-
2
-
-
0033309988
-
Images with self-correcting capabilities
-
Kobe, Japan
-
J. Fridrich, M. Goljan, Images with self-correcting capabilities, in: Proceedings of the IEEE International Conference on Image Processing, vol. 13, Kobe, Japan, 1999, pp. 792-796.
-
(1999)
Proceedings of the IEEE International Conference on Image Processing
, vol.13
, pp. 792-796
-
-
Fridrich, J.1
Goljan, M.2
-
3
-
-
0038324638
-
Protection of digital images using self embedding
-
NJ, USA, May 14
-
J. Fridrich, M. Goljan, Protection of digital images using self embedding, in: Symposium on Content Security and Data Hiding in Digital Media, NJ, USA, May 14, 1999.
-
(1999)
Symposium on Content Security and Data Hiding in Digital Media
-
-
Fridrich, J.1
Goljan, M.2
-
4
-
-
84864987456
-
Reconstruction of missing blocks in image transmission by using self-embedding
-
Y.F. Shao, L. Zhang, G.W. Wu, X.G. Lin, Reconstruction of missing blocks in image transmission by using self-embedding, in: Proceedings of the International Symposium on Intelligent Multimedia, Video and Speech Processing, vol. 5, 2001, pp. 535-538.
-
(2001)
Proceedings of the International Symposium on Intelligent Multimedia, Video and Speech Processing
, vol.5
, pp. 535-538
-
-
Shao, Y.F.1
Zhang, L.2
Wu, G.W.3
Lin, X.G.4
-
5
-
-
84948672864
-
Color image authentication based on a self-embedding technique
-
I. Kostopoulos, S.A.M. Gilani, A.N. Skodras, Color image authentication based on a self-embedding technique, in: Proceedings of the 14th International Conference on Digital Signal Processing, vol. 7, 2002, pp. 733-736.
-
(2002)
Proceedings of the 14th International Conference on Digital Signal Processing
, vol.7
, pp. 733-736
-
-
Kostopoulos, I.1
Gilani, S.A.M.2
Skodras, A.N.3
-
6
-
-
20844440573
-
A fragile watermarking scheme for image authentication with localization and recovery
-
P.-L. Lin, P.-W. Huang, A.-W. Peng, A fragile watermarking scheme for image authentication with localization and recovery, in: Proceeding of the IEEE Sixth International Symposium on Multimedia Software Engineering, vol. 12, 2004, pp. 146-153.
-
(2004)
Proceeding of the IEEE Sixth International Symposium on Multimedia Software Engineering
, vol.12
, pp. 146-153
-
-
Lin, P.-L.1
Huang, P.-W.2
Peng, A.-W.3
-
7
-
-
34248661818
-
A majority-voting based watermarking scheme for color image tamper detection and recovery
-
Wang M.-S., and Chen W.-C. A majority-voting based watermarking scheme for color image tamper detection and recovery. Computer Standards & Interfaces 29 (2007) 561-570
-
(2007)
Computer Standards & Interfaces
, vol.29
, pp. 561-570
-
-
Wang, M.-S.1
Chen, W.-C.2
-
8
-
-
25144448272
-
A hierarchical digital watermarking method for image tamper detection and recovery
-
Lin P.-L., Hsieh C.-K., and Huang P.-W. A hierarchical digital watermarking method for image tamper detection and recovery. Pattern Recognition 38 12 (2005) 2519-2529
-
(2005)
Pattern Recognition
, vol.38
, Issue.12
, pp. 2519-2529
-
-
Lin, P.-L.1
Hsieh, C.-K.2
Huang, P.-W.3
-
9
-
-
48149100935
-
Dual watermark for image tamper detection and recovery
-
Lee T.-Y., and Lin S.D. Dual watermark for image tamper detection and recovery. Pattern Recognition 41 (2008) 3497-3506
-
(2008)
Pattern Recognition
, vol.41
, pp. 3497-3506
-
-
Lee, T.-Y.1
Lin, S.D.2
-
10
-
-
0035473831
-
Secret and public key image watermarking schemes for image authentication and ownership verification
-
Wong P.W., and Memon N. Secret and public key image watermarking schemes for image authentication and ownership verification. IEEE Transactions on Image Processing 10 (2001) 1593-1601
-
(2001)
IEEE Transactions on Image Processing
, vol.10
, pp. 1593-1601
-
-
Wong, P.W.1
Memon, N.2
-
11
-
-
8344236008
-
Fragile image watermarking using a gradient image for improved localization and security
-
Suthaharan S. Fragile image watermarking using a gradient image for improved localization and security. Pattern Recognition Letters 25 (2004) 1893-1903
-
(2004)
Pattern Recognition Letters
, vol.25
, pp. 1893-1903
-
-
Suthaharan, S.1
-
12
-
-
0036611838
-
Hierarchical watermarking for secure image authentication with localization
-
Celik M., Sharma G., Saber E., and Tekalp A.M. Hierarchical watermarking for secure image authentication with localization. IEEE Transactions on Image Processing 11 6 (2002) 585-595
-
(2002)
IEEE Transactions on Image Processing
, vol.11
, Issue.6
, pp. 585-595
-
-
Celik, M.1
Sharma, G.2
Saber, E.3
Tekalp, A.M.4
-
13
-
-
0033872149
-
Counterfeiting attacks on oblivious block-wise independent invisible watermarking schemes
-
Holliman M., and Memon N. Counterfeiting attacks on oblivious block-wise independent invisible watermarking schemes. IEEE Transactions on Image Processing 3 9 (2000) 432-441
-
(2000)
IEEE Transactions on Image Processing
, vol.3
, Issue.9
, pp. 432-441
-
-
Holliman, M.1
Memon, N.2
-
14
-
-
0036530306
-
Cryptanalysis of the Yeung-Mintzer fragile watermarking technique
-
Fridrich J., Goljan M., and Memon N. Cryptanalysis of the Yeung-Mintzer fragile watermarking technique. Journal of Electronic Imaging 11 4 (2002) 262-274
-
(2002)
Journal of Electronic Imaging
, vol.11
, Issue.4
, pp. 262-274
-
-
Fridrich, J.1
Goljan, M.2
Memon, N.3
-
15
-
-
34848926024
-
Four-scanning attack on hierarchical digital watermarking method for image tamper detection and recovery
-
Chang C.-C., Fan Y.-H., and Tai W.-L. Four-scanning attack on hierarchical digital watermarking method for image tamper detection and recovery. Pattern Recognition 41 (2008) 654-661
-
(2008)
Pattern Recognition
, vol.41
, pp. 654-661
-
-
Chang, C.-C.1
Fan, Y.-H.2
Tai, W.-L.3
-
18
-
-
33845423997
-
A wavelet-based fragile watermarking scheme for secure image authentication
-
Korea
-
H.J. He, J.S. Zhang, H.-M. Tai, A wavelet-based fragile watermarking scheme for secure image authentication, in: Proceedings of the Fifth International Workshop on Digital Watermarking, Korea, vol. 11, 2006, pp. 422-432.
-
(2006)
Proceedings of the Fifth International Workshop on Digital Watermarking
, vol.11
, pp. 422-432
-
-
He, H.J.1
Zhang, J.S.2
Tai, H.-M.3
|