-
1
-
-
20844440573
-
A fragile watermarking scheme for image authentication with localization and recovery
-
Washington, DC, pp
-
P.-L. Lin P-W. Huang, and A.-W. Peng, "A fragile watermarking scheme for image authentication with localization and recovery," Proc. IEEE 6 Int. Symp. on Multimedia Software Engineering, Washington, DC, pp. 146-153 (2004).
-
(2004)
Proc. IEEE 6 Int. Symp. on Multimedia Software Engineering
, pp. 146-153
-
-
Lin, P.-L.1
Huang, P.-W.2
Peng, A.-W.3
-
2
-
-
0035159824
-
A hierarchical image authentication watermark with improved localization and security
-
Thessaloniki, Greece, pp
-
M. U. Celik, G. Sharma, E. Saber, and A. M. Tekalp, "A hierarchical image authentication watermark with improved localization and security," IEEE Int. Conf. on Image Processing, Vol. 2, Thessaloniki, Greece, pp. 502-505 (2001).
-
(2001)
IEEE Int. Conf. on Image Processing
, vol.2
, pp. 502-505
-
-
Celik, M.U.1
Sharma, G.2
Saber, E.3
Tekalp, A.M.4
-
3
-
-
78650145760
-
A novel fragile watermark applying in verification
-
Nanjing, pp
-
K. Ding, Ch. He, L. Jiang, and H. Wang, "A novel fragile watermark applying in verification," IEEE Int. Conf. Neural Networks and Signal Processing, Nanjing, pp. 1501-1504 (2003).
-
(2003)
IEEE Int. Conf. Neural Networks and Signal Processing
, pp. 1501-1504
-
-
Ding, K.1
He, C.2
Jiang, L.3
Wang, H.4
-
4
-
-
7644225606
-
A novel semi-fragile watermarking technique for image authentication
-
Beijing, pp
-
S. Y. Yang, Z. D. Lu, and F. H. Zou, "A novel semi-fragile watermarking technique for image authentication," 2004 7th Int. Conf. on Signal Processing, Vol. 3, Beijing, pp. 2282-2285 (2004).
-
(2004)
2004 7th Int. Conf. on Signal Processing
, vol.3
, pp. 2282-2285
-
-
Yang, S.Y.1
Lu, Z.D.2
Zou, F.H.3
-
5
-
-
0034848594
-
Blind watermarking applied to image authentication
-
Salt Lake City, pp
-
J. J. Eggers and B. Girod, "Blind watermarking applied to image authentication," IEEE Int. Conf. on Acoustics, Speech, and Signal Processing, Vol. 3, Salt Lake City, pp. 1977-1980 (2001).
-
(2001)
IEEE Int. Conf. on Acoustics, Speech, and Signal Processing
, vol.3
, pp. 1977-1980
-
-
Eggers, J.J.1
Girod, B.2
-
6
-
-
0035473830
-
-
Ch.-Sh. Lu and H.-Y. Liao, Multipurpose watermarking for image authentication, and protection, IEEE Trans, Image Process., 1579-1592 (2001), 10(10).
-
Ch.-Sh. Lu and H.-Y. Liao, "Multipurpose watermarking for image authentication, and protection," IEEE Trans, Image Process., 1579-1592 (2001), 10(10).
-
-
-
-
7
-
-
0033601667
-
Content-based integrity protection, of digital images
-
San. Jose, CA, pp
-
M. P. Queluz, "Content-based integrity protection, of digital images," IS&T/SPIE Conf. on Security and Watermarking of Multimedia Contents, Vol. 3657, San. Jose, CA, pp. 85-93 (1999).
-
(1999)
IS&T/SPIE Conf. on Security and Watermarking of Multimedia Contents
, vol.3657
, pp. 85-93
-
-
Queluz, M.P.1
-
8
-
-
33747375321
-
Image authentication under geometric attacks via structure matching
-
Amsterdam, pp
-
V. Monga, D. Vats, and B. L. Evans, "Image authentication under geometric attacks via structure matching," IEEE Conf. on Multimedia and Expo, Amsterdam, pp. 229-232 (2005).
-
(2005)
IEEE Conf. on Multimedia and Expo
, pp. 229-232
-
-
Monga, V.1
Vats, D.2
Evans, B.L.3
-
9
-
-
3042694654
-
Semi-fragile watermarking scheme for authentication of jpeg images
-
Las Vegas, pp
-
Ch. K. Ho and Ch.-T. Li, "Semi-fragile watermarking scheme for authentication of jpeg images," Proc. Int. Conf. on Information Technology, Coding and Computing, Vol. 1, Las Vegas, pp. 7-11, (2004).
