-
1
-
-
33845650685
-
Multipurpose video watermarking algorithm in the hybrid compressed domain
-
Z. M. Lu, Y. N. Li, H. X. Wang and S. H. Sun, Multipurpose video watermarking algorithm in the hybrid compressed domain, Proc. of IEE Information Security, vol. 153, no. 4, pp. 173-182, 2006.
-
(2006)
Proc. of IEE Information Security
, vol.153
, Issue.4
, pp. 173-182
-
-
Lu, Z.M.1
Li, Y.N.2
Wang, H.X.3
Sun, S.H.4
-
2
-
-
33748114344
-
Security of autoregressive speech watermarking model under guessing attack
-
B. Yan, Z. M. Lu and S. H. Sun, Security of autoregressive speech watermarking model under guessing attack, IEEE Transactions on Information Forensics and Security, vol. 1, no. 3, pp. 386-390, 2006.
-
(2006)
IEEE Transactions on Information Forensics and Security
, vol.1
, Issue.3
, pp. 386-390
-
-
Yan, B.1
Lu, Z.M.2
Sun, S.H.3
-
3
-
-
20444378085
-
Multipurpose image watermarking algorithm based on multistage vector quantization
-
Z. M. Lu, D. G. Xu and S. H. Sun, Multipurpose image watermarking algorithm based on multistage vector quantization, IEEE Transactions on Image Processing, vol. 14, no. 6, pp. 822-831, 2005.
-
(2005)
IEEE Transactions on Image Processing
, vol.14
, Issue.6
, pp. 822-831
-
-
Lu, Z.M.1
Xu, D.G.2
Sun, S.H.3
-
4
-
-
44549085133
-
A survey of digital vector map watermarking
-
X. M. Niu, C. Y. Shao and X. T. Wang, A survey of digital vector map watermarking, International Journal of Innovative Computing, Information and Control, vol. 2, no. 6, pp. 1301-1316, 2006.
-
(2006)
International Journal of Innovative Computing, Information and Control
, vol.2
, Issue.6
, pp. 1301-1316
-
-
Niu, X.M.1
Shao, C.Y.2
Wang, X.T.3
-
5
-
-
63849234523
-
An image watermarking scheme with tamper detection and recovery
-
S. D. Lin, Y. C. Kuo and M. H. Yao, An image watermarking scheme with tamper detection and recovery, International Journal of Innovative Computing, Information and Control, vol. 3, no. 6(A), pp. 1379-1387, 2007.
-
(2007)
International Journal of Innovative Computing, Information and Control
, vol.3
, Issue.6 A
, pp. 1379-1387
-
-
Lin, S.D.1
Kuo, Y.C.2
Yao, M.H.3
-
6
-
-
0034444578
-
Robust image hashing
-
R. Venkatesan, S. M. Koon, M. H. Jakubowski and P. Moulin, Robust image hashing, Proc. of the IEEE International Conference on Image Processing, pp. 664-666, 2000.
-
(2000)
Proc. of the IEEE International Conference on Image Processing
, pp. 664-666
-
-
Venkatesan, R.1
Koon, S.M.2
Jakubowski, M.H.3
Moulin, P.4
-
7
-
-
0037818310
-
Structural digital signature for image authentication
-
C. S. Lu and H. Y. M. Liao, Structural digital signature for image authentication, IEEE Transactions on Multimedia, vol. 5, no. 3, pp. 161-173, 2003.
-
(2003)
IEEE Transactions on Multimedia
, vol.5
, Issue.3
, pp. 161-173
-
-
Lu, C.S.1
Liao, H.Y.M.2
-
9
-
-
33750344108
-
Perceptual image hashing via feature points: Performance evaluation and tradeoffs
-
V. Monga and B. L. Evans, Perceptual image hashing via feature points: Performance evaluation and tradeoffs, IEEE Transactions on Image Processing, vol. 15, no. 11, pp. 3453-3466, 2006.
-
(2006)
IEEE Transactions on Image Processing
, vol.15
, Issue.11
, pp. 3453-3466
-
-
Monga, V.1
Evans, B.L.2
-
10
-
-
33645004781
-
A clustering based approach to perceptual image hashing
-
V. Monga, A. Banerjee and B. L. Evans, A clustering based approach to perceptual image hashing, IEEE Transactions on Information Forensics and Security, vol. 1, no. 1, pp. 68-79, 2006.
-
(2006)
IEEE Transactions on Information Forensics and Security
, vol.1
, Issue.1
, pp. 68-79
-
-
Monga, V.1
Banerjee, A.2
Evans, B.L.3
-
11
-
-
34548085689
-
Robust and secure image hashing via non-negative matrix factorizations
-
V. Monga and M. K. Minçak, Robust and secure image hashing via non-negative matrix factorizations, IEEE Transactions on Information Forensics and Security, vol. 2, no. 3, pp. 376-390, 2007.
-
(2007)
IEEE Transactions on Information Forensics and Security
, vol.2
, Issue.3
, pp. 376-390
-
-
Monga, V.1
Minçak, M.K.2
-
12
-
-
0036630133
-
A VQ-based robust multi-watermarking algorithm
-
H. C. Huang, F. H. Wang and J. S. Pan, A VQ-based robust multi-watermarking algorithm, IEICE Transactions on Fundamental, vol. E85-A, no. 7, pp. 1719-1726, 2002.
-
(2002)
IEICE Transactions on Fundamental
, vol.E85-A
, Issue.7
, pp. 1719-1726
-
-
Huang, H.C.1
Wang, F.H.2
Pan, J.S.3
-
13
-
-
56449113168
-
Adaptive data-dependent matrix norm based Gaussian kernel for facial feature extraction
-
J. Li, S. C. Chu, J. Ho and J. S. Pan, Adaptive data-dependent matrix norm based gaussian kernel for facial feature extraction, International Journal of Innovative Computing, Information and Control, vol. 3, no. 5, pp. 1263-1272, 2007.
-
(2007)
International Journal of Innovative Computing, Information and Control
, vol.3
, Issue.5
, pp. 1263-1272
-
-
Li, J.1
Chu, S.C.2
Ho, J.3
Pan, J.S.4
-
14
-
-
63449125961
-
Image detection based on susan method and integrated feature matching
-
M. Y. Weng and M. Y. He, Image detection based on Susan method and integrated feature matching, International Journal of Innovative Computing, Information and Control, vol. 4, no. 3, pp. 671-680, 2008.
-
(2008)
International Journal of Innovative Computing, Information and Control
, vol.4
, Issue.3
, pp. 671-680
-
-
Weng, M.Y.1
He, M.Y.2
-
15
-
-
48249148975
-
Face detection and tracking utilizing enhanced camshift model
-
S. K. Alex, and L. Y. Kang, Face detection and tracking utilizing enhanced camshift model, International Journal of Innovative Computing, Information and Control, vol. 3, no. 3, pp. 597-608, 2007.
-
(2007)
International Journal of Innovative Computing, Information and Control
, vol.3
, Issue.3
, pp. 597-608
-
-
Alex, S.K.1
Kang, L.Y.2
-
16
-
-
45149091985
-
Neural networks based system identification techniques for model based fault detection of nonlinear systems
-
A. Fekih, H. Xu and F. Chowdhury, Neural networks based system identification techniques for model based fault detection of nonlinear systems, International Journal of Innovative Computing, Information and Control, vol. 3, no. 5, pp. 1073-1085, 2007.
-
(2007)
International Journal of Innovative Computing, Information and Control
, vol.3
, Issue.5
, pp. 1073-1085
-
-
Fekih, A.1
Xu, H.2
Chowdhury, F.3
|