-
3
-
-
84898309971
-
Statistical watermark detection in the transform domain for digital images
-
C.-T. Li, Ed. Hershey, PA: IGI Global, ch. VII
-
F. Khelifi, F. Kurugollu, and A. Bouridane, "Statistical watermark detection in the transform domain for digital images," in Multimedia Forens. Sec., C.-T. Li, Ed. Hershey, PA: IGI Global, 2008, ch. VII, pp. 121-139.
-
(2008)
Multimedia Forens. Sec.
, pp. 121-139
-
-
Khelifi, F.1
Kurugollu, F.2
Bouridane, A.3
-
4
-
-
84962642939
-
Watermarking applications and their properties
-
Las Vegas, NV, Mar.
-
I. J. Cox, M. L. Miller, and J. A. Bloom, "Watermarking applications and their properties," in Proc. IEEE Int. Conf. on Information Technology: Coding and Computing, Las Vegas, NV, Mar. 2000.
-
(2000)
Proc. IEEE Int. Conf. on Information Technology: Coding and Computing
-
-
Cox, I.J.1
Miller, M.L.2
Bloom, J.A.3
-
5
-
-
0030409375
-
A robust content-based digital signature for image authentication
-
Lausanne, Switzerland, Sep.
-
M. Schneider and S. F. Chang, "A robust content-based digital signature for image authentication," in Proc. IEEE Int. Conf. Image Processing, Lausanne, Switzerland, Sep. 1996.
-
(1996)
Proc. IEEE Int. Conf. Image Processing
-
-
Schneider, M.1
Chang, S.F.2
-
6
-
-
0032223822
-
A robust image authentication method surviving JPEG lossy compression
-
San Jose, CA, Jan.
-
C. Y. Lin and S. F. Chang, "A robust image authentication method surviving JPEG lossy compression," in Proc. SPIE Storage and Retrieval of Image/Video Database, San Jose, CA, Jan. 1998, vol.3312.
-
(1998)
Proc. SPIE Storage and Retrieval of Image/Video Database
, vol.3312
-
-
Lin, C.Y.1
Chang, S.F.2
-
7
-
-
0005060102
-
On the need for image dependent keys for watermarking
-
Newark, DE, May
-
M. Holliman, N. Memon, and N. M. Yeung, "On the need for image dependent keys for watermarking," in Proc. Content Security and Data Hiding in Digital Media, Newark, DE, May 1999.
-
(1999)
Proc. Content Security and Data Hiding in Digital Media
-
-
Holliman, M.1
Memon, N.2
Yeung, N.M.3
-
9
-
-
4544313881
-
Design and statistical analysis of a hashaided image watermarking system
-
Oct.
-
J. Cannons and P. Moulin, "Design and statistical analysis of a hashaided image watermarking system," IEEE Trans. Image Process., vol.13, no.10, pp. 1393-1408, Oct. 2004.
-
(2004)
IEEE Trans. Image Process.
, vol.13
, Issue.10
, pp. 1393-1408
-
-
Cannons, J.1
Moulin, P.2
-
10
-
-
0031247975
-
Geometric hashing: An overview
-
Oct.-Dec.
-
H. J. Wolfson and I. Rigoutsos, "Geometric hashing: An overview," IEEE Comput. Sci. Eng., vol.4, pp. 10-21, Oct.-Dec. 1997.
-
(1997)
IEEE Comput. Sci. Eng.
, vol.4
, pp. 10-21
-
-
Wolfson, H.J.1
Rigoutsos, I.2
-
11
-
-
0031247490
-
Medical image registration using geometric hashing
-
Oct.-Dec.
-
A. P. Gueziec, X. Pennec, and N. Ayache, "Medical image registration using geometric hashing," IEEE Comput. Sci. Eng., vol.4, pp. 29-41, Oct.-Dec. 1997.
-
(1997)
IEEE Comput. Sci. Eng.
, vol.4
, pp. 29-41
-
-
Gueziec, A.P.1
Pennec, X.2
Ayache, N.3
-
12
-
-
33645004781
-
A clustering based approach to perceptual image hashing
-
Mar.
