-
1
-
-
0032760474
-
Protecting digital-image copyrights: A framework
-
G. Voyatzis and I. Pitas, Protecting digital-image copyrights: A framework, IEEE Computer Graphics and Applications, vol. 19, no. 1, pp. 18-24, 1999.
-
(1999)
IEEE Computer Graphics and Applications
, vol.19
, Issue.1
, pp. 18-24
-
-
Voyatzis, G.1
Pitas, I.2
-
2
-
-
63649142647
-
-
H. Yin, Z. Chen and Z. Yuan, A blind watermarking algorithm based on hyperchaos and coset by quantizing wavelet transform coefficients, International Journal of Innovative Computing, Information and Control, 3, no. 6(B), pp. 1635-1643, 2007.
-
H. Yin, Z. Chen and Z. Yuan, A blind watermarking algorithm based on hyperchaos and coset by quantizing wavelet transform coefficients, International Journal of Innovative Computing, Information and Control, vol. 3, no. 6(B), pp. 1635-1643, 2007.
-
-
-
-
3
-
-
63849234523
-
-
S. D. Lin and Y. Kuo, An image watermarking scheme with tamper detection and recovery, International Journal of Innovative Computing, Information and Control, 3, no. 6(A), pp. 1379-1387, 2007.
-
S. D. Lin and Y. Kuo, An image watermarking scheme with tamper detection and recovery, International Journal of Innovative Computing, Information and Control, vol. 3, no. 6(A), pp. 1379-1387, 2007.
-
-
-
-
5
-
-
0033698176
-
Robust image watermarking on the DCT domain
-
Geneva, pp
-
W. N. Lie, G. S. Lin, C. L. Wu and T. C. Wang, Robust image watermarking on the DCT domain, Proc. of IEEE International Symposium on Circuits and Systems, Geneva, pp. 228-231, 2000.
-
(2000)
Proc. of IEEE International Symposium on Circuits and Systems
, pp. 228-231
-
-
Lie, W.N.1
Lin, G.S.2
Wu, C.L.3
Wang, T.C.4
-
6
-
-
0035473830
-
Multipurpose watermarking for image authentication and protection
-
C. S. Lu and H. Y. M. Liao, Multipurpose watermarking for image authentication and protection, IEEE Transactions on Image Processing, vol. 10, no. 10, pp. 1579-1592, 2001.
-
(2001)
IEEE Transactions on Image Processing
, vol.10
, Issue.10
, pp. 1579-1592
-
-
Lu, C.S.1
Liao, H.Y.M.2
-
7
-
-
20444378085
-
Multipurpose image watermarking algorithm based on multistage vector quantization
-
Z. M. Lu, D. G. Xu and S. H. Sun, Multipurpose image watermarking algorithm based on multistage vector quantization, IEEE Transactions on Image Processing, vol. 14, no. 6, pp. 822-831, 2005.
-
(2005)
IEEE Transactions on Image Processing
, vol.14
, Issue.6
, pp. 822-831
-
-
Lu, Z.M.1
Xu, D.G.2
Sun, S.H.3
-
8
-
-
0037352759
-
An embedding algorithm for multiple watermarks
-
C. S. Shieh, H. C. Huang and F. H. Wang, An embedding algorithm for multiple watermarks, Journal of Information Science and Engineering, vol. 19, pp. 381-395, 2003.
-
(2003)
Journal of Information Science and Engineering
, vol.19
, pp. 381-395
-
-
Shieh, C.S.1
Huang, H.C.2
Wang, F.H.3
-
9
-
-
0036556071
-
Combinational image watermarking in the spatial and frequency domains
-
F. Y. Shih and S. Y. T. Wu, Combinational image watermarking in the spatial and frequency domains, Pattern Recognition, vol. 36, pp. 969-975, 2003.
-
(2003)
Pattern Recognition
, vol.36
, pp. 969-975
-
-
Shih, F.Y.1
Wu, S.Y.T.2
-
10
-
-
0141862034
-
A novel blind multiple watermarking technique for images
-
Copyright Protection and Information Hiding
-
P. H. W. Wong, Oscar C. Au and Gene Y. M. Yeung, A novel blind multiple watermarking technique for images, IEEE Transactions on Circuits and Systems for Video Technology: Special Issue on Authentication, Copyright Protection and Information Hiding, vol. 13, no. 8, pp. 813-830, 2003.
