-
1
-
-
0742288850
-
A watermarking scheme based on principal component analysis technique
-
C. C. Chang and C. S. Chan, "A watermarking scheme based on principal component analysis technique," Informatica, vol. 14, no. 4, pp. 431-444, 2003.
-
(2003)
Informatica
, vol.14
, Issue.4
, pp. 431-444
-
-
Chang, C.C.1
Chan, C.S.2
-
2
-
-
0036611838
-
Hierarchical water-marking for secure image authentication with localization
-
M. U. Celik, G. Sharmar, and A. M. Tekalp, "Hierarchical water-marking for secure image authentication with localization," IEEE Trans. Image Process., vol. 11, no. 6, pp. 585-594, 2002.
-
(2002)
IEEE Trans. Image Process
, vol.11
, Issue.6
, pp. 585-594
-
-
Celik, M.U.1
Sharmar, G.2
Tekalp, A.M.3
-
3
-
-
0021412027
-
Vector quantization
-
R. M. Gray, "Vector quantization," IEEE ASSP Mag., vol. 1, no. 1, pp. 4-29, 1984.
-
(1984)
IEEE ASSP Mag
, vol.1
, Issue.1
, pp. 4-29
-
-
Gray, R.M.1
-
4
-
-
0000335798
-
Digital watermarking of images using neural networks
-
M. S. Hwang, C. C. Chang, and K. F. Hwang, "Digital watermarking of images using neural networks," J. Electron. Imaging, vol. 9, no. 4, pp. 548-555, 2000.
-
(2000)
J. Electron. Imaging
, vol.9
, Issue.4
, pp. 548-555
-
-
Hwang, M.S.1
Chang, C.C.2
Hwang, K.F.3
-
5
-
-
0036616689
-
A digital image watermarking scheme on vector quantisation
-
June
-
M. Jo and H. Kim, "A digital image watermarking scheme on vector quantisation," IEICE Trans. Inf. & Syst., vol. E85-D, no. 6, pp. 1054-1056, June 2002.
-
(2002)
IEICE Trans. Inf. & Syst
, vol.E85-D
, Issue.6
, pp. 1054-1056
-
-
Jo, M.1
Kim, H.2
-
6
-
-
23844453141
-
Watermarking text document images using edge direction histograms
-
Y. W. Kim and I. S. Oh, "Watermarking text document images using edge direction histograms," Pattern Recognit. Lett., vol. 25, no. 11, pp. 1243-1251, 2004.
-
(2004)
Pattern Recognit. Lett
, vol.25
, Issue.11
, pp. 1243-1251
-
-
Kim, Y.W.1
Oh, I.S.2
-
7
-
-
0018918171
-
An algorithm for vector quantizer design
-
Y. Linde, A. Buzo, and R. M. Gray, "An algorithm for vector quantizer design," IEEE Trans. Commun., vol. 28, no. 1, pp. 84-95, 1980.
-
(1980)
IEEE Trans. Commun
, vol.28
, Issue.1
, pp. 84-95
-
-
Linde, Y.1
Buzo, A.2
Gray, R.M.3
-
8
-
-
0035248504
-
A robust image authentication method distinguishing JPEG compression from malicious manipulation
-
C. Y. Lin and S. F. Chang, "A robust image authentication method distinguishing JPEG compression from malicious manipulation," IEEE Trans. Circuits Syst. Video Technol., vol. 11, no. 2, pp. 153-168, 2001.
-
(2001)
IEEE Trans. Circuits Syst. Video Technol
, vol.11
, Issue.2
, pp. 153-168
-
-
Lin, C.Y.1
Chang, S.F.2
-
9
-
-
25144448272
-
A hierarchical digital water-marking method for image tamper detection and recovery
-
P. L. Lin, C. K. Hsieh, and P. W. Huang, "A hierarchical digital water-marking method for image tamper detection and recovery," Pattern Recognit., vol. 38, no. 11, pp. 2519-2529, 2005.
-
(2005)
Pattern Recognit
, vol.38
, Issue.11
, pp. 2519-2529
-
-
Lin, P.L.1
Hsieh, C.K.2
Huang, P.W.3
-
10
-
-
0034140535
-
Fault resilient and compression tolerant digital signature for image authentication
-
D. C. Lou and J. L. Liu, "Fault resilient and compression tolerant digital signature for image authentication," IEEE Trans. Consum. Electron., vol. 46, no. 1, pp. 31-39, 2000.
