-
1
-
-
0027697301
-
The trustworthy digital camera: Restoring credibility to the photographic image
-
Friedman, G. L., The trustworthy digital camera: restoring credibility to the photographic image, IEEE Transactions on Consumer Electronics, vol.39, pp.905-910, 1993.
-
(1993)
IEEE Transactions on Consumer Electronics
, vol.39
, pp. 905-910
-
-
Friedman, G.L.1
-
2
-
-
33847280382
-
An image fragile watermark scheme based on chaotic image pattern and pixel-pairs
-
Liu, S. H., H. X. Yao, W. Gao and Y. L. Liu, An image fragile watermark scheme based on chaotic image pattern and pixel-pairs, Applied Mathematics and Computation, vol.185, no.2, pp.869-882, 2007.
-
(2007)
Applied Mathematics and Computation
, vol.185
, Issue.2
, pp. 869-882
-
-
Liu, S.H.1
Yao, H.X.2
Gao, W.3
Liu, Y.L.4
-
3
-
-
0033688392
-
Semi-fragile watermarking for authenticating JPEG visual content
-
San Jose, pp
-
Lin, C. Y. and S. F. Chang, Semi-fragile watermarking for authenticating JPEG visual content, Proc. of the SPIE on Security Watermarking Multimedia Contents II, vol.3971, San Jose, pp.140-151, 2000.
-
(2000)
Proc. of the SPIE on Security Watermarking Multimedia Contents II
, vol.3971
, pp. 140-151
-
-
Lin, C.Y.1
Chang, S.F.2
-
5
-
-
0031362116
-
Secure spread spectrum watermarking for multimedia
-
Cox, I. J., J. Kilian, T. Leighton and T. Shamoon, Secure spread spectrum watermarking for multimedia, IEEE Transactions on Image Processing, vol.6, pp.1673-1687, 1997.
-
(1997)
IEEE Transactions on Image Processing
, vol.6
, pp. 1673-1687
-
-
Cox, I.J.1
Kilian, J.2
Leighton, T.3
Shamoon, T.4
-
6
-
-
0034483631
-
Cocktail watermarking for digital image protection
-
Lu, C. S., S. K. Huang, C. J. Sze, and H. Y. M. Liao , Cocktail watermarking for digital image protection, IEEE Transactions on Multimedia, vol.2, pp.209-224, 2000.
-
(2000)
IEEE Transactions on Multimedia
, vol.2
, pp. 209-224
-
-
Lu, C.S.1
Huang, S.K.2
Sze, C.J.3
Liao, H.Y.M.4
-
7
-
-
33751435860
-
Robust SS watermarking with improved capacity
-
Maity, S. P., M. K. Kundu and T. S. Das, Robust SS watermarking with improved capacity, Pattern Recognition Letters, vol.28, no.3, pp.350-356, 2007.
-
(2007)
Pattern Recognition Letters
, vol.28
, Issue.3
, pp. 350-356
-
-
Maity, S.P.1
Kundu, M.K.2
Das, T.S.3
-
8
-
-
0034249378
-
A robust DCT-based watermarking for copyright protection
-
Lin, S. D. and C. F. Chen, A robust DCT-based watermarking for copyright protection, IEEE Transactions on Consumer Electronics, vol.46, no.3, pp.415-421, 2000.
-
(2000)
IEEE Transactions on Consumer Electronics
, vol.46
, Issue.3
, pp. 415-421
-
-
Lin, S.D.1
Chen, C.F.2
-
9
-
-
0036611838
-
Hierarchical watermarking for secure image authentication with localization
-
Celik, M. U., G. Sharma, E. Saber and A. M. Tekalp, Hierarchical watermarking for secure image authentication with localization, IEEE Transactions on Image Processing, vol.ll, no.6, pp.585-595, 2002.
-
(2002)
IEEE Transactions on Image Processing
, vol.100
, Issue.6
, pp. 585-595
-
-
Celik, M.U.1
Sharma, G.2
Saber, E.3
Tekalp, A.M.4
-
10
-
-
34047172117
-
Robust blind video watermarking with adaptive embedding mechanism
-
Wang, H. X. and Z. M. Lu, Robust blind video watermarking with adaptive embedding mechanism, International Journal of Innovative Computing, Information & Control, vol.l, no.2, pp.247-59, 2005.
-
(2005)
International Journal of Innovative Computing, Information & Control
, vol.50
, Issue.2
, pp. 247-259
-
-
Wang, H.X.1
Lu, Z.M.2
-
11
-
-
0037869332
-
Fragile watermarking scheme for image authentication
-
Lu, H., R. Shen and F. L. Chung, Fragile watermarking scheme for image authentication, IEE Electronics Letters, vol.39, no. 12, 2003.
-
(2003)
IEE Electronics Letters
, vol.39
, Issue.12
-
-
Lu, H.1
Shen, R.2
Chung, F.L.3
-
12
-
-
8344236008
-
Fragile image watermarking using a gradient image for improved localization and security
-
Suthaharan, S., Fragile image watermarking using a gradient image for improved localization and security, Pattern Recognition Letters, vol.25, pp.1893-1903, 2004.
-
(2004)
Pattern Recognition Letters
, vol.25
, pp. 1893-1903
-
-
Suthaharan, S.1
-
13
-
-
0032650557
-
Content-based digital signature for motion pictures authentication and content-fragile watermarking
-
Dittmann, J., A. Steinmetz and R. Steinmetz, Content-based digital signature for motion pictures authentication and content-fragile watermarking, Proc. of the IEEE International Conference on Multimedia Computing and Systems, vol.2, pp.209-213, 1999.
