-
1
-
-
11244354474
-
Hierarchical watermarking scheme for image authentication and recovery
-
June
-
P. Lin, C. Hsieh, P. Huang, Hierarchical watermarking scheme for image authentication and recovery, in: IEEE Int. Conf. Multimedia Expo., June 2004, pp. 963-966.
-
(2004)
IEEE Int. Conf. Multimedia Expo
, pp. 963-966
-
-
Lin, P.1
Hsieh, C.2
Huang, P.3
-
2
-
-
67649097476
-
Image authentication using content base watermark
-
May
-
H. Liu, J. Lin, J. Huang, Image authentication using content base watermark, in: IEEE Int. Symp. Circ. Syst., May 2005, pp. 4014-4017.
-
(2005)
IEEE Int. Symp. Circ. Syst
, pp. 4014-4017
-
-
Liu, H.1
Lin, J.2
Huang, J.3
-
3
-
-
0036627368
-
A survey of watermarking algorithms for image authentication
-
Rey C., and Dugelay J. A survey of watermarking algorithms for image authentication. EURASIP J. Appl. Signal Proc. 1 (2002) 613-621
-
(2002)
EURASIP J. Appl. Signal Proc.
, Issue.1
, pp. 613-621
-
-
Rey, C.1
Dugelay, J.2
-
4
-
-
48149093483
-
Robust hash for detecting and localizing image tampering
-
Oct
-
S. Roy, Q. Sun, Robust hash for detecting and localizing image tampering, in: IEEE Int. Conf. Image Proc., Oct. 2007, pp. 117-120.
-
(2007)
IEEE Int. Conf. Image Proc
, pp. 117-120
-
-
Roy, S.1
Sun, Q.2
-
5
-
-
0033688392
-
Semi-fragile watermarking for authenticating JPEG visual content
-
Lin C.Y., and Chang S.F. Semi-fragile watermarking for authenticating JPEG visual content. Proc. SPIE 3971 (2000)
-
(2000)
Proc. SPIE
, vol.3971
-
-
Lin, C.Y.1
Chang, S.F.2
-
7
-
-
0032308292
-
Compression tolerant image authentication
-
Oct
-
S. Bhattacharjee, M. Kutter, Compression tolerant image authentication, in: IEEE Int. Conf. Image Proc., vol. 1, Oct. 1998, pp. 435-439.
-
(1998)
IEEE Int. Conf. Image Proc
, vol.1
, pp. 435-439
-
-
Bhattacharjee, S.1
Kutter, M.2
-
8
-
-
50049118062
-
Fragile watermark for tamper detection using structural distortion
-
June
-
P. Thangavel, T. Kumaran, Fragile watermark for tamper detection using structural distortion, in: IEEE Int. Symp. Ind. Electron., June 2007, pp. 1755-1760.
-
(2007)
IEEE Int. Symp. Ind. Electron
, pp. 1755-1760
-
-
Thangavel, P.1
Kumaran, T.2
-
10
-
-
0035159824
-
A hierarchical image authentication watermark with improved localization and security
-
Oct
-
M. Celik, G. Sharma, E. Saber, A. Tekalp, A hierarchical image authentication watermark with improved localization and security, in: IEEE Int. Conf. Image Proc., Oct. 2001, pp. 502-505.
-
(2001)
IEEE Int. Conf. Image Proc
, pp. 502-505
-
-
Celik, M.1
Sharma, G.2
Saber, E.3
Tekalp, A.4
-
11
-
-
33845582720
-
Region of interest fragile watermarking for image authentication
-
Comput. Sci, June
-
Y. Chu, Y. Zhang, S. Zhang, X. Ye, Region of interest fragile watermarking for image authentication, in: IEEE First Int. Multi-Symp. Comput. Comput. Sci., June 2006, pp. 726-731.
-
(2006)
IEEE First Int. Multi-Symp. Comput
, pp. 726-731
-
-
Chu, Y.1
Zhang, Y.2
Zhang, S.3
Ye, X.4
-
12
-
-
20844440573
-
A fragile watermarking scheme for image authentication with localization and recovery
-
Dec
-
P. Lin, P. Huang, A. Peng, A fragile watermarking scheme for image authentication with localization and recovery, in: IEEE Proc. Sixth Int. Symp. Multimedia Soft. Eng., Dec. 2004, pp. 146-153.
-
(2004)
IEEE Proc. Sixth Int. Symp. Multimedia Soft. Eng
, pp. 146-153
-
-
Lin, P.1
Huang, P.2
Peng, A.3
-
13
-
-
21544477794
-
Fragile blockwise image authentication thwarting vector quantization attack
-
Dec
-
Y. Hasan, A. Hassan, Fragile blockwise image authentication thwarting vector quantization attack, in: IEEE Proc. Fourth Int. Symp. Signal Proc. Info. Tech., Dec. 2004, pp. 530-533.
