
Fridrich, J.1
Goljan, M.2
-
16
-
-
12344315777
-
Security of an ill-posed operator for image authentication
-
Wu, Y., Deng, R.H.: Security of an ill-posed operator for image authentication. IEEE Trans. Circuits Syst. Video Technol. 15(1), 161-163 (2005)
-
(2005)
IEEE Trans. Circuits Syst. Video Technol
, vol.15
, Issue.1
, pp. 161-163
-
-
Wu, Y.1
Deng, R.H.2
-
17
-
-
33845423997
-
-
He, H., Zhang, J., Tai, H.-M.: A wavelet-based fragile watermarking scheme for secure image authentication. In: Shi, Y.Q., Jeon, B. (eds.) IWDW 2006. LNCS, 4283, pp. 422-432. Springer, Heidelberg (2006)
-
He, H., Zhang, J., Tai, H.-M.: A wavelet-based fragile watermarking scheme for secure image authentication. In: Shi, Y.Q., Jeon, B. (eds.) IWDW 2006. LNCS, vol. 4283, pp. 422-432. Springer, Heidelberg (2006)
-
-
-
|