-
1
-
-
84899293880
-
-
Li CT. Digital watermarking schemes for multimedia authentication. In: Digital watermarking for digital media. J. Seitz Idea Group Publishing; 2005. p. 30-51.
-
Li CT. Digital watermarking schemes for multimedia authentication. In: Digital watermarking for digital media. J. Seitz Idea Group Publishing; 2005. p. 30-51.
-
-
-
-
2
-
-
33644995185
-
Analysis and design of secure watermark-based authentication system
-
Fei C., Kundur D., and Kwong R.H. Analysis and design of secure watermark-based authentication system. IEEE Trans Inform Forensics Security 1 1 (2006) 43-55
-
(2006)
IEEE Trans Inform Forensics Security
, vol.1
, Issue.1
, pp. 43-55
-
-
Fei, C.1
Kundur, D.2
Kwong, R.H.3
-
3
-
-
59849106523
-
Dual purpose FWT domain spread spectrum image watermarking in real time
-
Maity S.P., Kundu M.K., and Maity S. Dual purpose FWT domain spread spectrum image watermarking in real time. Comput Electr Eng Elsevier Sci 35 2 (2008) 415-433
-
(2008)
Comput Electr Eng Elsevier Sci
, vol.35
, Issue.2
, pp. 415-433
-
-
Maity, S.P.1
Kundu, M.K.2
Maity, S.3
-
4
-
-
43049171623
-
Machine learning based adaptive watermark decoding in view of anticipated attack
-
Khan A., Tahir S.F., Majid A., and Choi T.S. Machine learning based adaptive watermark decoding in view of anticipated attack. Pattern Recogn Elsevier Sci 41 8 (2008) 2594-2610
-
(2008)
Pattern Recogn Elsevier Sci
, vol.41
, Issue.8
, pp. 2594-2610
-
-
Khan, A.1
Tahir, S.F.2
Majid, A.3
Choi, T.S.4
-
5
-
-
34249668816
-
Genetic perceptual shaping: utilizing cover image and conceivable attack information using genetic programming
-
Khan A., and Mirza A.M. Genetic perceptual shaping: utilizing cover image and conceivable attack information using genetic programming. Inform Fusion Elsevier Sci 8 4 (2007) 354-365
-
(2007)
Inform Fusion Elsevier Sci
, vol.8
, Issue.4
, pp. 354-365
-
-
Khan, A.1
Mirza, A.M.2
-
6
-
-
57849113106
-
Robust watermarking based on DWT and nonnegative matrix factorization
-
Lu W., Sun W., and Lu H. Robust watermarking based on DWT and nonnegative matrix factorization. Comput Electr Eng Elsevier Sci 35 1 (2009) 183-188
-
(2009)
Comput Electr Eng Elsevier Sci
, vol.35
, Issue.1
, pp. 183-188
-
-
Lu, W.1
Sun, W.2
Lu, H.3
-
7
-
-
0032648596
-
Digital watermarking for telltale tamper proofing and authentication
-
Kundur D., and Hatzinakos D. Digital watermarking for telltale tamper proofing and authentication. Proc IEEE 87 7 (1999) 1167-1180
-
(1999)
Proc IEEE
, vol.87
, Issue.7
, pp. 1167-1180
-
-
Kundur, D.1
Hatzinakos, D.2
-
8
-
-
68249151679
-
Alteration detection apparatus and method thereof
-
US patent, 6963655 B1
-
Tonegawa S, Morimoto N, Kamijoh K. Alteration detection apparatus and method thereof. US patent 2005; (6963655 B1).
