-
1
-
-
11244266383
-
The trustworthy digital camera: Restoring credibility to the photographic image
-
Chicago, IL, USA
-
G.I. Friedman, The trustworthy digital camera: restoring credibility to the photographic image, in: Proceedings of the IEEE International Conference on Image Processing, vol. II, Chicago, IL, USA, 1998, pp. 409-413.
-
(1998)
Proceedings of the IEEE International Conference on Image Processing
, vol.2
, pp. 409-413
-
-
Friedman, G.I.1
-
2
-
-
0032650557
-
Content-based digital signature for motion pictures authentication and content-fragile watermarking
-
Italy
-
J. Dittmann, A. Steinmetz, R. Steinmetz, Content-based digital signature for motion pictures authentication and content-fragile watermarking, in: IEEE International Conference on Multimedia Computing and Systems, vol. II, Italy, 1999, pp. 209-213.
-
(1999)
IEEE International Conference on Multimedia Computing and Systems
, vol.2
, pp. 209-213
-
-
Dittmann, J.1
Steinmetz, A.2
Steinmetz, R.3
-
3
-
-
0032223822
-
A robust image authentication method surviving JPEG lossy compression
-
Lin C.Y., and Chang S.F. A robust image authentication method surviving JPEG lossy compression. SPIE Storage Retr. Image/Video Databases (1998) 296-307
-
(1998)
SPIE Storage Retr. Image/Video Databases
, pp. 296-307
-
-
Lin, C.Y.1
Chang, S.F.2
-
4
-
-
0035248504
-
A robust image authentication method distinguishing JPEG compression from malicious manipulation
-
Lin C.Y., and Chang S.F. A robust image authentication method distinguishing JPEG compression from malicious manipulation. IEEE Trans. Circuits Syst. Video Technol. 11 2 (2001) 153-168
-
(2001)
IEEE Trans. Circuits Syst. Video Technol.
, vol.11
, Issue.2
, pp. 153-168
-
-
Lin, C.Y.1
Chang, S.F.2
-
5
-
-
0036611838
-
Hierarchical watermarking for secure image authentication with localization
-
Celik M.U., Sharma G., Saber E., and Tekalp A.M. Hierarchical watermarking for secure image authentication with localization. IEEE Trans. Image Process. 11 6 (2002) 585-594
-
(2002)
IEEE Trans. Image Process.
, vol.11
, Issue.6
, pp. 585-594
-
-
Celik, M.U.1
Sharma, G.2
Saber, E.3
Tekalp, A.M.4
-
6
-
-
33645152302
-
Lossless watermarking for image authentication: a new framework and an implementation
-
Celik M.U., Sharma G., and Tekalp A.M. Lossless watermarking for image authentication: a new framework and an implementation. IEEE Trans. Image Process. 15 4 (2006) 1042-1049
-
(2006)
IEEE Trans. Image Process.
, vol.15
, Issue.4
, pp. 1042-1049
-
-
Celik, M.U.1
Sharma, G.2
Tekalp, A.M.3
-
7
-
-
0032292847
-
Image watermarking for tamper detection
-
Chicago, IL, USA
-
J. Fridrich, Image watermarking for tamper detection, in: Proceedings of the IEEE International Conference on Image Processing, vol. II, Chicago, IL, USA, 1998, pp. 404-408.
-
(1998)
Proceedings of the IEEE International Conference on Image Processing
, vol.2
, pp. 404-408
-
-
Fridrich, J.1
-
8
-
-
0034443602
-
New fragile authentication watermark for images
-
Vancouver, BC, Canada
-
J. Fridrich, M. Goljan, A.C. Baldoza, New fragile authentication watermark for images, in: Proceedings of the IEEE International Conference on Image Processing, Vancouver, BC, Canada, 2000, pp. 10-13.
-
(2000)
Proceedings of the IEEE International Conference on Image Processing
, pp. 10-13
-
-
Fridrich, J.1
Goljan, M.2
Baldoza, A.C.3
-
9
-
-
0035473830
-
Multipurpose watermarking for image authentication and protection
-
Lu C.S., and Liao H.Y.M. Multipurpose watermarking for image authentication and protection. IEEE Trans. Image Process. 10 (2001) 435-439
-
(2001)
IEEE Trans. Image Process.
