-
1
-
-
85032752228
-
When seeing isn't believing [J]
-
B B Zhu, M D Swanson, A H Tewfik. When seeing isn't believing [J]. IEEE Signal Processing Magazine, 2004, 21(2): 40-49.
-
(2004)
IEEE Signal Processing Magazine
, vol.21
, Issue.2
, pp. 40-49
-
-
Zhu, B.B.1
Swanson, M.D.2
Tewfik, A.H.3
-
3
-
-
34147192852
-
-
ZHANG Xian-hai, YANG Yong-tian, Image authentication scheme research based on fragile watermarking [J]. Acta Electronica Sinica, 2007, 35(1): 34-39.
-
ZHANG Xian-hai, YANG Yong-tian, Image authentication scheme research based on fragile watermarking [J]. Acta Electronica Sinica, 2007, 35(1): 34-39.
-
-
-
-
4
-
-
4544259721
-
Fragile Watermarking Technique with Precise Localization [J]
-
DING Ke, HE Chen, WANG Hong-xia. A Chaos Fragile Watermarking Technique with Precise Localization [J]. Acta Electronica Sinica, 2004, (6): 1009-1012.
-
(2004)
Acta Electronica Sinica
, vol.6
, pp. 1009-1012
-
-
Ke, D.I.N.G.1
Chen, H.E.2
Hong-xia, W.A.N.G.3
Chaos, A.4
-
5
-
-
74549118020
-
-
ZHANG Jia-shu, TIAN Lei. A new chaos digital watermarking method based on private key [J]. Journal of China Institute of communications, 2004, 25(8): 126-131.
-
ZHANG Jia-shu, TIAN Lei. A new chaos digital watermarking method based on private key [J]. Journal of China Institute of communications, 2004, 25(8): 126-131.
-
-
-
-
6
-
-
11244271854
-
-
J S Zhang, et al . A new watermarking method based on chaos map [A]. IEEE International Conference on Multimedia an Expo[C]. Taiwan: IEEE, 2004.
-
J S Zhang, et al . A new watermarking method based on chaos map [A]. IEEE International Conference on Multimedia an Expo[C]. Taiwan: IEEE, 2004.
-
-
-
-
7
-
-
27744484392
-
ZHANG Jia-shu , Tian Lei. A fragile watermarking scheme with discrimination of tampers on image or watermark [J]
-
HE Hong-jie , ZHANG Jia-shu , Tian Lei. A fragile watermarking scheme with discrimination of tampers on image or watermark [J]. Chinese Journal of Electronics, 2005, 33(9): 1557-1561.
-
(2005)
Chinese Journal of Electronics
, vol.33
, Issue.9
, pp. 1557-1561
-
-
Hong-jie, H.E.1
-
8
-
-
33749833511
-
ZHANG Jia-shu. Chaos-based scramble self-embedding watermarking algorithm [J]
-
HE Hong-jie, ZHANG Jia-shu. Chaos-based scramble self-embedding watermarking algorithm [J]. Journal of China Institute of Communications, 2006, 27(7): 80-85.
-
(2006)
Journal of China Institute of Communications
, vol.27
, Issue.7
, pp. 80-85
-
-
Hong-jie, H.E.1
-
9
-
-
40049104508
-
Images with self correcting capabilities [A]
-
IEEE Press, Kobe, Japan
-
J Fridrich, M Goljan. Images with self correcting capabilities [A]. Proceedings of International Conference on Image Processing [C]. IEEE Press, Kobe , Japan, 1999. 25 - 28.
-
(1999)
Proceedings of International Conference on Image Processing
, vol.100
, pp. 25-28
-
-
Fridrich, J.1
Goljan, M.2
-
10
-
-
50549085574
-
An Image Authentication Scheme with Discrimination of Tampers on Watermark or Image [J]
-
WANG Guo-dong, LIU Fen-lin, LIU Yuan, et al. An Image Authentication Scheme with Discrimination of Tampers on Watermark or Image [J]. Acta Electronica Sinica, 2008, 7(36): 1349-1354.
-
(2008)
Acta Electronica Sinica
, vol.7
, Issue.36
, pp. 1349-1354
-
-
Guo-dong, W.A.N.G.1
Fen-lin, L.I.U.2
Yuan, L.I.U.3
-
11
-
-
0033872149
-
Counterfeiting attacks on oblivious block-wise independent invisible watermarking schemes[J]
-
M Holliman, et al. Counterfeiting attacks on oblivious block-wise independent invisible watermarking schemes[J]. IEEE Trans on Image Processing, 2000, 3(9): 432-441.
-
(2000)
IEEE Trans on Image Processing
, vol.3
, Issue.9
, pp. 432-441
-
-
Holliman, M.1
-
12
-
-
84963539581
-
Comparative Evaluation of Digital Fragile Image Watermark Algorithms [J]
-
ZHANG Hong
-
ZHANG Hong, WANG Ying. Comparative Evaluation of Digital Fragile Image Watermark Algorithms [J]. Computer Engineering, 2008, 2(34): 174-177.
-
(2008)
Computer Engineering
, vol.2
, Issue.34
, pp. 174-177
-
-
Ying, W.A.N.G.1
|