-
1
-
-
0035473831
-
Secret and public key image watermarking schemes for image authentication and ownership verification
-
Wong, P., Memon, N.: Secret and public key image watermarking schemes for image authentication and ownership verification. IEEE Trans. Image process. 10(10), 1593-1601 (2001)
-
(2001)
IEEE Trans. Image process
, vol.10
, Issue.10
, pp. 1593-1601
-
-
Wong, P.1
Memon, N.2
-
2
-
-
33749166906
-
Multiscale fragile watermarking based on the Gaussian mixture model
-
Yuan, H., Zhang, X.-P.: Multiscale fragile watermarking based on the Gaussian mixture model. IEEE Trans. Image process. 15(10), 3189-3200 (2006)
-
(2006)
IEEE Trans. Image process
, vol.15
, Issue.10
, pp. 3189-3200
-
-
Yuan, H.1
Zhang, X.-P.2
-
3
-
-
34548765996
-
Statistical fragile watermarking capable of locating individual tampered pixels
-
Zhang, X., Wang, S.: Statistical fragile watermarking capable of locating individual tampered pixels. IEEE Signal Process. Lett. 14(10), 727-731 (2007)
-
(2007)
IEEE Signal Process. Lett
, vol.14
, Issue.10
, pp. 727-731
-
-
Zhang, X.1
Wang, S.2
-
4
-
-
56749105694
-
-
He, H.-J., Zhang, J.-S., Tai, H.-M.: Block-chain Based fragial watermarking Scheme with Superior Localization. In: Solanki, K., Sullivan, K., Madhow, U. (eds.) IH 2008. LNCS, 5284, pp. 147-160. Springer, Heidelberg (2008)
-
He, H.-J., Zhang, J.-S., Tai, H.-M.: Block-chain Based fragial watermarking Scheme with Superior Localization. In: Solanki, K., Sullivan, K., Madhow, U. (eds.) IH 2008. LNCS, vol. 5284, pp. 147-160. Springer, Heidelberg (2008)
-
-
-
-
5
-
-
0032648596
-
Digital watermarking for telltale tamper proofing and authentication
-
Kundur, D., Hatzinakos, D.: Digital watermarking for telltale tamper proofing and authentication. Proceedings of IEEE 87(7), 1167-1180 (1999)
-
(1999)
Proceedings of IEEE
, vol.87
, Issue.7
, pp. 1167-1180
-
-
Kundur, D.1
Hatzinakos, D.2
-
7
-
-
25144448272
-
A hierarchical digital watermarking method for image tamper detection and recovery
-
Lin, P.L., Hsieh, C.K., Huang, P.W.: A hierarchical digital watermarking method for image tamper detection and recovery. Pattern Recognition 38(12), 2519-2529 (2005)
-
(2005)
Pattern Recognition
, vol.38
, Issue.12
, pp. 2519-2529
-
-
Lin, P.L.1
Hsieh, C.K.2
Huang, P.W.3
-
8
-
-
34248661818
-
A majority-voting based watermarking scheme for color image tamper detection and recovery
-
Wang, M.S., Chen, W.C.: A majority-voting based watermarking scheme for color image tamper detection and recovery. Computer Standards & Interfaces 29(5), 561-570 (2007)
-
(2007)
Computer Standards & Interfaces
, vol.29
, Issue.5
, pp. 561-570
-
-
Wang, M.S.1
Chen, W.C.2
-
9
-
-
48149100935
-
Dual watermark for image tamper detection and recovery
-
Lee, T.-Y., Lin, S.D.: Dual watermark for image tamper detection and recovery. Pattern Recognition 41, 3497-3506 (2008)
-
(2008)
Pattern Recognition
, vol.41
, pp. 3497-3506
-
-
Lee, T.-Y.1
Lin, S.D.2
-
10
-
-
0033872149
-
Counterfeiting attacks on oblivious block-wise independent invisible watermarking schemes
-
Holliman, M., Memon, N.: Counterfeiting attacks on oblivious block-wise independent invisible watermarking schemes. IEEE Trans. Image Processing 9(3), 432-441 (2000)
-
(2000)
IEEE Trans. Image Processing
, vol.9
, Issue.3
, pp. 432-441
-
-
Holliman, M.1
Memon, N.2
-
11
-
-
0036530306
-
Cryptanalysis of the Yeung-Mintzer fragile watermarking technique
-
Fridrich, J., Goljan, M., Memon, N.: Cryptanalysis of the Yeung-Mintzer fragile watermarking technique. J. Electronic Imaging 11, 262-274 (2002)
-
(2002)
J. Electronic Imaging
, vol.11
, pp. 262-274
-
-
Fridrich, J.1
Goljan, M.2
Memon, N.3
-
12
-
-
34848926024
-
Four-scanning attack on hierarchical digital watermark-ing method for image tamper detection and recovery
-
Chang, C., Fan, Y.-H., Tai, W.-L.: Four-scanning attack on hierarchical digital watermark-ing method for image tamper detection and recovery. Pattern Recognition 41(2), 654-661 (2008)
-
(2008)
Pattern Recognition
, vol.41
, Issue.2
, pp. 654-661
-
-
Chang, C.1
Fan, Y.-H.2
Tai, W.-L.3
-
13
-
-
70350475349
-
-
He, H.J., Zhang, J.S., Wang, H.X.: Synchronous counterfeiting attacks on selfembedding watermarking schemes. Intern. J. Comput. Sci. Network Security 6(1), 251-257 (2006)
-
He, H.J., Zhang, J.S., Wang, H.X.: Synchronous counterfeiting attacks on selfembedding watermarking schemes. Intern. J. Comput. Sci. Network Security 6(1), 251-257 (2006)
-
-
-
|