-
1
-
-
20444489206
-
Authentication of lossy compressed video data by semifragile watermarking
-
Chen, T. Y., C. H. Huang and T. H. Chen, Authentication of lossy compressed video data by semifragile watermarking, Proc. of the International Conference on Image Processing, vol. 4, pp.2637-2640, 2004.
-
(2004)
Proc. of the International Conference on Image Processing
, vol.4
, pp. 2637-2640
-
-
Chen, T.Y.1
Huang, C.H.2
Chen, T.H.3
-
2
-
-
0033346879
-
Digital watermarking using interblock correlation
-
Choi, Y. and I. Aizawa, Digital watermarking using interblock correlation, Proc. of the International Conference on Image Processing, vol.2, pp.216-220, 1999.
-
(1999)
Proc. of the International Conference on Image Processing
, vol.2
, pp. 216-220
-
-
Choi, Y.1
Aizawa, I.2
-
3
-
-
0033309988
-
Images with self-correcting capabilities
-
Fridrich, J. and M. Goljan, Images with self-correcting capabilities, Proc. of the International Conference on Image Processing, vol.3, pp.792-796, 1999.
-
(1999)
Proc. of the International Conference on Image Processing
, vol.3
, pp. 792-796
-
-
Fridrich, J.1
Goljan, M.2
-
5
-
-
33745301176
-
Comparison of feature extraction techniques for watermark synchronization
-
Lee, H. Y., H. K. Lee and J. Lee, Comparison of feature extraction techniques for watermark synchronization, Proc. of the 9th International Conference, KES 2005, vol.3, pp.309-316, 2005.
-
(2005)
Proc. of the 9th International Conference, KES 2005
, vol.3
, pp. 309-316
-
-
Lee, H.Y.1
Lee, H.K.2
Lee, J.3
-
6
-
-
0034776206
-
Image tamper detection and recovery system based on discrete wavelet transformation
-
Li, K. F., T. S. Chen and S. C. Wu, Image tamper detection and recovery system based on discrete wavelet transformation, Proc. of the 2001 IEEE Pacific Rim Conference on Communications, Computers and Signal Processing, vol.l, pp.164-167, 2001.
-
(2001)
Proc. of the 2001 IEEE Pacific Rim Conference on Communications, Computers and Signal Processing
, vol.50
, pp. 164-167
-
-
Li, K.F.1
Chen, T.S.2
Wu, S.C.3
-
7
-
-
1542752845
-
Applying projection and B-spline to image authentication and remedy
-
Lin, C. H. and W. S. Hsieh, Applying projection and B-spline to image authentication and remedy, IEEE Transactions on Consumer Electronics, vol.49, pp.1234-1238, 2003.
-
(2003)
IEEE Transactions on Consumer Electronics
, vol.49
, pp. 1234-1238
-
-
Lin, C.H.1
Hsieh, W.S.2
-
8
-
-
1842438950
-
Robust image authentication method distinguishing JPEG compression from malicious manipulation,
-
486-97-19
-
Lin, C. Y. and S. F. Chang, Robust image authentication method distinguishing JPEG compression from malicious manipulation, CU/CTR Technical Report 486-97-19, 1997.
-
(1997)
CU/CTR Technical Report
-
-
Lin, C.Y.1
Chang, S.F.2
-
9
-
-
20444507347
-
Robust image authentication method surviving JPEG lossy compression
-
Lin, C. Y. and S. F. Chang, Robust image authentication method surviving JPEG lossy compression, Proc. of IS & T/SPIE, 1998.
-
(1998)
Proc. of IS & T/SPIE
-
-
Lin, C.Y.1
Chang, S.F.2
-
10
-
-
0033688392
-
Semi-fragile watermarking for authenticating JPEG visual content
-
Lin, C. Y. and S. F. Chang, Semi-fragile watermarking for authenticating JPEG visual content, Proc. of the SPIE International Conf. on Security and Watermarking of Multimedia Contents, vol.3971, no.13, 2000.
-
(2000)
Proc. of the SPIE International Conf. on Security and Watermarking of Multimedia Contents
, vol.3971
, Issue.13
-
-
Lin, C.Y.1
Chang, S.F.2
-
11
-
-
0034787545
-
Self-authentication-and-recovery image watermarking system
-
SARI
-
Lin, C. Y. and S. F. Chang, SARI: Self-authentication-and-recovery image watermarking system, Proc. of the 2001 Multimedia Conference, ACM Multimedia 2001 Workshops, pp.628-629, 2001.
