-
1
-
-
0036611838
-
Hierarchical Watermarking for Secure Image Authentication with Localization
-
June
-
Celik, M. U., Sharma, G., Saber, E., Tekalp, A. M.: Hierarchical Watermarking for Secure Image Authentication with Localization, IEEE Transactions on Image Processing, 11(6), June 2002, 585-595.
-
(2002)
IEEE Transactions on Image Processing
, vol.11
, Issue.6
, pp. 585-595
-
-
Celik, M.U.1
Sharma, G.2
Saber, E.3
Tekalp, A.M.4
-
2
-
-
0742288850
-
A Watermarking Scheme Based on Principal Component Analysis Technique
-
December
-
Chang, C.-C, Chan, C.-S.: A Watermarking Scheme Based on Principal Component Analysis Technique, Informaticas, 14(4), December 2003, 431-444.
-
(2003)
Informaticas
, vol.14
, Issue.4
, pp. 431-444
-
-
Chang, C.-C.1
Chan, C.-S.2
-
3
-
-
61449136709
-
A Color Image Authentication Method Using Partitioned Palette and Morphological Operations
-
January
-
Chang, C.-C., Lin, P.-Y.: A Color Image Authentication Method Using Partitioned Palette and Morphological Operations, IEICE Transactions on Information and Systems, E91-D(1), January 2008, 54-61.
-
(2008)
IEICE Transactions on Information and Systems
, vol.E91-D
, Issue.1
, pp. 54-61
-
-
Chang, C.-C.1
Lin, P.-Y.2
-
4
-
-
35349002199
-
Fragile Watermarking Scheme for Digital Image Authentication Using Pixel Difference
-
Chang, C.-C., Lin, P.-Y., Chuang, J.-C.: Fragile Watermarking Scheme for Digital Image Authentication Using Pixel Difference, The Imaging Science Journal, 55(3).
-
The Imaging Science Journal
, vol.55
, Issue.3
-
-
Chang, C.-C.1
Lin, P.-Y.2
Chuang, J.-C.3
-
5
-
-
9144241108
-
Public-Key Inter-Block Dependence Fragile Watermarking for Image Authentication Using Continued Fraction
-
July
-
Chang, C.-C., Wu, W.-C., Hu, Y.-C.: Public-Key Inter-Block Dependence Fragile Watermarking for Image Authentication Using Continued Fraction, Informatica, 28(2), July 2004, 147-152.
-
(2004)
Informatica
, vol.28
, Issue.2
, pp. 147-152
-
-
Chang, C.-C.1
Wu, W.-C.2
Hu, Y.-C.3
-
6
-
-
21844470700
-
Writing on Wet Paper
-
October
-
Fridrich, J., Goljan, M., Lisonek, P., Soukal, D.: Writing on Wet Paper, IEEE Transactions on Signal Processing, 53(10), October 2005, 3923-3935.
-
(2005)
IEEE Transactions on Signal Processing
, vol.53
, Issue.10
, pp. 3923-3935
-
-
Fridrich, J.1
Goljan, M.2
Lisonek, P.3
Soukal, D.4
-
7
-
-
30744445178
-
Perturbed Quantization Steganography
-
December
-
Fridrich, J., Goljan, M., Soukal, D.: Perturbed Quantization Steganography, Multimedia Systems, 11(2), December 2005, 98-107.
-
(2005)
Multimedia Systems
, vol.11
, Issue.2
, pp. 98-107
-
-
Fridrich, J.1
Goljan, M.2
Soukal, D.3
-
8
-
-
33645015900
-
Wet Paper Codes with Improved Embedding Efficiency
-
March
-
Fridrich, J., Goljan, M., Soukal, D.: Wet Paper Codes with Improved Embedding Efficiency, IEEE Transactions on Information Forensics and Security, 1(1), March 2006, 102-110.
-
(2006)
IEEE Transactions on Information Forensics and Security
, vol.1
, Issue.1
, pp. 102-110
-
-
Fridrich, J.1
Goljan, M.2
Soukal, D.3
-
9
-
-
23844453141
-
Watermarking Text Document Images Using Edge Direction Histograms
-
August
-
Kim, Y. W., Oh, I. S.: Watermarking Text Document Images Using Edge Direction Histograms, Pattern Recognition Letters, 25(11), August 2004, 1243-1251.
-
(2004)
Pattern Recognition Letters
, vol.25
, Issue.11
, pp. 1243-1251
-
-
Kim, Y.W.1
Oh, I.S.2
-
10
-
-
0035248504
-
A Robust Image Authentication Method Distinguishing JPEG Compression from Malicious Manipulation
-
February
-
Lin, C Y., Chang, S. E.: A Robust Image Authentication Method Distinguishing JPEG Compression from Malicious Manipulation, IEEE Transactions on Circuits and Systems for Video Technology, 11(02), February 2001, 153-168.