-
(2005)
-
-
Tonegawa, S.1
Morimoto, N.2
Kamijoh, K.3
-
9
-
-
34047136082
-
Multiuser-based shadow watermark extraction system
-
Wang F.H., Yen K.K., Jain L.C., and Pan J.S. Multiuser-based shadow watermark extraction system. Inform Sci Elsevier Sci 177 12 (2007) 2522-2532
-
(2007)
Inform Sci Elsevier Sci
, vol.177
, Issue.12
, pp. 2522-2532
-
-
Wang, F.H.1
Yen, K.K.2
Jain, L.C.3
Pan, J.S.4
-
10
-
-
3042694654
-
Semi-fragile watermarking scheme for authentication of JPEG images
-
Ho C.K., and Li C.T. Semi-fragile watermarking scheme for authentication of JPEG images. Proc Int Conf Inform Technol: Coding Comput l.1 (2004) 7-11
-
(2004)
Proc Int Conf Inform Technol: Coding Comput
, Issue.l.1
, pp. 7-11
-
-
Ho, C.K.1
Li, C.T.2
-
12
-
-
34249002876
-
Self-recovery authentication of images in the DWT domain
-
Piva A., Bartolini F., and Caldelli R. Self-recovery authentication of images in the DWT domain. Int J Image Graphics 5 1 (2005) 149-165
-
(2005)
Int J Image Graphics
, vol.5
, Issue.1
, pp. 149-165
-
-
Piva, A.1
Bartolini, F.2
Caldelli, R.3
-
14
-
-
36548999210
-
Wavelet based image authentication and recovery
-
Chamlawi R., Khan A., and Idris A. Wavelet based image authentication and recovery. J Comput Sci Technol 22 6 (2007) 795-804
-
(2007)
J Comput Sci Technol
, vol.22
, Issue.6
, pp. 795-804
-
-
Chamlawi, R.1
Khan, A.2
Idris, A.3
-
15
-
-
25944478731
-
-
MS thesis Graduate, Department of Electrical and Computer Engineering, University of Toronto;
-
Zhao Y. Dual domain semi-fragile watermarking for image authentication. MS thesis Graduate, Department of Electrical and Computer Engineering, University of Toronto; 2003.
-
(2003)
Dual domain semi-fragile watermarking for image authentication
-
-
Zhao, Y.1
-
16
-
-
67949091920
-
A semi fragile watermarking scheme using weighted vote with sieve and emphasis for image authentication
-
Ishihara N., and Koki A.B.E. A semi fragile watermarking scheme using weighted vote with sieve and emphasis for image authentication. IEICE Trans Fund E90-A 5 (2007) 1045-1054
-
(2007)
IEICE Trans Fund
, vol.E90-A
, Issue.5
, pp. 1045-1054
-
-
Ishihara, N.1
Koki, A.B.E.2
-
17
-
-
0033872149
-
Counterfeiting attacks on oblivious block-wise independent invisible watermarking schemes
-
Holiman M., and Memon N. Counterfeiting attacks on oblivious block-wise independent invisible watermarking schemes. IEEE Trans Image Process 9 3 (2000) 432-441
-
(2000)
IEEE Trans Image Process
, vol.9
, Issue.3
, pp. 432-441
-
-
Holiman, M.1
Memon, N.2
-
18
-
-
33845568061
-
A secure semi-fragile watermarking for image authentication based on integer wavelet transform with parameters
-
New Castle, Australia;
-
Wu X, Hu J, Gu Z, Huang J. A secure semi-fragile watermarking for image authentication based on integer wavelet transform with parameters. Australian Information Security Workshop, New Castle, Australia; 2005. p. 75-80.
-
(2005)
Australian Information Security Workshop
, pp. 75-80
-
-
Wu, X.1
Hu, J.2
Gu, Z.3
Huang, J.4
-
19
-
-
0034776206
-
Image tamper detection and recovery system based on discrete wavelet transformation
-
Li KF, Chen TS, Wu SC. Image tamper detection and recovery system based on discrete wavelet transformation. In: Proceedings of the international conference on communications, computers, and signal processing. vol. 1; 2001. p. 164-7.
-
(2001)
Proceedings of the international conference on communications, computers, and signal processing
, vol.1
, pp. 164-167
-
-
Li, K.F.1
Chen, T.S.2
Wu, S.C.3
|