-
1
-
-
7644241281
-
-
Marcell Dekker Inc., New York pp. 461-485 (Chapter 18)
-
Miller M.L., Cox I.J., Linnartz J.-P.M.G., and Kalker T. A Review of Watermarking Principles and Practices (1999), Marcell Dekker Inc., New York pp. 461-485 (Chapter 18)
-
(1999)
A Review of Watermarking Principles and Practices
-
-
Miller, M.L.1
Cox, I.J.2
Linnartz, J.-P.M.G.3
Kalker, T.4
-
2
-
-
33645325673
-
Image watermarking based on invariant regions of scale-space representation
-
Seo J.S., and Yoo C.D. Image watermarking based on invariant regions of scale-space representation. IEEE Transactions on Signal Processing 54 4 (2006) 1537-1549
-
(2006)
IEEE Transactions on Signal Processing
, vol.54
, Issue.4
, pp. 1537-1549
-
-
Seo, J.S.1
Yoo, C.D.2
-
6
-
-
0035369792
-
Attack modelling: towards a second generation watermarking benchmark
-
Voloshynovskiy S., Pereira S., Iquise V., and Pun T. Attack modelling: towards a second generation watermarking benchmark. Signal Processing 81 6 (2001) 1177-1214
-
(2001)
Signal Processing
, vol.81
, Issue.6
, pp. 1177-1214
-
-
Voloshynovskiy, S.1
Pereira, S.2
Iquise, V.3
Pun, T.4
-
11
-
-
67651085822
-
Key-dependent JPEG2000-based robust hashing for secure image authentication
-
Gerold L., and Andreas U. Key-dependent JPEG2000-based robust hashing for secure image authentication. EURASIP Journal on Information Security 8 1 (2008) 1-19
-
(2008)
EURASIP Journal on Information Security
, vol.8
, Issue.1
, pp. 1-19
-
-
Gerold, L.1
Andreas, U.2
-
15
-
-
1542529865
-
A robust image fingerprinting system using the radon transform
-
Seo J.S., Haitsma J., Kalker T., and Yoo C.D. A robust image fingerprinting system using the radon transform. Signal Processing: Image Communication 19 4 (2004) 325-339
-
(2004)
Signal Processing: Image Communication
, vol.19
, Issue.4
, pp. 325-339
-
-
Seo, J.S.1
Haitsma, J.2
Kalker, T.3
Yoo, C.D.4
-
17
-
-
44449118772
-
Histogram-based image hashing scheme robust against geometric deformations
-
Xiang S., Kim H.-J., and Huang J. Histogram-based image hashing scheme robust against geometric deformations. Proceedings of ACM Workshop on Multimedia and Security, Dallas, Texas, USA (2007)
-
(2007)
Proceedings of ACM Workshop on Multimedia and Security, Dallas, Texas, USA
-
-
Xiang, S.1
Kim, H.-J.2
Huang, J.3
-
20
-
-
33750344108
-
Perceptual image hashing via feature points: performance evaluation and tradeoffs
-
Monga V., and Evans B.L. Perceptual image hashing via feature points: performance evaluation and tradeoffs. IEEE Transactions on Image Processing 15 11 (2006) 3452-3465
-
(2006)
IEEE Transactions on Image Processing
, vol.15
, Issue.11
, pp. 3452-3465
-
-
Monga, V.1
Evans, B.L.2
-
23
-
-
23344435690
-
Print-and-scan model and the watermarking countermeasure
-
Yu L., Niu X., and Sun S. Print-and-scan model and the watermarking countermeasure. Image and Vision Computing 23 9 (2005) 807-814
-
(2005)
Image and Vision Computing
, vol.23
, Issue.9
, pp. 807-814
-
-
Yu, L.1
Niu, X.2
Sun, S.3
-
28
-
-
67651114341
-
Robust and secure perceptual hashing method with diffusion capability
-
H. Zhang, Q. Li, X. Niu, Y. Wang, Robust and secure perceptual hashing method with diffusion capability, International Journal of Computer Sciences and Engineering Systems 3 (3) (2009).
-
(2009)
International Journal of Computer Sciences and Engineering Systems
, vol.3
, Issue.3
-
-
Zhang, H.1
Li, Q.2
Niu, X.3
Wang, Y.4
-
29
-
-
67651083939
-
-
USC Signal and Image Processing Institute, USC-SIPI image database
-
USC Signal and Image Processing Institute, USC-SIPI image database.