-
(2001)
IEEE Transactions on Circuits and Systems for Video Technology
, vol.11
, Issue.2
, pp. 153-168
-
-
Lin, C.Y.1
Chang, S.E.2
-
11
-
-
25144448272
-
A Hierarchical Digital Watermarking Method for Image Tamper Detection and Recovery
-
December
-
Lin, P. L., Hsieh, C. K., Huang, P. W.: A Hierarchical Digital Watermarking Method for Image Tamper Detection and Recovery, Pattern Recognition, 38(12), December 2005, 2519-2529.
-
(2005)
Pattern Recognition
, vol.38
, Issue.12
, pp. 2519-2529
-
-
Lin, P.L.1
Hsieh, C.K.2
Huang, P.W.3
-
12
-
-
0037818310
-
Structural Digital Signature for Image Authentication: An Incidental Distortion Resistant Scheme
-
June
-
Lu, C. S., Liao, H. Y M.: Structural Digital Signature for Image Authentication: An Incidental Distortion Resistant Scheme, IEEE Transactions on Multimedia, 5(2), June 2003, 161-173.
-
(2003)
IEEE Transactions on Multimedia
, vol.5
, Issue.2
, pp. 161-173
-
-
Lu, C.S.1
Liao, H.Y.M.2
-
13
-
-
33748784123
-
A Content-based Image Authentication Scheme Based on Singular Value Decomposition, Pattern Recognition and Image Analysis: Advances in Mathematical
-
July
-
Lu, T. C., Chang, C. C., Liu, Y. L.: A Content-based Image Authentication Scheme Based on Singular Value Decomposition, Pattern Recognition and Image Analysis: Advances in Mathematical Theory and Applications, 16(3), July 2006, 506-522.
-
(2006)
Theory and Applications
, vol.16
, Issue.3
, pp. 506-522
-
-
Lu, T.C.1
Chang, C.C.2
Liu, Y.L.3
-
14
-
-
0036556071
-
Combinational Image Watermarking in the Spatial and Frequency Domains
-
April
-
Shih, F. Y., Wu, S.Y.T.: Combinational Image Watermarking in the Spatial and Frequency Domains, Pattern Recognition, 36(4), April 2003, 969-975.
-
(2003)
Pattern Recognition
, vol.36
, Issue.4
, pp. 969-975
-
-
Shih, F.Y.1
Wu, S.Y.T.2
-
15
-
-
0142029533
-
Using Set Partitioning in Hierarchical Trees to Authenticate Digital Image, Signal
-
October
-
Tsai, P. Y., Hu, Y. C., Chang, C. C.: Using Set Partitioning in Hierarchical Trees to Authenticate Digital Image, Signal Processing: Image Communication Journal, 18(9), October 2003, 813-822.
-
(2003)
Processing: Image Communication Journal
, vol.18
, Issue.9
, pp. 813-822
-
-
Tsai, P.Y.1
Hu, Y.C.2
Chang, C.C.3
-
16
-
-
0345356532
-
A Color Image Watermarking Scheme Based on Color Quantization
-
January
-
Tsai, P. Y., Hu, Y. C., Chang, C. C.: A Color Image Watermarking Scheme Based on Color Quantization, Pattern Recognition, 84(4), January 2004, 95-106.
-
(2004)
Pattern Recognition
, vol.84
, Issue.4
, pp. 95-106
-
-
Tsai, P.Y.1
Hu, Y.C.2
Chang, C.C.3
-
17
-
-
0035473831
-
Secret and Public Key Image Watermarking Schemes for Image Authentication and Ownership Verification
-
October
-
Wong, P. W., Memon, N.: Secret and Public Key Image Watermarking Schemes for Image Authentication and Ownership Verification, IEEE Transactions on Image Processing, 10(10), October 2001, 1593-1601.
-
(2001)
IEEE Transactions on Image Processing
, vol.10
, Issue.10
, pp. 1593-1601
-
-
Wong, P.W.1
Memon, N.2
-
18
-
-
12344332735
-
An Adjusted-Purpose Digital Watermarking Technique
-
December
-
Wu, Y T., Shih, F. Y: An Adjusted-Purpose Digital Watermarking Technique, Pattern Recognition, 37(12), December 2004, 2349-2359.
-
(2004)
Pattern Recognition
, vol.37
, Issue.12
, pp. 2349-2359
-
-
Wu, Y.T.1
Shih, F.Y.2
|