-
2
-
-
0032206554
-
An effective codebook search algorithm for vector quantization
-
C.C. Chang, and Y.C. Hu An effective codebook search algorithm for vector quantization IEEE Transactions on Consumer Electronics 44 4 1998 1201 1208
-
(1998)
IEEE Transactions on Consumer Electronics
, vol.44
, Issue.4
, pp. 1201-1208
-
-
Chang, C.C.1
Hu, Y.C.2
-
3
-
-
0348225868
-
An effective codebook search algorithm for vector quantization
-
Y.C. Hu, and C.C. Chang An effective codebook search algorithm for vector quantization Imaging Science Journal 51 4 2003 221 234
-
(2003)
Imaging Science Journal
, vol.51
, Issue.4
, pp. 221-234
-
-
Hu, Y.C.1
Chang, C.C.2
-
4
-
-
39749177817
-
Fast VQ codebook search algorithm for grayscale image coding
-
Y.C. Hu, B.H. Su, and C.C. Tsoug Fast VQ codebook search algorithm for grayscale image coding Image and Vision Computing 26 5 2008 657 666
-
(2008)
Image and Vision Computing
, vol.26
, Issue.5
, pp. 657-666
-
-
Hu, Y.C.1
Su, B.H.2
Tsoug, C.C.3
-
5
-
-
58149508179
-
Fast VQ codebook generation method using codeword stability check and finite state concept
-
P.Y. Tsai, Y.C. Hu, and H.L. Yeh Fast VQ codebook generation method using codeword stability check and finite state concept Fundamenta Informaticae 87 3-4 2008 447 463
-
(2008)
Fundamenta Informaticae
, vol.87
, Issue.34
, pp. 447-463
-
-
Tsai, P.Y.1
Hu, Y.C.2
Yeh, H.L.3
-
6
-
-
78650747940
-
Efficient grayscale image compression technique based on VQ
-
Y.C. Hu, J.C. Chuang, C.C. Lo, and C.Y. Lee Efficient grayscale image compression technique based on VQ Opto-Electronics Review 19 1 2011 104 113
-
(2011)
Opto-Electronics Review
, vol.19
, Issue.1
, pp. 104-113
-
-
Hu, Y.C.1
Chuang, J.C.2
Lo, C.C.3
Lee, C.Y.4
-
7
-
-
0017930809
-
Method for obtaining digital signatures and public-key cryptosystems
-
DOI 10.1145/359340.359342
-
R.L. Riverst, A. Shamir, and L. Adleman A method for obtaining digital signatures and public-key cryptosystems ACM Truncation on Communications 21 2 1978 120 126 (Pubitemid 8591219)
-
(1978)
Communications of the ACM
, vol.21
, Issue.2
, pp. 120-126
-
-
Rivest, R.L.1
Shamir, A.2
Adleman, L.3
-
8
-
-
0002500694
-
Image authentication techniques for surveillance applications
-
PII S0018921901084298
-
F. Bartolini, A. Tefas, M. Bami, and I. Pitas Pitas, Image authentication techniques for surveillance applications Proceedings of the IEEE 89 10 2001 1403 1418 (Pubitemid 33766629)
-
(2001)
Proceedings of the IEEE
, vol.89
, Issue.10
, pp. 1403-1418
-
-
Bartolini, F.1
Tefas, A.2
Barni, M.3
Pitas, I.4
-
9
-
-
0034140535
-
Fault resilient and compression tolerant digital signature for image authentication
-
D.C. Lou, and J.L. Liu Fault resilient and compression tolerant digital signature for image authentication IEEE Transactions on Consumer Electronics 46 1 2000 31 39
-
(2000)
IEEE Transactions on Consumer Electronics
, vol.46
, Issue.1
, pp. 31-39
-
-
Lou, D.C.1
Liu, J.L.2
-
11
-
-
27844494781
-
A novel image authentication scheme based on quadtree segmentation
-
P.Y. Tsai, Y.C. Hu, and C.C. Chang A novel image authentication scheme based on quadtree segmentation Imaging Science Journal 53 3 2005 149 162
-
(2005)
Imaging Science Journal
, vol.53
, Issue.3
, pp. 149-162
-
-
Tsai, P.Y.1
Hu, Y.C.2
Chang, C.C.3
-
12
-
-
33750303836
-
An efficient image authentication method based on Hamming code
-
C.S. Chan, and C.C. Chang An efficient image authentication method based on Hamming code Pattern Recognition 40 2007 681 691
-
(2007)
Pattern Recognition
, vol.40
, pp. 681-691
-
-
Chan, C.S.1
Chang, C.C.2
-
13
-
-
0035248504
-
A robust image authentication method distinguish JPEG compression from malicious manipulation
-
C.Y. Lin, and S.F. Chang A robust image authentication method distinguish JPEG compression from malicious manipulation IEEE Transactions on Circuits and Systems of Video Technology 11 2 2001 153 168
-
(2001)
IEEE Transactions on Circuits and Systems of Video Technology
, vol.11
, Issue.2
, pp. 153-168
-
-
Lin, C.Y.1
Chang, S.F.2
-
14
-
-
0035473830
-
Multipurpose watermarking for image authentication and protection
-
C.S. Lu, and H.Y.M. Laio Multipurpose watermarking for image authentication and protection IEEE Transactions on Image Processing 10 10 2001 435 439
-
(2001)
IEEE Transactions on Image Processing
, vol.10
, Issue.10
, pp. 435-439
-
-
Lu, C.S.1
Laio, H.Y.M.2
-
15
-
-
0035473831
-
Secret and public key image watermarking schemes for image authentication and ownership verification