-
V. Monga, A. Banerjee, and B. L. Evans, "A clustering based approach to perceptual image hashing," IEEE Trans. Inf. Forens. Sec., vol.1, pp. 68-79, Mar. 2006.
-
(2006)
IEEE Trans. Inf. Forens. Sec.
, vol.1
, pp. 68-79
-
-
Monga, V.1
Banerjee, A.2
Evans, B.L.3
-
13
-
-
48849093183
-
Analysis of the hash function design strategy called SMASH
-
Aug.
-
M. Lamberger, N. Pramstaller, C. Rechberger, and V. Rijmen, "Analysis of the hash function design strategy called SMASH," IEEE Trans. Inf. Theory, vol.54, no.8, pp. 3647-3655, Aug. 2008.
-
(2008)
IEEE Trans. Inf. Theory
, vol.54
, Issue.8
, pp. 3647-3655
-
-
Lamberger, M.1
Pramstaller, N.2
Rechberger, C.3
Rijmen, V.4
-
15
-
-
0034444578
-
Robust image hashing
-
Presented at, Vancouver, BC, Canada, Sep.
-
R. Venkatesan, S. M. Koon, M. H. Jakubowski, and P. Moulin, "Robust image hashing," presented at the IEEE Int. Conf. Image Processing, Vancouver, BC, Canada, Sep. 2000.
-
(2000)
The IEEE Int. Conf. Image Processing
-
-
Venkatesan, R.1
Koon, S.M.2
Jakubowski, M.H.3
Moulin, P.4
-
16
-
-
33747375321
-
Image authentication under geometric attacks via structure matching
-
Presented atAmsterdam, The Netherlands, Jul.
-
V. Monga, D. Vats, and B. L. Evans, "Image authentication under geometric attacks via structure matching," presented at the IEEE Int. Conf. Multimedia and Expo., Amsterdam, The Netherlands, Jul. 2005.
-
(2005)
The IEEE Int. Conf. Multimedia and Expo.
-
-
Monga, V.1
Vats, D.2
Evans, B.L.3
-
17
-
-
20444464472
-
Robust perceptual image hashing using feature points
-
Presented at, Singapore, Oct.
-
V. Monga, D. Vats, and B. L. Evans, "Robust perceptual image hashing using feature points," presented at the IEEE Int. Conf. Image Processing, Singapore, Oct. 2004.
-
(2004)
The IEEE Int. Conf. Image Processing
-
-
Monga, V.1
Vats, D.2
Evans, B.L.3
-
18
-
-
33750344108
-
Perceptual image hashing via feature points: Performance evaluation and tradeoffs
-
Nov.
-
V. Monga and B. L. Evans, "Perceptual image hashing via feature points: Performance evaluation and tradeoffs," IEEE Trans. Image Process., vol.15, no.11, pp. 3453-3466, Nov. 2006.
-
(2006)
IEEE Trans. Image Process.
, vol.15
, Issue.11
, pp. 3453-3466
-
-
Monga, V.1
Evans, B.L.2
-
19
-
-
20444500587
-
Robust perceptual image hashing via matrix invariants
-
Presented at, Singapore, Oct.
-
S. S. Kozat, R. Venkatesan, and M. K. Mihcak, "Robust perceptual image hashing via matrix invariants," presented at the IEEE Int. Conf. Image Processing, Singapore, Oct. 2004.
-
(2004)
The IEEE Int. Conf. Image Processing
-
-
Kozat, S.S.1
Venkatesan, R.2
Mihcak, M.K.3
-
20
-
-
33746368690
-
Biometric hash: High-confidence face recognition
-
Jun.
-
D. C. L. Ngo, A. B. J. Teoh, and A. Goh, "Biometric hash: High-confidence face recognition," IEEE Trans. Circuits Syst. Video Technol., vol.16, no.6, pp. 771-775, Jun. 2006.
-
(2006)
IEEE Trans. Circuits Syst. Video Technol.