-
-
-
-
30
-
-
84870680281
-
-
The FERET database 〈http://www.itl.nist.gov/iad/humanid/feret/〉.
-
The FERET database
-
-
-
31
-
-
0034325435
-
Convergence of a hill climbing genetic algorithm for graph matching
-
Cross A., and Hancock E. Convergence of a hill climbing genetic algorithm for graph matching. Pattern Recognition 33 11 (2000) 1863-1880
-
(2000)
Pattern Recognition
, vol.33
, Issue.11
, pp. 1863-1880
-
-
Cross, A.1
Hancock, E.2
-
33
-
-
37849021856
-
Hill-climbing and brute-force attacks on biometric systems: a case study in match-on-card fingerprint verification
-
Martinez-Diaz M., Fierrez-Aguilar J., Alonso-Fernandez F., Ortega-Garcia J., and Siguenza J.A. Hill-climbing and brute-force attacks on biometric systems: a case study in match-on-card fingerprint verification. Proceedings of IEEE International Carnahan Conferences on Security Technology (2006) 151-159
-
(2006)
Proceedings of IEEE International Carnahan Conferences on Security Technology
, pp. 151-159
-
-
Martinez-Diaz, M.1
Fierrez-Aguilar, J.2
Alonso-Fernandez, F.3
Ortega-Garcia, J.4
Siguenza, J.A.5
-
34
-
-
37849008271
-
Bayesian hill-climbing attack and its application to signature verification
-
Springer, Berlin
-
Galbally J., Fierrez J., and Ortega-Garcia J. Bayesian hill-climbing attack and its application to signature verification. Advances in Biometrics, Lecture Notes in Computer Science vol. 4642 (2007), Springer, Berlin 386-395
-
(2007)
Advances in Biometrics, Lecture Notes in Computer Science
, vol.4642
, pp. 386-395
-
-
Galbally, J.1
Fierrez, J.2
Ortega-Garcia, J.3
-
35
-
-
0000277306
-
A fast discrete approximation algorithm for the radon transform
-
Martin L.B. A fast discrete approximation algorithm for the radon transform. SIAM Journal on Computing 27 1 (1998) 107-119
-
(1998)
SIAM Journal on Computing
, vol.27
, Issue.1
, pp. 107-119
-
-
Martin, L.B.1
-
36
-
-
44649181049
-
An improved SVD-based watermarking scheme for protecting rightful ownership
-
Mohammad A.A., Alhaja A., and Shaltaf S. An improved SVD-based watermarking scheme for protecting rightful ownership. Signal Processing 88 9 (2008) 2158-2180
-
(2008)
Signal Processing
, vol.88
, Issue.9
, pp. 2158-2180
-
-
Mohammad, A.A.1
Alhaja, A.2
Shaltaf, S.3
-
37
-
-
57749202706
-
Fragile watermarking scheme using a hierarchical mechanism
-
Zhang X., and Wang S. Fragile watermarking scheme using a hierarchical mechanism. Signal Processing 89 4 (2009) 675-679
-
(2009)
Signal Processing
, vol.89
, Issue.4
, pp. 675-679
-
-
Zhang, X.1
Wang, S.2
-
38
-
-
57849157961
-
A highly robust audio fingerprinting system with an efficient search strategy
-
Haitsma J., and Kalker T. A highly robust audio fingerprinting system with an efficient search strategy. Journal of New Music Research 32 2 (2003) 211-221
-
(2003)
Journal of New Music Research
, vol.32
, Issue.2
, pp. 211-221
-
-
Haitsma, J.1
Kalker, T.2
-
39
-
-
33645656961
-
Face biometrics with renewable templates
-
van der Veen M., Kevenaar T., Schrijen G.-J., Akkermans T.H., and Zuo F. Face biometrics with renewable templates. Proceedings of SPIE vol. 6072 (2006) 205-216
-
(2006)
Proceedings of SPIE
, vol.6072
, pp. 205-216
-
-
van der Veen, M.1
Kevenaar, T.2
Schrijen, G.-J.3
Akkermans, T.H.4
Zuo, F.5
|