-
DOI 10.1109/83.951543, PII S1057714901082094
-
P.W. Wong, and N. Memon Secret and public key image watermarking schemes for image authentication and ownership verification IEEE Transactions on Image Processing 10 10 2001 1593 1601 (Pubitemid 32981831)
-
(2001)
IEEE Transactions on Image Processing
, vol.10
, Issue.10
, pp. 1593-1601
-
-
Wong, P.W.1
Memon, N.2
-
16
-
-
33748119112
-
Dual protection of JPEG images based on informed embedding and two-stage watermark extraction techniques
-
W.N. Lie, G.S. Lin, and S.L. Chen Dual protection of JPEG images based on informed embedding and two-stage watermark extraction techniques IEEE Transactions on Information Forensics and Security 1 3 2006 330 341
-
(2006)
IEEE Transactions on Information Forensics and Security
, vol.1
, Issue.3
, pp. 330-341
-
-
Lie, W.N.1
Lin, G.S.2
Chen, S.L.3
-
17
-
-
32644434350
-
A watermarking-based image ownership and tampering authentication scheme
-
C.C. Chang, Y.S. Hu, and T.C. Lu A watermarking-based image ownership and tampering authentication scheme Pattern Recognition Letters 27 5 2006 439 446
-
(2006)
Pattern Recognition Letters
, vol.27
, Issue.5
, pp. 439-446
-
-
Chang, C.C.1
Hu, Y.S.2
Lu, T.C.3
-
18
-
-
40549093361
-
Fragility and robustness of binary-phase-only-filter-based fragile/ semifragile digital image watermarking
-
DOI 10.1109/TIM.2007.911585
-
S. Jun, and M.S. Alam Fragility and robustness of binary-phase-only- filter-based fragile/semifragile digital image watermarking IEEE Transactions on Instrumentation and Measurement 57 3 2008 595 606 (Pubitemid 351359254)
-
(2008)
IEEE Transactions on Instrumentation and Measurement
, vol.57
, Issue.3
, pp. 595-606
-
-
Sang, J.1
Alam, M.S.2
-
19
-
-
48149100935
-
Dual watermark for image tamper detection and recovery
-
T.Y. Lee, and S.D. Lin Dual watermark for image tamper detection and recovery Pattern Recognition 41 11 2008 3497 3506
-
(2008)
Pattern Recognition
, vol.41
, Issue.11
, pp. 3497-3506
-
-
Lee, T.Y.1
Lin, S.D.2
-
20
-
-
48149104075
-
Tampering with a watermarking-based image authentication
-
R.C.W. Phan Tampering with a watermarking-based image authentication Pattern Recognition 41 11 2008 2493 3496
-
(2008)
Pattern Recognition
, vol.41
, Issue.11
, pp. 2493-3496
-
-
Phan, R.C.W.1
-
21
-
-
56349129392
-
A fuzzy c-means clustering-based fragile watermarking scheme for image authentication
-
W.C. Chen, and M.S. Wang A fuzzy c-means clustering-based fragile watermarking scheme for image authentication Expert Systems with Applications 36 2 Part 1 2009 1300 1307
-
(2009)
Expert Systems with Applications
, vol.36
, Issue.2 PART 1
, pp. 1300-1307
-
-
Chen, W.C.1
Wang, M.S.2
-
22
-
-
77955417038
-
A novel DCT domain CRT-based watermarking scheme for image authentication surviving JPEG compression
-
J.C. Patra, J.E. Phua, and C. Bornand A novel DCT domain CRT-based watermarking scheme for image authentication surviving JPEG compression Digital Signal Processing 20 6 2010 1597 1611
-
(2010)
Digital Signal Processing
, vol.20
, Issue.6
, pp. 1597-1611
-
-
Patra, J.C.1
Phua, J.E.2
Bornand, C.3
-
23
-
-
79551680643
-
A quantization-based semi-fragile watermarking scheme for image content authentication
-
X. Qi, and X. Xin A quantization-based semi-fragile watermarking scheme for image content authentication Journal of Visual Communication and Image Representation 22 2 2011 187 200
-
(2011)
Journal of Visual Communication and Image Representation
, vol.22
, Issue.2
, pp. 187-200
-
-
Qi, X.1
Xin, X.2
-
24
-
-
77449085413
-
Probability-based tampering detection scheme for digital images
-
C.S. Hsu, and S.F. Tu Probability-based tampering detection scheme for digital images Optical Communications 283 9 2010 1737 1743
-
(2010)
Optical Communications
, vol.283
, Issue.9
, pp. 1737-1743
-
-
Hsu, C.S.1
Tu, S.F.2
-
25
-
-
69249216337
-
Recover the tampered image based on VQ indexing
-
C.W. Yang, and J.J. Shen Recover the tampered image based on VQ indexing Signal Processing 90 1 2010 331 343
-
(2010)
Signal Processing
, vol.90
, Issue.1
, pp. 331-343
-
-
Yang, C.W.1
Shen, J.J.2
-
26
-
-
75249099043
-
A secure and robust hash-based scheme for image authentication
-
F. Ahmed, and NM.Y. Siyal A secure and robust hash-based scheme for image authentication Signal Processing 90 5 2010 1456 1470
-
(2010)
Signal Processing
, vol.90
, Issue.5
, pp. 1456-1470
-
-
Ahmed, F.1
Siyal, N.Y.2
|