-
(2000)
IEEE Trans. Consum. Electron
, vol.46
, Issue.1
, pp. 31-39
-
-
Lou, D.C.1
Liu, J.L.2
-
11
-
-
0037818310
-
Structural digital signature for image authentication: An incidental distortion resistant scheme
-
C. S. Lu and H. Y. Liao, "Structural digital signature for image authentication: An incidental distortion resistant scheme," IEEE Trans. Multimed., vol. 5, no. 2, pp. 161-173, 2003.
-
(2003)
IEEE Trans. Multimed
, vol.5
, Issue.2
, pp. 161-173
-
-
Lu, C.S.1
Liao, H.Y.2
-
12
-
-
33750303836
-
An efficient image authentication method based on hamming code
-
C. S. Chan and C. C. Chang, "An efficient image authentication method based on hamming code," Pattern Recognit., vol. 40, no. 2, pp. 681-690, 2006.
-
(2006)
Pattern Recognit
, vol.40
, Issue.2
, pp. 681-690
-
-
Chan, C.S.1
Chang, C.C.2
-
13
-
-
0036556071
-
Combinational image watermarking in the spatial and frequency domains
-
F. Y. Shih and S. Y. T. Wu, "Combinational image watermarking in the spatial and frequency domains," Pattern Recognit., vol. 36, no. 4, pp. 969-975, 2003.
-
(2003)
Pattern Recognit
, vol.36
, Issue.4
, pp. 969-975
-
-
Shih, F.Y.1
Wu, S.Y.T.2
-
14
-
-
0142029533
-
Using set partitioning in hierarchical trees to authenticate digital image
-
P. Y. Tsai, Y. C. Hu, and C. C. Chang, "Using set partitioning in hierarchical trees to authenticate digital image," Signal Process., Image Commun., vol. 18, no. 9, pp. 813-822, 2003.
-
(2003)
Signal Process., Image Commun
, vol.18
, Issue.9
, pp. 813-822
-
-
Tsai, P.Y.1
Hu, Y.C.2
Chang, C.C.3
-
15
-
-
0345356532
-
A color image watermarking scheme based on color quantization
-
P. Y. Tsai, Y. C. Hu, and C. C. Chang, "A color image watermarking scheme based on color quantization," Signal Process., vol. 84, no. 4, pp. 95-106, 2004.
-
(2004)
Signal Process
, vol.84
, Issue.4
, pp. 95-106
-
-
Tsai, P.Y.1
Hu, Y.C.2
Chang, C.C.3
-
16
-
-
0035473831
-
Secret and public key image water-marking schemes for image authentication and ownership verification
-
P. W. Wong and N. Memon, "Secret and public key image water-marking schemes for image authentication and ownership verification," IEEE Trans. Image Process., vol. 10, no. 10, pp. 1593-1601, 2001.
-
(2001)
IEEE Trans. Image Process
, vol.10
, Issue.10
, pp. 1593-1601
-
-
Wong, P.W.1
Memon, N.2
-
17
-
-
12344332735
-
An adjusted-purpose digital watermarking technique
-
Y. T. Wu and Y. F. Shih, "An adjusted-purpose digital watermarking technique," Pattern Recognit., vol. 37, no. 12, pp. 2349-2359, 2004.
-
(2004)
Pattern Recognit
, vol.37
, Issue.12
, pp. 2349-2359
-
-
Wu, Y.T.1
Shih, Y.F.2
-
18
-
-
3042638288
-
A combined approach to integrity protection and verification of palette images using fragile water-marks and digital signatures
-
June
-
C. H. Tzeng and W. H. Tsai, "A combined approach to integrity protection and verification of palette images using fragile water-marks and digital signatures," IEICE Trans. Fundamentals, vol. E87-A, no. 6, pp. 1612-1619, June 2004.
-
(2004)
IEICE Trans. Fundamentals
, vol.E87-A
, Issue.6
, pp. 1612-1619
-
-
Tzeng, C.H.1
Tsai, W.H.2
|