, vol.16
, Issue.6
, pp. 771-775
-
-
Ngo, D.C.L.1
Teoh, A.B.J.2
Goh, A.3
-
21
-
-
33845404068
-
Robust image hashing via non-negative matrix factorizations
-
Presented at, Toulouse, France, May
-
V. Monga and M. K. Mihcak, "Robust image hashing via non-negative matrix factorizations," presented at the IEEE Int. Conf. Acoustic, Speech and Signal Processing, Toulouse, France, May 2006.
-
(2006)
The IEEE Int. Conf. Acoustic, Speech and Signal Processing
-
-
Monga, V.1
Mihcak, M.K.2
-
22
-
-
34548085689
-
Robust and secure image hashing via non-negative matrix factorizations
-
Sep.
-
V. Monga and M. K. Mihcak, "Robust and secure image hashing via non-negative matrix factorizations," IEEE Trans. Inf. Forens. Sec., vol.2, pp. 376-390, Sep. 2007.
-
(2007)
IEEE Trans. Inf. Forens. Sec.
, vol.2
, pp. 376-390
-
-
Monga, V.1
Mihcak, M.K.2
-
23
-
-
33744764278
-
Robust and secure image hashing
-
Jun.
-
A. Swaminathan, Y. Mao, and M. Wu, "Robust and secure image hashing," IEEE Trans. Inf. Forens. Sec., vol.1, pp. 215-230, Jun. 2006.
-
(2006)
IEEE Trans. Inf. Forens. Sec.
, vol.1
, pp. 215-230
-
-
Swaminathan, A.1
Mao, Y.2
Wu, M.3
-
24
-
-
0035335388
-
Rotation, scale, and translation resilient watermarking for images
-
May
-
C. Y. Lin, M.Wu, J. A. Bloom, I. J. Cox, M. L. Miller, and Y. M. Lui, "Rotation, scale, and translation resilient watermarking for images," IEEE Trans. Image Process., vol.10, no.5, pp. 767-782, May 2001.
-
(2001)
IEEE Trans. Image Process.
, vol.10
, Issue.5
, pp. 767-782
-
-
Lin, C.Y.1
Wu, M.2
Bloom, J.A.3
Cox, I.J.4
Miller, M.L.5
Lui, Y.M.6
-
25
-
-
34548104101
-
Unicity distance of robust image hashing
-
Sep.
-
Y. Mao and M. Wu, "Unicity distance of robust image hashing," IEEE Trans. Inf. Forens. Sec., vol.2, pp. 462-467, Sep. 2007.
-
(2007)
IEEE Trans. Inf. Forens. Sec.
, vol.2
, pp. 462-467
-
-
Mao, Y.1
Wu, M.2
-
26
-
-
85008058265
-
Analysis of the security of perceptual image hashing based on non-negative matrix factorization
-
Jan.
-
F. Khelifi and J. Jiang, "Analysis of the security of perceptual image hashing based on non-negative matrix factorization," IEEE Signal Process. Lett., vol.17, no.1, pp. 43-46, Jan. 2010.
-
(2010)
IEEE Signal Process. Lett.
, vol.17
, Issue.1
, pp. 43-46
-
-
Khelifi, F.1
Jiang, J.2
-
29
-
-
0035335237
-
A new decoder for the optimum recovery of nonadditive watermarks
-
May
-
M. Barni, F. Bartolini, A. De Rosa, and A. Piva, "A new decoder for the optimum recovery of nonadditive watermarks," IEEE Trans. Image Process., vol.10, no.5, pp. 755-766, May 2001.
-
(2001)
IEEE Trans. Image Process.
, vol.10
, Issue.5
, pp. 755-766
-
-
Barni, M.1
Bartolini, F.2
De Rosa, A.3
Piva, A.4
-
30
-
-
0037851033
-
Robust optimum detection of transform domain multiplicative watermarks
-
Apr.
-
Q. Cheng and T. S. Huang, "Robust optimum detection of transform domain multiplicative watermarks," IEEE Trans. Signal Process., vol.51, no.4, pp. 906-924, Apr. 2003.