-
(2004)
IEEE Proc. Fourth Int. Symp. Signal Proc. Info. Tech
, pp. 530-533
-
-
Hasan, Y.1
Hassan, A.2
-
14
-
-
48149085381
-
Compensated signature embedding based multimedia content authentication system
-
Sept
-
S. Ababneh, A. Khokhar, R. Ansari, Compensated signature embedding based multimedia content authentication system, in: IEEE Int. Conf. Image Proc., Sept. 2007, pp. 393-396.
-
(2007)
IEEE Int. Conf. Image Proc
, pp. 393-396
-
-
Ababneh, S.1
Khokhar, A.2
Ansari, R.3
-
15
-
-
51549110367
-
Improved image authentication using closed-form compensation and spread-spectrum watermarking
-
ICASSP, Apr
-
S. Ababneh, R. Ansari, A. Khokhar, Improved image authentication using closed-form compensation and spread-spectrum watermarking, in: IEEE Int. Conf. Acoustics, Speech, Signal Proc. (ICASSP), Apr. 2008.
-
(2008)
IEEE Int. Conf. Acoustics, Speech, Signal Proc
-
-
Ababneh, S.1
Ansari, R.2
Khokhar, A.3
-
16
-
-
0003968346
-
-
John Wiley and Sons, Inc
-
H. Stark Y. Yang, Vector Space Projections: A Numerical Ppproach to Signal and Image Processing, Neural Nets, and Optics, John Wiley and Sons, Inc., 1998.
-
(1998)
Vector Space Projections: A Numerical Ppproach to Signal and Image Processing, Neural Nets, and Optics
-
-
Stark, H.1
Yang, Y.2
-
17
-
-
0020191832
-
Image restoration by the method of convex projections: Part 1-Theory
-
Youla D., and Webb H. Image restoration by the method of convex projections: Part 1-Theory. IEEE Trans. Med. Imaging 1 2 (1982) 81-94
-
(1982)
IEEE Trans. Med. Imaging
, vol.1
, Issue.2
, pp. 81-94
-
-
Youla, D.1
Webb, H.2
-
18
-
-
33845635183
-
A set theoretic framework for watermarking and its application to semifragile tamper detection
-
Altun O., Sharma G., Celik M., and Bocko M. A set theoretic framework for watermarking and its application to semifragile tamper detection. IEEE Trans. Inform. Forensics Security 1 4 (2006) 479-492
-
(2006)
IEEE Trans. Inform. Forensics Security
, vol.1
, Issue.4
, pp. 479-492
-
-
Altun, O.1
Sharma, G.2
Celik, M.3
Bocko, M.4
-
19
-
-
0027541192
-
The Foundations of Set Theoretic Estimation
-
Combettes F.L. The Foundations of Set Theoretic Estimation. Proc. IEEE 81 2 (1993) 182-208
-
(1993)
Proc. IEEE
, vol.81
, Issue.2
, pp. 182-208
-
-
Combettes, F.L.1
-
21
-
-
33646870544
-
Quality-aware images
-
Wang Z., Wu G., Sheikh H., Simoncelli E., and Yang E. Quality-aware images. IEEE Trans. Image Proc. 15 (2006) 1680-1689
-
(2006)
IEEE Trans. Image Proc.
, vol.15
, pp. 1680-1689
-
-
Wang, Z.1
Wu, G.2
Sheikh, H.3
Simoncelli, E.4
Yang, E.5
-
22
-
-
0035333687
-
Quantization index modulation: a class of provably good methods for digital watermarking and information embedding
-
Chen B., and Wornell G. Quantization index modulation: a class of provably good methods for digital watermarking and information embedding. IEEE Trans. Inform. Theory 47 4 (2001) 1423-1443
-
(2001)
IEEE Trans. Inform. Theory
, vol.47
, Issue.4
, pp. 1423-1443
-
-
Chen, B.1
Wornell, G.2
-
23
-
-
0003968504
-
-
Watson A. (Ed), MIT Press, Cambridge, MA
-
In: Watson A. (Ed). Digital Images and Human Vision (1993), MIT Press, Cambridge, MA
-
(1993)
Digital Images and Human Vision
-
-
-
24
-
-
33745613004
-
JPEG2000 encoding with perceptual distortion control
-
Zhen L., Karam L., and Watson A. JPEG2000 encoding with perceptual distortion control. IEEE Trans. Image Process. 15 7 (2006) 1763-1778
-
(2006)
IEEE Trans. Image Process.
, vol.15
, Issue.7
, pp. 1763-1778
-
-
Zhen, L.1
Karam, L.2
Watson, A.3
-
25
-
-
0034172308
-
Perceptual coding of digital audio
-
Painter T., and Spanias A. Perceptual coding of digital audio. Proc. IEEE 88 4 (2000) 451-515
-
(2000)
Proc. IEEE
, vol.88
, Issue.4
, pp. 451-515
-
-
Painter, T.1
Spanias, A.2
-
26
-
-
65649119126
-
-
Available online
-
Available online: .
-
-
-
|