, vol.10
, pp. 435-439
-
-
Lu, C.S.1
Liao, H.Y.M.2
-
10
-
-
31344433959
-
New semi-fragile images authentication watermarking techniques using random bias and nonuniform quantization
-
Maeno K., Sun Q., and Chang S.F. New semi-fragile images authentication watermarking techniques using random bias and nonuniform quantization. IEEE Trans. Multimed. 8 1 (2006) 32-45
-
(2006)
IEEE Trans. Multimed.
, vol.8
, Issue.1
, pp. 32-45
-
-
Maeno, K.1
Sun, Q.2
Chang, S.F.3
-
12
-
-
0035473831
-
Secret and public key image watermarking schemes for image authentication and ownership verification
-
Wong P.W., and Memon N. Secret and public key image watermarking schemes for image authentication and ownership verification. IEEE Trans. Image Process. 10 10 (2001) 1593-1601
-
(2001)
IEEE Trans. Image Process.
, vol.10
, Issue.10
, pp. 1593-1601
-
-
Wong, P.W.1
Memon, N.2
-
13
-
-
0033688392
-
-
C.Y. Lin, S.F. Chang, Semi-fragile watermarking for authenticating JPEG visual content, in: SPIE International Conference on Security and Watermarking of Multimedia Contents II, 3971 (13), EI '00, San Jose, USA, January 2000.
-
C.Y. Lin, S.F. Chang, Semi-fragile watermarking for authenticating JPEG visual content, in: SPIE International Conference on Security and Watermarking of Multimedia Contents II, vol. 3971 (13), EI '00, San Jose, USA, January 2000.
-
-
-
-
15
-
-
0033717154
-
Detection of image alterations using semi-fragile watermarks
-
San Jose, CA, USA
-
E.T. Lin, I. Christine, B. Podilchuk, E.J. Delp, Detection of image alterations using semi-fragile watermarks, in: Proceedings of the SPIE International Conference on Security and Watermarking of Multimedia Contents II, vol. 3971, San Jose, CA, USA, 2000.
-
(2000)
Proceedings of the SPIE International Conference on Security and Watermarking of Multimedia Contents II
, vol.3971
-
-
Lin, E.T.1
Christine, I.2
Podilchuk, B.3
Delp, E.J.4
-
16
-
-
0037426973
-
Semi-fragile image watermarking method based on index constrained vector quantization
-
Lu Z.M., Liu C.H., and Xu D.G. Semi-fragile image watermarking method based on index constrained vector quantization. Electron Lett. 39 1 (2003) 35-36
-
(2003)
Electron Lett.
, vol.39
, Issue.1
, pp. 35-36
-
-
Lu, Z.M.1
Liu, C.H.2
Xu, D.G.3
-
17
-
-
0035927557
-
Efficient and robust watermarking algorithm with vector quantization
-
Huang H.C., Wang F.H., and Pan J.S. Efficient and robust watermarking algorithm with vector quantization. Electron. Lett. 37 13 (2001) 826-828
-
(2001)
Electron. Lett.
, vol.37
, Issue.13
, pp. 826-828
-
-
Huang, H.C.1
Wang, F.H.2
Pan, J.S.3
-
18
-
-
0032075445
-
Robust image watermarking in the spatial domain
-
Nikolaidis N., and Pitas I. Robust image watermarking in the spatial domain. Signal Process. 66 3 (1998) 385-403
-
(1998)
Signal Process.
, vol.66
, Issue.3
, pp. 385-403
-
-
Nikolaidis, N.1
Pitas, I.2
-
19
-
-
0141638482
-
A DWT-DFT composite watermarking scheme robust to both affine transform and JPEG compression
-
Kang X., Huang J., Shi Y.Q., and Lin Y. A DWT-DFT composite watermarking scheme robust to both affine transform and JPEG compression. IEEE Trans. Circuits Syst. Video Technol. 13 8 (2003) 776-786
-
(2003)
IEEE Trans. Circuits Syst. Video Technol.
, vol.13
, Issue.8
, pp. 776-786
-
-
Kang, X.1
Huang, J.2
Shi, Y.Q.3
Lin, Y.4
-
20
-
-
10644225222
-
A robust watermarking scheme using phase shift keying with the combination of amplitude boost and low amplitude block selection
-
Chen W.Y., and Chen C.H. A robust watermarking scheme using phase shift keying with the combination of amplitude boost and low amplitude block selection. Pattern Recognition 38 4 (2005) 587-598
-
(2005)
Pattern Recognition
, vol.38
, Issue.4
, pp. 587-598
-
-
Chen, W.Y.1
Chen, C.H.2
-
21
-
-
0034776206
-
Image tamper detection and recovery system based on discrete wavelet transform
-
August
-
K.F. Li, T.S. Chen, S.C. Wu, Image tamper detection and recovery system based on discrete wavelet transform, in: IEEE Pacific Rim Conference on Communications, Computers and Signal Processing, vol. 1, August 2001, pp. 164-167.