-
(2001)
Proc. of the 2001 Multimedia Conference, ACM Multimedia 2001 Workshops
, pp. 628-629
-
-
Lin, C.Y.1
Chang, S.F.2
-
12
-
-
20844440573
-
A fragile watermarking scheme for image authentication with localization and recovery
-
Lin, P. L., P. W. Huang and A. W. Peng, A fragile watermarking scheme for image authentication with localization and recovery, Proc. of the IEEE Sixth International Symposium on Multimedia Software Engineering, pp.146-153, 2004.
-
(2004)
Proc. of the IEEE Sixth International Symposium on Multimedia Software Engineering
, pp. 146-153
-
-
Lin, P.L.1
Huang, P.W.2
Peng, A.W.3
-
13
-
-
25144448272
-
A hierarchical digital watermarking method for image tamper detection and recovery
-
Lin, P. L., C. K. Hsieh and P. W. Huang, A hierarchical digital watermarking method for image tamper detection and recovery, Pattern Recognition, vol.38, no.12, pp.2519-2529, 2005.
-
(2005)
Pattern Recognition
, vol.38
, Issue.12
, pp. 2519-2529
-
-
Lin, P.L.1
Hsieh, C.K.2
Huang, P.W.3
-
14
-
-
0037818310
-
Structural digital signature for image authentication: An incidental distortion resistant scheme
-
Lu, C. S. and H. Y. M. Liao, Structural digital signature for image authentication: An incidental distortion resistant scheme, IEEE Transactions on Multimedia, vol.5, no.2, 2003.
-
(2003)
IEEE Transactions on Multimedia
, vol.5
, Issue.2
-
-
Lu, C.S.1
Liao, H.Y.M.2
-
15
-
-
39049170582
-
Face detection based on vector quantization in color images
-
Lu, Z. M., X. N. Xu and J. S. Pan, Face detection based on vector quantization in color images, International Journal of Innovative Computing, Information and Control, vol.2, no.3, pp.667-672, 2006.
-
(2006)
International Journal of Innovative Computing, Information and Control
, vol.2
, Issue.3
, pp. 667-672
-
-
Lu, Z.M.1
Xu, X.N.2
Pan, J.S.3
-
16
-
-
0033706181
-
Compression compatible fragile and semi-fragile tamper detection
-
Marvel, L. M., G. Hartwig and C. G. Boncelet Jr., Compression compatible fragile and semi-fragile tamper detection, Proc. of the SPIE International Conference on Security and Watermarking of Multimedia Contents II, vol.3971, no. 12, 2000.
-
(2000)
Proc. of the SPIE International Conference on Security and Watermarking of Multimedia Contents II
, vol.3971
, Issue.12
-
-
Marvel, L.M.1
Hartwig, G.2
Boncelet Jr., C.G.3
-
17
-
-
63649125076
-
Victor Iquise and Thierry Pun, Attack modeling: Towards a second generation benchmark
-
Sviatoslav, V. and Pereira S., Victor Iquise and Thierry Pun, Attack modeling: Towards a second generation benchmark, Signal Processing, Special Issue: Information Theoretic Issues in Digital Watermarking, 2001.
-
(2001)
Signal Processing, Special Issue: Information Theoretic Issues in Digital Watermarking
-
-
Sviatoslav, V.1
Pereira, S.2
-
18
-
-
5644253212
-
Blind image data hiding based on self reference
-
Wang, Y. and A. Permain, Blind image data hiding based on self reference, Pattern Recognition Letters, vol.25, no.15, pp.1681-1689, 2004.
-
(2004)
Pattern Recognition Letters
, vol.25
, Issue.15
, pp. 1681-1689
-
-
Wang, Y.1
Permain, A.2
-
19
-
-
0347927731
-
Detection and restoration of tampered JPEG images
-
Wu, H. C. and C. C. Chang, Detection and restoration of tampered JPEG images, The Journal of System and Software, vol.64, no.2, pp.151-161, 2002.
-
(2002)
The Journal of System and Software
, vol.64
, Issue.2
, pp. 151-161
-
-
Wu, H.C.1
Chang, C.C.2
-
20
-
-
0032292342
-
Watermarking for image authentication
-
Wu, M. and B. Liu, Watermarking for image authentication, Proc. of the IEEE International Conference on Image Processing, vol.2, pp.437-441, 1998.
-
(1998)
Proc. of the IEEE International Conference on Image Processing
, vol.2
, pp. 437-441
-
-
Wu, M.1
Liu, B.2
|