-
1
-
-
0002500694
-
Image authentication techniques for surveillance applications
-
F. Bartolini, A. Tefas, M. Barni, and I. Pitas Image authentication techniques for surveillance applications Proceeding of the IEEE 89 10 2001 1403 1418
-
(2001)
Proceeding of the IEEE
, vol.89
, Issue.10
, pp. 1403-1418
-
-
Bartolini, F.1
Tefas, A.2
Barni, M.3
Pitas, I.4
-
2
-
-
0036611838
-
Hierarchical watermarking for secure image authentication with localization
-
M.U. Celik, G. Sharma, E. Sabir, and A. Murat Hierarchical watermarking for secure image authentication with localization IEEE Transaction on Image Processing 11 6 2002 585 595
-
(2002)
IEEE Transaction on Image Processing
, vol.11
, Issue.6
, pp. 585-595
-
-
Celik, M.U.1
Sharma, G.2
Sabir, E.3
Murat, A.4
-
4
-
-
34848926024
-
Four-scanning attack on hierarchical digital watermarking method for image tamper detection and recovery
-
C.C. Chang, Y.H. Fan, and W.L. Tai Four-scanning attack on hierarchical digital watermarking method for image tamper detection and recovery Pattern Recognition, Elsevier Sciences 41 2008 654 661
-
(2008)
Pattern Recognition, Elsevier Sciences
, vol.41
, pp. 654-661
-
-
Chang, C.C.1
Fan, Y.H.2
Tai, W.L.3
-
5
-
-
64749113298
-
Preserving robustness and removability for digital watermarks using subsampling and difference correlation
-
C-C. Chang, P-Y. Lin, and J-S. Yeh Preserving robustness and removability for digital watermarks using subsampling and difference correlation Information Sciences, Elsevier Science 179 13 2009 2283 2293
-
(2009)
Information Sciences, Elsevier Science
, vol.179
, Issue.13
, pp. 2283-2293
-
-
Chang, C.-C.1
Lin, P.-Y.2
Yeh, J.-S.3
-
7
-
-
1842421975
-
Comparative Evaluation of semi-fragile watermarking algorithms
-
Ö. Ekici, B. Sankur, and M. Akay Comparative Evaluation of semi-fragile watermarking algorithms Journal of Electronic Imaging 13 1 2004 209 216
-
(2004)
Journal of Electronic Imaging
, vol.13
, Issue.1
, pp. 209-216
-
-
Ekici, Ö.1
Sankur, B.2
Akay, M.3
-
9
-
-
0033872149
-
Counterfeiting attacks on oblivious block-wise independent invisible watermarking schemes
-
M. Holiman, and N. Memon Counterfeiting attacks on oblivious block-wise independent invisible watermarking schemes IEEE Transactions on Image Processing 9 3 2000 432 441
-
(2000)
IEEE Transactions on Image Processing
, vol.9
, Issue.3
, pp. 432-441
-
-
Holiman, M.1
Memon, N.2
-
10
-
-
0035471787
-
Hiding digital watermarks using multiresolution wavelet transform
-
M.S. Hsieh, and D.C. Tseng Hiding digital watermarks using multiresolution wavelet transform IEEE Transactions on Industrial Electronics 48 7 2001 875 882
-
(2001)
IEEE Transactions on Industrial Electronics
, vol.48
, Issue.7
, pp. 875-882
-
-
Hsieh, M.S.1
Tseng, D.C.2
-
11
-
-
58049110896
-
Fidelity-guaranteed robustness enhancement of blind-detection watermarking schemes
-
C-H. Huang, and J-L. Wu Fidelity-guaranteed robustness enhancement of blind-detection watermarking schemes Information Sciences, Elsevier Science 179 6 2009 791 808
-
(2009)
Information Sciences, Elsevier Science
, vol.179
, Issue.6
, pp. 791-808
-
-
Huang, C.-H.1
Wu, J.-L.2
-
13
-
-
0035454036
-
Secure discrete cosine transform based technique for recoverable tamper proofing
-
K.L. Hung, C.C. Chang, and T.S. Chen Secure discrete cosine transform based technique for recoverable tamper proofing Optical Engineering 40 2001 1950 1958
-
(2001)
Optical Engineering
, vol.40
, pp. 1950-1958
-
-
Hung, K.L.1
Chang, C.C.2
Chen, T.S.3
-
14
-
-
67949091920
-
A Semi fragile watermarking scheme using weighted vote with sieve and emphasis for image authentication
-
N. Ishihara, and Koki ABE A Semi fragile watermarking scheme using weighted vote with sieve and emphasis for image authentication IEICE Transaction Fundamentals E90-A 5 2007 1045 1054
-
(2007)
IEICE Transaction Fundamentals
, vol.90
, Issue.5
, pp. 1045-1054
-
-
Ishihara, N.1
Abe, K.2
-
15
-
-
67949090392
-
-
PhD thesis, Faculty of Computer Science and Engineering, Ghulam Ishaq Khan Institute of Engineering Sciences and Technology
-
A. Khan, Intelligent perceptual shaping of a digital watermark, PhD thesis, Faculty of Computer Science and Engineering, Ghulam Ishaq Khan Institute of Engineering Sciences and Technology, 2006.
