-
1
-
-
0037818310
-
Structural digital signature for image authentication: An incidental distortion resistant scheme
-
C. S. Lu and H. Y. M. Liao, "Structural digital signature for image authentication: An incidental distortion resistant scheme," IEEE Trans. Multimedia 5(2), 161-173 (2003).
-
(2003)
IEEE Trans. Multimedia
, vol.5
, Issue.2
, pp. 161-173
-
-
Lu, C.S.1
Liao, H.Y.M.2
-
2
-
-
0035248504
-
A robust image authentication method distinguishing JPEG compression from malicious manipulation
-
C. Y. Lin and S. F. Chang, "A robust image authentication method distinguishing JPEG compression from malicious manipulation," IEEE Trans. Circuits Syst. Video Technol 11(2), 153-168 (2001).
-
(2001)
IEEE Trans. Circuits Syst. Video Technol
, vol.11
, Issue.2
, pp. 153-168
-
-
Lin, C.Y.1
Chang, S.F.2
-
3
-
-
0142029533
-
Using set partitioning in hierarchical tree to authenticate digital images
-
P. Tsai, Y. C. Hu, and C. C. Chang, "Using set partitioning in hierarchical tree to authenticate digital images," Signal Process. Image Commun, 18(9), 813-822 (2003).
-
(2003)
Signal Process. Image Commun
, vol.18
, Issue.9
, pp. 813-822
-
-
Tsai, P.1
Hu, Y.C.2
Chang, C.C.3
-
4
-
-
32644434350
-
A watermarking-based image ownership and tampering authentication scheme
-
C. C. Chang, Y. S. Hu, and T. C. Lu, "A watermarking-based image ownership and tampering authentication scheme," Pattern Recogn. Lett. 27(5), 439-446 (2006).
-
(2006)
Pattern Recogn. Lett
, vol.27
, Issue.5
, pp. 439-446
-
-
Chang, C.C.1
Hu, Y.S.2
Lu, T.C.3
-
5
-
-
0036611838
-
Hierarchical, watermarking for secure image authentication with localization
-
M. U. Ceilk, G. Sharma, E. Saber, and A. M. Tekalp, "Hierarchical, watermarking for secure image authentication with localization," IEEE Trans. Image Process. 11(6), 585-594 (2002).
-
(2002)
IEEE Trans. Image Process
, vol.11
, Issue.6
, pp. 585-594
-
-
Ceilk, M.U.1
Sharma, G.2
Saber, E.3
Tekalp, A.M.4
-
6
-
-
0035473831
-
Secret and public key image watermarking schemes for image authentication and ownership verification
-
1.0
-
P. W. Wong and N. Memon, "Secret and public key image watermarking schemes for image authentication and ownership verification," IEEE Trans. Image Process. 10(1.0), 1593-1601 (2001).
-
(2001)
IEEE Trans. Image Process
, vol.10
, pp. 1593-1601
-
-
Wong, P.W.1
Memon, N.2
-
7
-
-
0347927731
-
Detection and restoration of tampered JPEG compressed images
-
H. C. Wu and C. C. Chang, "Detection and restoration of tampered JPEG compressed images," J. Syst. Softw. 64(2), 151-161 (2002).
-
(2002)
J. Syst. Softw
, vol.64
, Issue.2
, pp. 151-161
-
-
Wu, H.C.1
Chang, C.C.2
-
8
-
-
25144448272
-
A hierarchical digital watermarking method for image tamper detection and recovery
-
P. L. Lin, C. K. Hsieh, and P. W. Huang, "A hierarchical digital watermarking method for image tamper detection and recovery," Pattern Recogn. 38(12), 2519-2529 (2005).
-
(2005)
Pattern Recogn
, vol.38
, Issue.12
, pp. 2519-2529
-
-
Lin, P.L.1
Hsieh, C.K.2
Huang, P.W.3
-
9
-
-
33749378971
-
Content-based watermarking in image authentication allowing remedying of tampered images
-
F. H. Yen and G. C. Lee, "Content-based watermarking in image authentication allowing remedying of tampered images," Opt. Eng. 45(7), 077004 (2006).