-
(2003)
IEEE Transactions on Circuits and Systems for Video Technology: Special Issue on Authentication
, vol.13
, Issue.8
, pp. 813-830
-
-
Wong, P.H.W.1
Au, O.C.2
Yeung, G.Y.M.3
-
11
-
-
84926193517
-
Visual cryptography
-
Proc. of the Advances in Cryptography-EUROCRYOT94
-
M. Naor and A. Shamir, Visual cryptography, Proc. of the Advances in Cryptography-EUROCRYOT94, LNCS 950, pp. 1-12, 1995.
-
(1995)
LNCS
, vol.950
, pp. 1-12
-
-
Naor, M.1
Shamir, A.2
-
12
-
-
84980388463
-
If one watermark is good, are more better?
-
F. Mintzer and G. W. Braudaway, If one watermark is good, are more better?, Proc. of the IEEE International Conference on Acoustics, Speech and Signal Processing, pp. 2067-2069, 1999.
-
(1999)
Proc. of the IEEE International Conference on Acoustics, Speech and Signal Processing
, pp. 2067-2069
-
-
Mintzer, F.1
Braudaway, G.W.2
-
15
-
-
0032626169
-
Securing digital signatures for non-repudiation
-
J. Zhou and K.Y. Lam, Securing digital signatures for non-repudiation, Computer Communications, vol. 22, pp. 710-716, 1999.
-
(1999)
Computer Communications
, vol.22
, pp. 710-716
-
-
Zhou, J.1
Lam, K.Y.2
-
16
-
-
0036605019
-
An image intellectual property protection scheme for gray-level images using visual secret sharing strategy
-
C. C. Chang and J. C. Chuang, An image intellectual property protection scheme for gray-level images using visual secret sharing strategy, Pattern Recognition Letters, vol. 23, no. 8, pp. 931-941, 2002.
-
(2002)
Pattern Recognition Letters
, vol.23
, Issue.8
, pp. 931-941
-
-
Chang, C.C.1
Chuang, J.C.2
-
17
-
-
0035605439
-
Copyright protection scheme of images based on visual cryptography
-
C. C. Chang and H. C. Wu, Copyright protection scheme of images based on visual cryptography, Imaging Science Journal, vol. 49, pp. 141-150, 2001.
-
(2001)
Imaging Science Journal
, vol.49
, pp. 141-150
-
-
Chang, C.C.1
Wu, H.C.2
-
18
-
-
33646415682
-
Owner-customer right protection mechanism using a watermarking scheme and a watermarking protocol
-
T. H. Chen and D. S. Tsai, Owner-customer right protection mechanism using a watermarking scheme and a watermarking protocol, Pattern Recognition, vol. 39, no. 8, pp. 1530-1541, 2006.
-
(2006)
Pattern Recognition
, vol.39
, Issue.8
, pp. 1530-1541
-
-
Chen, T.H.1
Tsai, D.S.2
-
19
-
-
0034251536
-
Repeating image watermarking technique by the visual cryptography
-
C. C. Wang, S. C. Tai and C. S. Yu, Repeating image watermarking technique by the visual cryptography, IEICE Transactions on Fundamentals, vol. E83-A, no. 8, pp. 1589-1598, 2000.
-
(2000)
IEICE Transactions on Fundamentals
, vol.E83-A
, Issue.8
, pp. 1589-1598
-
-
Wang, C.C.1
Tai, S.C.2
Yu, C.S.3
-
20
-
-
0032785523
-
Hidden digital watermarks in images
-
C. T. Hsu and J. L. Wu, Hidden digital watermarks in images, IEEE Transactions on Image Processing, vol. 8, no. 1, pp. 58-68, 1999.
-
(1999)
IEEE Transactions on Image Processing
, vol.8
, Issue.1
, pp. 58-68
-
-
Hsu, C.T.1
Wu, J.L.2
-
22
-
-
0032292654
-
A digital watermark based on wavelet transform and its robustness on image processing
-
H. Inoue, A. Miyazaki, A. Yamamoto and T. Katsura, A digital watermark based on wavelet transform and its robustness on image processing, Proc. of the International Conference on Image Processing, ICIP 98, pp. 391-395, 1998.