-
(2006)
Intelligent Perceptual Shaping of A Digital Watermark
-
-
Khan, A.1
-
16
-
-
85013615185
-
A Novel approach to decoding: Exploiting anticipated attack information using genetic programming
-
A. Khan A Novel approach to decoding: exploiting anticipated attack information using genetic programming International Journal of Knowledge-Based Intelligent Engineering System 10 5 2006 337 347
-
(2006)
International Journal of Knowledge-Based Intelligent Engineering System
, vol.10
, Issue.5
, pp. 337-347
-
-
Khan, A.1
-
17
-
-
34249668816
-
Genetic perceptual shaping: Utilizing cover image and conceivable attack information during watermark embedding
-
A. Khan, and Anwar M. Mirza Genetic perceptual shaping: Utilizing cover image and conceivable attack information during watermark embedding Information Fusion, Elsevier Science 8 4 2007 354 365
-
(2007)
Information Fusion, Elsevier Science
, vol.8
, Issue.4
, pp. 354-365
-
-
Khan, A.1
Mirza, A.M.2
-
19
-
-
43049171623
-
Machine learning based adaptive watermark decoding in view of an anticipated attack
-
A. Khan, S.F. Tahir, A. Majid, and Tae-Sun Choi Machine learning based adaptive watermark decoding in view of an anticipated attack Pattern Recognition, Elsevier Science 41 2008 2594 2610
-
(2008)
Pattern Recognition, Elsevier Science
, vol.41
, pp. 2594-2610
-
-
Khan, A.1
Tahir, S.F.2
Majid, A.3
Choi, T.-S.4
-
20
-
-
10444227184
-
A novel semi-fragile watermarking technique for image authentication
-
Honolulu, Hawaii
-
C.C. Ko and C.H. Huang, A novel semi-fragile watermarking technique for image authentication, Proceeding of the 6th IASTED International Conference on Signal and Image Processing (SIP'04), Honolulu, Hawaii, 2004, pp. 24-29.
-
(2004)
Proceeding of the 6th IASTED International Conference on Signal and Image Processing (SIP'04)
, pp. 24-29
-
-
Ko, C.C.1
Huang, C.H.2
-
21
-
-
2342509607
-
Object watermarks for digital images and video
-
X. Kong, Y. Liu, H. Liu, and D. Yang Object watermarks for digital images and video Image Vision Computing, Elsevier Sciences 22 8 2004 583 595
-
(2004)
Image Vision Computing, Elsevier Sciences
, vol.22
, Issue.8
, pp. 583-595
-
-
Kong, X.1
Liu, Y.2
Liu, H.3
Yang, D.4
-
22
-
-
0032648596
-
Digital watermarking for telltale tamper proofing and authentication
-
D. Kundur and D. Hatzinakos, Digital watermarking for telltale tamper proofing and authentication, in: Proceeding of IEEE 87, vol. 7, 1999, pp. 1167-1180.