-
(2006)
Opt. Eng
, vol.45
, Issue.7
, pp. 077004
-
-
Yen, F.H.1
Lee, G.C.2
-
10
-
-
33750303836
-
An efficient image authentication method based on Hamming code
-
C. S. Chan and C. C. Chang, "An efficient image authentication method based on Hamming code," Pattern Recogn. 40(2), 681-690 (2007).
-
(2007)
Pattern Recogn
, vol.40
, Issue.2
, pp. 681-690
-
-
Chan, C.S.1
Chang, C.C.2
-
11
-
-
0036794537
-
Secret image sharing
-
C. C. Thien and J. C. Lin, "Secret image sharing," Comput. Graphics 26(5), 765-770 (2002).
-
(2002)
Comput. Graphics
, vol.26
, Issue.5
, pp. 765-770
-
-
Thien, C.C.1
Lin, J.C.2
-
12
-
-
0018545449
-
How to share a secret
-
A. Shamir, "How to share a secret," Commun. ACM 22(4), 612-613 (1979).
-
(1979)
Commun. ACM
, vol.22
, Issue.4
, pp. 612-613
-
-
Shamir, A.1
-
14
-
-
0032204204
-
Sharing secret images using shadow codebooks
-
C. C. Chang and R. J. Huang, "Sharing secret images using shadow codebooks," Inf. Sci. (N. Y.) 111(1-4), 335-345 (1998).
-
(1998)
Inf. Sci. (N. Y.)
, vol.111
, Issue.1-4
, pp. 335-345
-
-
Chang, C.C.1
Huang, R.J.2
-
15
-
-
0347946754
-
An image-sharing method with userfriendly shadow images
-
C. C. Thien and J. C. Lin, "An image-sharing method with userfriendly shadow images," IEEE Trans. Circuits Syst. Video Technol. 13(12), 1161-1169 (2003).
-
(2003)
IEEE Trans. Circuits Syst. Video Technol
, vol.13
, Issue.12
, pp. 1161-1169
-
-
Thien, C.C.1
Lin, J.C.2
-
16
-
-
4444342040
-
Secret image sharing with steganography and authentication
-
C. C. Lin and W. H. Tsai, "Secret image sharing with steganography and authentication," J. Syst. Softw. 73(3), 405-414 (2004).
-
(2004)
J. Syst. Softw
, vol.73
, Issue.3
, pp. 405-414
-
-
Lin, C.C.1
Tsai, W.H.2
-
17
-
-
25144517338
-
Fault-tolerant and progressive transmission of images
-
S. K. Chen and J. C. Lin, "Fault-tolerant and progressive transmission of images," Pattern Recogn. 38(12), 2466-2471 (2005).
-
(2005)
Pattern Recogn
, vol.38
, Issue.12
, pp. 2466-2471
-
-
Chen, S.K.1
Lin, J.C.2
-
19
-
-
34547689489
-
VCPSS: A two-in-one two-decoding-options image sharing method combining visual, cryptography (VC) and polynomial-style sharing (PSS) approaches
-
S. J. Lin and J. C. Lin, "VCPSS: A two-in-one two-decoding-options image sharing method combining visual, cryptography (VC) and polynomial-style sharing (PSS) approaches," Pattern Recogn, 40(12), 3652-3666 (2007).
-
(2007)
Pattern Recogn
, vol.40
, Issue.12
, pp. 3652-3666
-
-
Lin, S.J.1
Lin, J.C.2
-
20
-
-
0141741345
-
Secret image sharing with capability of share data reduction
-
C. C. Lin and W. H. Tsai, "Secret image sharing with capability of share data reduction," Opt. Eng. 42(8), 2340-2345 (2003).
-
(2003)
Opt. Eng
, vol.42
, Issue.8
, pp. 2340-2345
-
-
Lin, C.C.1
Tsai, W.H.2
-
21
-
-
14744284326
-
A new multi-secret images sharing scheme using Largrange's .interpolation
-
J. B. Feng, H. C. Wu, and C. S. Tsai, "A new multi-secret images sharing scheme using Largrange's .interpolation," J. Syst. Softw. 76(3), 327-339 (2005).