-
(2003)
IEEE Trans. Signal Process.
, vol.51
, Issue.4
, pp. 906-924
-
-
Cheng, Q.1
Huang, T.S.2
-
34
-
-
77949758244
-
-
[Online]. Available:
-
[Online]. Available: http://decsai.ugr.es/cvg/dbimagenesTest Images 2009
-
-
-
-
35
-
-
0027700869
-
High confidence visual recognition of persons by a test of statistical independence
-
Nov.
-
J. G. Daugman, "High confidence visual recognition of persons by a test of statistical independence," IEEE Trans. Pattern Anal. Mach. Intell., vol.15, no.11, pp. 1148-1161, Nov. 1993.
-
(1993)
IEEE Trans. Pattern Anal. Mach. Intell.
, vol.15
, Issue.11
, pp. 1148-1161
-
-
Daugman, J.G.1
-
36
-
-
84890522850
-
Communication theory of secrecy systems
-
Oct.
-
C. E. Shannon, "Communication theory of secrecy systems," Bell Syst. Tech. J., vol.28, pp. 656-715, Oct. 1949.
-
(1949)
Bell Syst. Tech. J.
, vol.28
, pp. 656-715
-
-
Shannon, C.E.1
-
37
-
-
33645688937
-
Security of feature extraction in image hashing
-
Presented at the Mar.
-
A. Swaminathan, Y. Mao, and M. Wu, "Security of feature extraction in image hashing," presented at the IEEE Int. Conf. Acoustic, Speech and Signal Processing, Mar. 2005.
-
(2005)
IEEE Int. Conf. Acoustic, Speech and Signal Processing
-
-
Swaminathan, A.1
Mao, Y.2
Wu, M.3
-
38
-
-
21844463487
-
Watermarking security: Theory and practice
-
Oct.
-
F. Cayre, C. Fontaine, and T. Furon, "Watermarking security: Theory and practice," IEEE Trans. Signal Process., vol.53, no.10, pp. 3976-3987, Oct. 2005.
-
(2005)
IEEE Trans. Signal Process
, vol.53
, Issue.10
, pp. 3976-3987
-
-
Cayre, F.1
Fontaine, C.2
Furon, T.3
-
40
-
-
60849097547
-
Normalized mutual information feature selection
-
Feb.
-
P. A. Estévez, M. Tesmer, C. A. Perez, and J. M. Zurada, "Normalized mutual information feature selection," IEEE Trans. Neural Netw., vol.20, no.2, pp. 189-201, Feb. 2009.
-
(2009)
IEEE Trans. Neural Netw.
, vol.20
, Issue.2
, pp. 189-201
-
-
Estévez, P.A.1
Tesmer, M.2
Perez, C.A.3
Zurada, J.M.4
-
41
-
-
77949708822
-
-
[Online]. Available
-
[Online]. Available: http://users.ece.utexas.edu/bevans/projects/ hashingMatlabCodes2009.
-
-
-
-
42
-
-
84898964201
-
Algorithms for non-negative matrix factorization
-
Vancouver, BC, Canada, Dec.
-
D. D. Lee and H. S. Seung, "Algorithms for non-negative matrix factorization," in Proc. Advances in Neural Information Processing Systems Conference, Vancouver, BC, Canada, Dec. 2001, pp. 556-562.
-
(2001)
Proc. Advances in Neural Information Processing Systems Conference
, pp. 556-562
-
-
Lee, D.D.1
Seung, H.S.2
-
43
-
-
0035440147
-
An additive approach to transform domain information hiding and optimum detection structure
-
Sep.
-
Q. Cheng and T. S. Huang, "An additive approach to transform domain information hiding and optimum detection structure," IEEE Trans. Multimedia, vol.3, pp. 273-284, Sep. 2001.
-
(2001)
IEEE Trans. Multimedia
, vol.3
, pp. 273-284
-
-
Cheng, Q.1
Huang, T.S.2
|