-
(2001)
IEEE Pacific Rim Conference on Communications, Computers and Signal Processing
, vol.1
, pp. 164-167
-
-
Li, K.F.1
Chen, T.S.2
Wu, S.C.3
-
22
-
-
20844440573
-
A fragile watermarking scheme for image authentication with localization and recovery
-
December
-
P.L. Lin, P.W. Huang, A.W. Peng, A fragile watermarking scheme for image authentication with localization and recovery, in: IEEE Sixth International Symposium on Multimedia Software Engineering, 13-15 December 2004, pp. 146-153.
-
(2004)
IEEE Sixth International Symposium on Multimedia Software Engineering, 13-15
, pp. 146-153
-
-
Lin, P.L.1
Huang, P.W.2
Peng, A.W.3
-
23
-
-
25144448272
-
A hierarchical digital watermarking method for image tamper detection and recovery
-
Lin P.L., Hsieh C.K., and Huang P.W. A hierarchical digital watermarking method for image tamper detection and recovery. Pattern Recognition 38 (2005) 2519-2529
-
(2005)
Pattern Recognition
, vol.38
, pp. 2519-2529
-
-
Lin, P.L.1
Hsieh, C.K.2
Huang, P.W.3
-
24
-
-
33744482068
-
Detecting and restoring system of tampered image based on discrete wavelet transformation and block truncation coding
-
C.L. Wang, R.H. Hwang, T.S. Chen, H.Y. Lee, Detecting and restoring system of tampered image based on discrete wavelet transformation and block truncation coding, in: 19th International Conference on Advanced Information Networking and Applications, 2005.
-
(2005)
19th International Conference on Advanced Information Networking and Applications
-
-
Wang, C.L.1
Hwang, R.H.2
Chen, T.S.3
Lee, H.Y.4
-
25
-
-
48149100935
-
Dual watermark for image tamper detection and recovery
-
Lee T.Y., and Lin S.D. Dual watermark for image tamper detection and recovery. Pattern Recognition 41 (2008) 3497-3506
-
(2008)
Pattern Recognition
, vol.41
, pp. 3497-3506
-
-
Lee, T.Y.1
Lin, S.D.2
-
26
-
-
34848924292
-
Automatic image authentication and recovery using fractal code embedding and image inpainting
-
Wang S.S., and Tsai S.L. Automatic image authentication and recovery using fractal code embedding and image inpainting. Pattern Recognition 41 (2008) 701-712
-
(2008)
Pattern Recognition
, vol.41
, pp. 701-712
-
-
Wang, S.S.1
Tsai, S.L.2
-
27
-
-
34848926024
-
Four-scanning attack on hierarchical digital watermarking method for image tamper detection and recovery
-
Chang C.C., Fan Y.H., and Tai W.L. Four-scanning attack on hierarchical digital watermarking method for image tamper detection and recovery. Pattern Recognition 41 (2008) 654-661
-
(2008)
Pattern Recognition
, vol.41
, pp. 654-661
-
-
Chang, C.C.1
Fan, Y.H.2
Tai, W.L.3
-
28
-
-
0003602325
-
The MD5 message digest algorithm
-
Technical Report
-
R.L. Rivest, The MD5 message digest algorithm, Technical Report, 1992.
-
(1992)
-
-
Rivest, R.L.1
-
29
-
-
0017930809
-
A method for obtaining digital signatures and public-key cryptosystems
-
Rivest R.L., Shamir A., and Adleman L. A method for obtaining digital signatures and public-key cryptosystems. Commun. ACM 21 (February 1978) 120-126
-
(1978)
Commun. ACM
, vol.21
, pp. 120-126
-
-
Rivest, R.L.1
Shamir, A.2
Adleman, L.3
-
30
-
-
0018918171
-
An algorithm for vector quantizer design
-
Linde Y., Buzo A., and Gray R.M. An algorithm for vector quantizer design. IEEE Trans. Commun. 28 1 (1980) 84-95
-
(1980)
IEEE Trans. Commun.
, vol.28
, Issue.1
, pp. 84-95
-
-
Linde, Y.1
Buzo, A.2
Gray, R.M.3
|