-
(1999)
Proceeding of IEEE 87
, vol.7
, pp. 1167-1180
-
-
Kundur, D.1
Hatzinakos, D.2
-
23
-
-
14344265162
-
Digital Fragile Watermarking Scheme for Authentication of JPEG Images
-
C.-T. Li Digital Fragile Watermarking Scheme for Authentication of JPEG Images IEE Proceedings-Vision, Image, and Signal Processing 151 6 2004 60 466
-
(2004)
IEE Proceedings-Vision, Image, and Signal Processing
, vol.151
, Issue.6
, pp. 60-466
-
-
Li, C.-T.1
-
24
-
-
34248667015
-
Wavelet-based fragile watermarking scheme for image authentication
-
C.-T. Li, and H. Si Wavelet-based fragile watermarking scheme for image authentication Journal of Electronic Imaging 16 1 2007 013009-1-013009-9
-
(2007)
Journal of Electronic Imaging
, vol.16
, Issue.1
-
-
Li, C.-T.1
Si, H.2
-
25
-
-
33947277938
-
Digital watermarking scheme exploiting non-deterministic dependence for image authentication
-
C.-T. Li, and Y. Yuan Digital watermarking scheme exploiting non-deterministic dependence for image authentication Optical Engineering 45 12 2006 127001-1 127001-6
-
(2006)
Optical Engineering
, vol.45
, Issue.12
, pp. 1270011-1270016
-
-
Li, C.-T.1
Yuan, Y.2
-
26
-
-
0034776206
-
Image tamper detection and recovery system based on discrete wavelet transformation
-
K.F. Li, T.S. Chen, and S.C. Wu, Image tamper detection and recovery system based on discrete wavelet transformation, in: Proceedings of the International Conference on Communications, Computers, and Signal Processing, vol. 1, 2001.
-
(2001)
Proceedings of the International Conference on Communications, Computers, and Signal Processing
, vol.1
-
-
Li, K.F.1
Chen, T.S.2
Wu, S.C.3
-
27
-
-
0033688392
-
Semi-fragile watermarking for authentication JPEG visual content
-
San Jose, CA 3971
-
C.Y. Lin and S.F. Chang, Semi-fragile watermarking for authentication JPEG visual content, Proceeding of the SPIE, San Jose, CA 3971, 2000, pp. 140-151.
-
(2000)
Proceeding of the SPIE
, pp. 140-151
-
-
Lin, C.Y.1
Chang, S.F.2
-
28
-
-
67650963693
-
Wavelet-based copyright-protection scheme for digital images based on local features
-
T-C. Lin, and M-C. Lin Wavelet-based copyright-protection scheme for digital images based on local features Information Sciences, Elsevier Science 179 19 2009 3349 3358
-
(2009)
Information Sciences, Elsevier Science
, vol.179
, Issue.19
, pp. 3349-3358
-
-
Lin, T.-C.1
Lin, M.-C.2
-
29
-
-
39749199029
-
Martin Steinebach, Semi-fragile watermarking for image authentication with high tampering localization capability
-
H. Liu, Martin Steinebach, Semi-fragile watermarking for image authentication with high tampering localization capability, in: Proceedings of the Second International Conference on Automated Production of Cross Media Content for Multi-Channel Distribution, IEEE, 2006, 143-152.
-
(2006)
Proceedings of the Second International Conference on Automated Production of Cross Media Content for Multi-Channel Distribution, IEEE
, pp. 143-152
-
-
Liu, H.1
-
31
-
-
3042596485
-
A digital watermarking algorithm using correlation of the tree structure of DWT coefficients
-
Y.H. Seo, S.Y. Choi, S.H. Park, and D.W. Kim A digital watermarking algorithm using correlation of the tree structure of DWT coefficients IEICE Transactions Fundamentals E87-A 6 2004 1354 1374
-
(2004)
IEICE Transactions Fundamentals
, vol.87
, Issue.6
, pp. 1354-1374
-
-
Seo, Y.H.1
Choi, S.Y.2
Park, S.H.3
Kim, D.W.4
-
32
-
-
0346216903
-
Genetic watermarking based on transform-domain techniques
-
C-S. Shieh, H-C. Huang, F-H. Wang, and J-S. Pan Genetic watermarking based on transform-domain techniques Pattern Recognition, Elsevier Science 37 2004 555 565
-
(2004)
Pattern Recognition, Elsevier Science