-
(1998)
Proc. of the International Conference on Image Processing, ICIP 98
, pp. 391-395
-
-
Inoue, H.1
Miyazaki, A.2
Yamamoto, A.3
Katsura, T.4
-
23
-
-
0035510211
-
Circularly symmetric watermark embedding in 2-D DFT domain
-
V. Solachidis and I. Pitas, Circularly symmetric watermark embedding in 2-D DFT domain, IEEE Transactions on Image Processing, vol. 10, no. 11, pp. 1741-1753, 2001.
-
(2001)
IEEE Transactions on Image Processing
, vol.10
, Issue.11
, pp. 1741-1753
-
-
Solachidis, V.1
Pitas, I.2
-
24
-
-
0032187555
-
A virtual image cryptosystem based upon vector quantization
-
T. S. Chen, C. C. Chang and M. S. Hwang, A virtual image cryptosystem based upon vector quantization, IEEE Transactions on Image Processing, vol. 7, no. 10, pp. 1485-1488, 1998.
-
(1998)
IEEE Transactions on Image Processing
, vol.7
, Issue.10
, pp. 1485-1488
-
-
Chen, T.S.1
Chang, C.C.2
Hwang, M.S.3
-
25
-
-
13944272999
-
A publicly verifiable copyright-proving scheme resistant to malicious attacks
-
T. H. Chen, G. Horng and W. B. Lee, A publicly verifiable copyright-proving scheme resistant to malicious attacks, IEEE Transactions on Industrial Electronics, vol. 52, no. 1, pp. 327-334, 2005.
-
(2005)
IEEE Transactions on Industrial Electronics
, vol.52
, Issue.1
, pp. 327-334
-
-
Chen, T.H.1
Horng, G.2
Lee, W.B.3
-
26
-
-
30744474182
-
Cheating in visual cryptography
-
G. Horng, T. H. Chen and D. S. Tsai, Cheating in visual cryptography, Designs, Codes and Cryptography, vol. 38, no. 2, pp. 219-236, 2006.
-
(2006)
Designs, Codes and Cryptography
, vol.38
, Issue.2
, pp. 219-236
-
-
Horng, G.1
Chen, T.H.2
Tsai, D.S.3
-
27
-
-
34147183148
-
A cheating prevention scheme for binary visual cryptography with homogeneous secret images
-
D. S Tsai, T. H. Chen and G. Horng, A cheating prevention scheme for binary visual cryptography with homogeneous secret images, Pattern Recognition, vol. 40, no. 8, pp. 2356-2366, 2007.
-
(2007)
Pattern Recognition
, vol.40
, Issue.8
, pp. 2356-2366
-
-
Tsai, D.S.1
Chen, T.H.2
Horng, G.3
-
28
-
-
10044234541
-
Image size invariant visual cryptography
-
R. Ito, H. Kuwakado and H. Tanaka, Image size invariant visual cryptography, IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, vol. E82-A, no. 10, pp. 2172-2177, 1999.
-
(1999)
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences
, vol.E82-A
, Issue.10
, pp. 2172-2177
-
-
Ito, R.1
Kuwakado, H.2
Tanaka, H.3
-
29
-
-
0442280816
-
New visual secret sharing schemes using probabilistic method
-
C. N. Yang, New visual secret sharing schemes using probabilistic method, Pattern Recognition Letters, vol. 25, pp. 481-494, 2004.
-
(2004)
Pattern Recognition Letters
, vol.25
, pp. 481-494
-
-
Yang, C.N.1
-
30
-
-
0034326194
-
Visual cryptography for grey level images
-
C. Blundo, A. De Santis and M. Naor, Visual cryptography for grey level images, Information Processing Letters, vol. 75, pp. 255-259, 2000.
-
(2000)
Information Processing Letters
, vol.75
, pp. 255-259
-
-
Blundo, C.1
De Santis, A.2
Naor, M.3
-
31
-
-
0037411307
-
Visual cryptography for color images
-
Y. C. Hou, Visual cryptography for color images, Pattern Recognition, vol. 36, pp. 1619-1629, 2003.
-
(2003)
Pattern Recognition
, vol.36
, pp. 1619-1629
-
-
Hou, Y.C.1
-
32
-
-
18344378898
-
Visual cryptography for color images without pixel expansion
-
Y. C. Hou, C. F. Lin and C. Y. Chang, Visual cryptography for color images without pixel expansion, Journal of Technology, vol. 16, no. 4, pp. 595-603, 2001.
-
(2001)
Journal of Technology
, vol.16
, Issue.4
, pp. 595-603
-
-
Hou, Y.C.1
Lin, C.F.2
Chang, C.Y.3
|