-
(2005)
J. Syst. Softw
, vol.76
, Issue.3
, pp. 327-339
-
-
Feng, J.B.1
Wu, H.C.2
Tsai, C.S.3
-
24
-
-
19944404261
-
Sharing visual multi-secrets using circle shares
-
H. C. Wu and C. C. Chang, "Sharing visual multi-secrets using circle shares," Computer Standards Interfaces 28(1), 123-135 (2005).
-
(2005)
Computer Standards Interfaces
, vol.28
, Issue.1
, pp. 123-135
-
-
Wu, H.C.1
Chang, C.C.2
-
25
-
-
0142057129
-
A simple and high-hiding capacity method for hiding digit-by-digit data in images based on modulus function
-
C. C. Thien and J. C. Lin, "A simple and high-hiding capacity method for hiding digit-by-digit data in images based on modulus function," Pattern Recogn. 36(12), 2875-2881 (2003).
-
(2003)
Pattern Recogn
, vol.36
, Issue.12
, pp. 2875-2881
-
-
Thien, C.C.1
Lin, J.C.2
-
26
-
-
0035283377
-
Image hiding by optimal LSB substitution and genetic algorithm
-
R. Z. Wang, C. F. Lin, and J. C. Lin, "Image hiding by optimal LSB substitution and genetic algorithm," Pattern Recogn. 34(3), 671-683 (2001).
-
(2001)
Pattern Recogn
, vol.34
, Issue.3
, pp. 671-683
-
-
Wang, R.Z.1
Lin, C.F.2
Lin, J.C.3
-
27
-
-
2442604250
-
Sharing and hiding secret images with size constraint
-
Y. S. Wu, C. C. Thien, and J. C. Lin, "Sharing and hiding secret images with size constraint," Pattern Recogn. 37(7), 1377-1385 (2004).
-
(2004)
Pattern Recogn
, vol.37
, Issue.7
, pp. 1377-1385
-
-
Wu, Y.S.1
Thien, C.C.2
Lin, J.C.3
-
28
-
-
0037410595
-
A steganographic method for images by pixel-value differencing
-
D. C. Wu and W. H. Tsai, "A steganographic method for images by pixel-value differencing," Pattern Recogn, Lett. 24(10), 1613-1626 (2003).
-
(2003)
Pattern Recogn, Lett
, vol.24
, Issue.10
, pp. 1613-1626
-
-
Wu, D.C.1
Tsai, W.H.2
-
29
-
-
33744984189
-
High, capacity image hiding scheme based on vector quantization
-
Y. C. Hu, "High, capacity image hiding scheme based on vector quantization," Pattern Recogn, 39(9), 10715-1724 (2006).
-
(2006)
Pattern Recogn
, vol.39
, Issue.9
, pp. 10715-11724
-
-
Hu, Y.C.1
-
30
-
-
33847761058
-
Image hiding by base-oriented algorithm
-
1.1, 117001-1-10
-
C. Y. Yang and J. C. Lin, "Image hiding by base-oriented algorithm," Opt. Eng. 45(1.1), 117001-(1-10) (2006).
-
(2006)
Opt. Eng
, vol.45
-
-
Yang, C.Y.1
Lin, J.C.2
-
32
-
-
0031599142
-
Mersenne twister: A 623-dimensionally equidistributed uniform pseudorandom number generator
-
M. Matsumoto and T. Nishimura, "Mersenne twister: a 623-dimensionally equidistributed uniform pseudorandom number generator," ACM Trans. Model. Comput. Simul. 8(1) 3-30 (1998).
-
(1998)
ACM Trans. Model. Comput. Simul
, vol.8
, Issue.1
, pp. 3-30
-
-
Matsumoto, M.1
Nishimura, T.2
-
33
-
-
0347927730
-
Sharing multiple secrets in digital images
-
C. S. Tsai, C. C. Chang, and T. S. Chen, "Sharing multiple secrets in digital images," J. Syst. Softw. 64(2), 163-170 (2002).
-
(2002)
J. Syst. Softw
, vol.64
, Issue.2
, pp. 163-170
-
-
Tsai, C.S.1
Chang, C.C.2
Chen, T.S.3
|