, vol.37
, pp. 555-565
-
-
Shieh, C.-S.1
Huang, H.-C.2
Wang, F.-H.3
Pan, J.-S.4
-
33
-
-
24144463679
-
Robust watermarking and compression for medical images based on genetic algorithms
-
F.Y. Shih, and Yi-Ta Wu Robust watermarking and compression for medical images based on genetic algorithms Information Sciences, Elsevier Science 175 2005 200 216
-
(2005)
Information Sciences, Elsevier Science
, vol.175
, pp. 200-216
-
-
Shih, F.Y.1
Wu, Y.-T.2
-
35
-
-
0037402146
-
A comparative study of digital watermarking in JPEG and JPEG2000 environment
-
M.A. Suhail, M.S. Obaidat, S.S. Ipson, and B. Sadoun A comparative study of digital watermarking in JPEG and JPEG2000 environment Information Sciences, Elsevier Science 151 2003 93 105
-
(2003)
Information Sciences, Elsevier Science
, vol.151
, pp. 93-105
-
-
Suhail, M.A.1
Obaidat, M.S.2
Ipson, S.S.3
Sadoun, B.4
-
36
-
-
8344236008
-
Fragile image watermarking using a gradient image for improved localization and security
-
S. Suthaharan Fragile image watermarking using a gradient image for improved localization and security Pattern Recognition Letters, Elsevier Science 25 16 2004 1893 1903
-
(2004)
Pattern Recognition Letters, Elsevier Science
, vol.25
, Issue.16
, pp. 1893-1903
-
-
Suthaharan, S.1
-
37
-
-
0033881579
-
Perceptually tuned robust watermarking scheme for digital images
-
S. Suthaharan, S.W. Kim, H.K. Lee, and S. Sathananthan Perceptually tuned robust watermarking scheme for digital images Pattern Recognition Letters, Elsevier Science 21 2 2000 139 145
-
(2000)
Pattern Recognition Letters, Elsevier Science
, vol.21
, Issue.2
, pp. 139-145
-
-
Suthaharan, S.1
Kim, S.W.2
Lee, H.K.3
Sathananthan, S.4
-
39
-
-
0033689971
-
Secure digital photograph handling with watermarking technique in insurance claim process
-
K. Toyokawa, N. Morimoto, S. Tonegawa, K. Kamijo, and A. Koide, Secure digital photograph handling with watermarking technique in insurance claim process, in: Proceedings of the SPIE, 3971 2000, pp. 438-445.
-
(2000)
Proceedings of the SPIE
, vol.3971
, pp. 438-445
-
-
Toyokawa, K.1
Morimoto, N.2
Tonegawa, S.3
Kamijo, K.4
Koide, A.5
-
40
-
-
0038729637
-
Detecting and restoring the tampered images based on iteration-free fractal compression
-
C.T. Wang, T.S. Chen, and S.H. He Detecting and restoring the tampered images based on iteration-free fractal compression Journal of Systems and Software 67 2003 131 140
-
(2003)
Journal of Systems and Software
, vol.67
, pp. 131-140
-
-
Wang, C.T.1
Chen, T.S.2
He, S.H.3
-
41
-
-
34047136082
-
Multiuser-based shadow watermark extraction system
-
F-H. Wang, K.K. Yen, L.C. Jain, and J-S. Pan Multiuser-based shadow watermark extraction system Information Sciences, Elsevier Science 177 12 2007 2522 2532
-
(2007)
Information Sciences, Elsevier Science
, vol.177
, Issue.12
, pp. 2522-2532
-
-
Wang, F.-H.1
Yen, K.K.2
Jain, L.C.3
Pan, J.-S.4
-
42
-
-
0242414172
-
Visual optimization of DCT quantization matrices for individual images
-
San Diego, CA
-
A.B. Watson, Visual optimization of DCT quantization matrices for individual images, in: Proceedings of the AIAA Computing in Aerospace 9, San Diego, CA, 1993, pp. 286-291.
-
(1993)
Proceedings of the AIAA Computing in Aerospace 9
, pp. 286-291
-
-
Watson, A.B.1
-
43
-
-
33244461499
-
Multiresolution fragile watermarking using complex chirp signals for content authentication
-
D. Yu, F. Sattar, and B. Barkat Multiresolution fragile watermarking using complex chirp signals for content authentication Pattern Recognition, Elsevier Science 39 5 2006 935 952
-
(2006)
Pattern Recognition, Elsevier Science
, vol.39
, Issue.5
, pp. 935-952
-
-
Yu, D.1
Sattar, F.2
Barkat, B.3
|