-
(1999)
Proc. of the IEEE International Conference on Multimedia Computing and Systems
, vol.2
, pp. 209-213
-
-
Dittmann, J.1
Steinmetz, A.2
Steinmetz, R.3
-
14
-
-
0036755019
-
On the design of content-based multimedia authentication systems
-
Wu, C. W., On the design of content-based multimedia authentication systems, IEEE Transactions on Multimedia, vol.4, no.3, pp.385-393, 2002.
-
(2002)
IEEE Transactions on Multimedia
, vol.4
, Issue.3
, pp. 385-393
-
-
Wu, C.W.1
-
15
-
-
20844440573
-
A fragile watermarking scheme for image authentication with localization and recovery
-
Lin, P. L., P. W. Huang and A. W. Peng, A fragile watermarking scheme for image authentication with localization and recovery, Proc. of the IEEE Sixth International Symposium on Multimedia Software Engineering, pp.146-153, 2004.
-
(2004)
Proc. of the IEEE Sixth International Symposium on Multimedia Software Engineering
, pp. 146-153
-
-
Lin, P.L.1
Huang, P.W.2
Peng, A.W.3
-
16
-
-
25144448272
-
A hierarchical digital watermarking method for image tamper detection and recovery
-
Lin, P. L., C. K. Hsieh and P. W. Huang, A hierarchical digital watermarking method for image tamper detection and recovery, Pattern Recognition, vol.38, pp.2519-2529, 2005.
-
(2005)
Pattern Recognition
, vol.38
, pp. 2519-2529
-
-
Lin, P.L.1
Hsieh, C.K.2
Huang, P.W.3
-
17
-
-
33744482068
-
Detecting and restoring system of tampered image based on discrete wavelet transformation and block truncation coding
-
Wang, C. L., R. H. Huang, T. S. Chen and H. Y. Lee, Detecting and restoring system of tampered image based on discrete wavelet transformation and block truncation coding, Proc. of the 19th International Conference on Advanced Information Networking and Applications, vol.2, pp.79-82, 2005.
-
(2005)
Proc. of the 19th International Conference on Advanced Information Networking and Applications
, vol.2
, pp. 79-82
-
-
Wang, C.L.1
Huang, R.H.2
Chen, T.S.3
Lee, H.Y.4
-
18
-
-
63849084497
-
Hierarchical fragile watermarking scheme for image authentication
-
Taipei, Taiwan, pp
-
Lin, S. D. and Z. L. Yang, Hierarchical fragile watermarking scheme for image authentication, Proc. of the 18th IPPR Conference on Computer Vision, Graphics, and Image Processing, Taipei, Taiwan, pp.1023-1028, 2005.
-
(2005)
Proc. of the 18th IPPR Conference on Computer Vision, Graphics, and Image Processing
, pp. 1023-1028
-
-
Lin, S.D.1
Yang, Z.L.2
-
19
-
-
28044448253
-
Improving the robustness of DCT-based image watermarking against JPEG compression
-
Lin, S. D., S. C. Shie and J. Y. Guo, Improving the robustness of DCT-based image watermarking against JPEG compression, International Conference on Consumer Electronics, pp.343-344, 2005.
-
(2005)
International Conference on Consumer Electronics
, pp. 343-344
-
-
Lin, S.D.1
Shie, S.C.2
Guo, J.Y.3
-
20
-
-
63849310869
-
A DCT-based image watermarking scheme by coefficient adjustment
-
Hualien, Taiwan
-
Lin, S. D., S. C. Shie and J. Y. Guo, A DCT-based image watermarking scheme by coefficient adjustment, Proc. of the 17th IPPR Conference on Computer Vision, Graphics, and Image Processing, Hualien, Taiwan, 2004.
-
(2004)
Proc. of the 17th IPPR Conference on Computer Vision, Graphics, and Image Processing
-
-
Lin, S.D.1
Shie, S.C.2
Guo, J.Y.3
-
21
-
-
77949839067
-
An algorithm of digital watermarking with robust for image cropping
-
Su, F., Y. Zhu and H. Ge, An algorithm of digital watermarking with robust for image cropping, Proc. of the International Conference on Signal Processing, vol.l, pp.632-635, 2002.
-
(2002)
Proc. of the International Conference on Signal Processing
, vol.50
, pp. 632-635
-
-
Su, F.1
Zhu, Y.2
Ge, H.3
-
22
-
-
13944272999
-
A publicly verifiable copyright-proving scheme resistant to malicious attacks
-
Chen, T. H., G. Horng and W. B. Lee, A publicly verifiable copyright-proving scheme resistant to malicious attacks, IEEE Transactions on Industrial Electronics, vol.52, pp.327-334, 2005.
-
(2005)
IEEE Transactions on Industrial Electronics
, vol.52
, pp. 327-334
-
-
Chen, T.H.1
Horng, G.2
Lee, W.B.3
-
23
-
-
46649098182
-
Spline wavelets based texture features for image retrieval
-
Qiao, Y., Z. Lu, J. Pan and S. Sun, Spline wavelets based texture features for image retrieval, International Journal of Innovative Computing, Information and Control, vol.2, no.3, pp.653-658, 2006.
-
(2006)
International Journal of Innovative Computing, Information and Control
, vol.2
, Issue.3
, pp. 653-658
-
-
Qiao, Y.1
Lu, Z.2
Pan, J.3
Sun, S.4
-
24
-
-
41849122894
-
Fault identification and fault-tolerant control for a class of networked control systems
-
Z. Mao and B. Jiang, Fault identification and fault-tolerant control for a class of networked control systems, Int. J. Innovative Computing, Information and Control, vol.3, no.5, pp.1121-1130, 2007.
-
(2007)
Int. J. Innovative Computing, Information and Control
, vol.3
, Issue.5
, pp. 1121-1130
-
-
Mao, Z.1
Jiang, B.2
|