-
(2004)
Proc. Int. Conf. on Information Technology, Coding and Computing
, vol.1
, pp. 7-11
-
-
Ho, C.K.1
Li, C.-T.2
-
10
-
-
0033688392
-
Semi-fragile watermarking for authenticating jpeg visual content
-
Ch.-Y. Lin and Sh.-F. Chang, "Semi-fragile watermarking for authenticating jpeg visual content," Proc. SPIE 3971, 140-151 (2000).
-
(2000)
Proc. SPIE
, vol.3971
, pp. 140-151
-
-
Lin, C.-Y.1
Chang, S.-F.2
-
11
-
-
21244463550
-
Content-based watermarking scheme for image authentication
-
Kunming, China, pp
-
Sh. Yu, Y. Hu, and J. Zhou, "Content-based watermarking scheme for image authentication," 8th Int. Conf. on Control, Automation, Robotics and Vision, Vol. 2, Kunming, China, pp. 1083-1087 (2004).
-
(2004)
8th Int. Conf. on Control, Automation, Robotics and Vision
, vol.2
, pp. 1083-1087
-
-
Yu, S.1
Hu, Y.2
Zhou, J.3
-
12
-
-
4544381080
-
Image authentication, using relation measures of wavelet coefficients
-
IEEE, Piscatawy, NJ
-
Y.-L. Tang and Ch.-T. Chen, "Image authentication, using relation measures of wavelet coefficients," Proc. IEEE Int. Conf on e-Technology, e-Commewe and e-Serve, pp. 541-545, IEEE, Piscatawy, NJ (2004).
-
(2004)
Proc. IEEE Int. Conf on e-Technology, e-Commewe and e-Serve
, pp. 541-545
-
-
Tang, Y.-L.1
Chen, C.-T.2
-
13
-
-
3042757763
-
A semi-fragile watermark scheme for image authentication
-
Brisbane, Australia, pp
-
X. Zhou, X. Duan and D. Wang, "A semi-fragile watermark scheme for image authentication," Proc. 10th Int. Multimedia Modeling Conf., Brisbane, Australia, pp. 541-545 (2004).
-
(2004)
Proc. 10th Int. Multimedia Modeling Conf
, pp. 541-545
-
-
Zhou, X.1
Duan, X.2
Wang, D.3
-
14
-
-
84875624070
-
-
K. Maeno, Q. Sun, Sh.-F. Chang, and M. Suto, New semi-fragile image authentication watermarking techniques using random bias and non-uniform, quantization, Security and Watermarking of Multimedia Contents IV, 4657, E. J. DeIp III, P. W. Wong, San Jose, CA, pp. 659-670, (2002).
-
K. Maeno, Q. Sun, Sh.-F. Chang, and M. Suto, "New semi-fragile image authentication watermarking techniques using random bias and non-uniform, quantization," Security and Watermarking of Multimedia Contents IV, Vol. 4657, E. J. DeIp III, P. W. Wong, San Jose, CA, pp. 659-670, (2002).
-
-
-
-
15
-
-
0036448095
-
Semi-fragile authentication using generic wavelet domain features and ECC
-
Rochester, NY, pp
-
Q. Sun and S.-F. Chang, "Semi-fragile authentication using generic wavelet domain features and ECC," IEEE Int. Conf. on Image Processing, Vol. 2, Rochester, NY, pp. 901-904 (2002).
-
(2002)
IEEE Int. Conf. on Image Processing
, vol.2
, pp. 901-904
-
-
Sun, Q.1
Chang, S.-F.2
-
16
-
-
0032291652
-
Joint wavelet compression and authentication watermarking
-
Chicago, pp
-
L. Xie and G. R. Arce, "Joint wavelet compression and authentication watermarking," Int. Conf. on Image Processing, Vol. 2, Chicago, pp. 427-431 (1998).
-
(1998)
Int. Conf. on Image Processing
, vol.2
, pp. 427-431
-
-
Xie, L.1
Arce, G.R.2
-
17
-
-
0035333687
-
Quantization index modulation, a class of provably good methods for digital watermarking and information embedding
-
B. Chen and G. W. Wornell, "Quantization index modulation, a class of provably good methods for digital watermarking and information embedding," IEEE Trans. Inf. Theory 47(4), pp. 1423-1443 (2001).
-
(2001)
IEEE Trans. Inf. Theory
, vol.47
, Issue.4
, pp. 1423-1443
-
-
Chen, B.1
Wornell, G.W.2
-
18
-
-
21244463550
-
Content-based watermarking scheme for image authentication
-
Kunming, China, pp
-
S. Yu, Y. Hu and J. Zhou, "Content-based watermarking scheme for image authentication," 8th Int. Conf. on Control, Automation, Robotics and Vision, Vol. 2, Kunming, China, pp. 1083-1087 (2004).
-
(2004)
8th Int. Conf. on Control, Automation, Robotics and Vision
, vol.2
, pp. 1083-1087
-
-
Yu, S.1
Hu, Y.2
Zhou, J.3
|