-
1
-
-
0036611838
-
Hierarchical watermarking for secure image authentication with localization
-
June
-
M.U. Celik, G. Sharmar, and A.M. Tekalp Hierarchical watermarking for secure image authentication with localization IEEE Transactions on Image Processing 11 June (6) 2002 585 594
-
(2002)
IEEE Transactions on Image Processing
, vol.11
, Issue.6
, pp. 585-594
-
-
Celik, M.U.1
Sharmar, G.2
Tekalp, A.M.3
-
2
-
-
33750303836
-
An efficient image authentication method based on Hamming code
-
February
-
C.S. Chan, and C.C. Chang An efficient image authentication method based on Hamming code Pattern Recognition 40 February (2) 2007 681 690
-
(2007)
Pattern Recognition
, vol.40
, Issue.2
, pp. 681-690
-
-
Chan, C.S.1
Chang, C.C.2
-
3
-
-
1442357585
-
Robust image authentication using content based compression
-
August
-
E.C. Chang, M.S. Kankanhalli, X. Guan, Z.Y. Huang, and Y.H. Wu Robust image authentication using content based compression ACM Multimedia System Journal 9 August (2) 2003 121 130
-
(2003)
ACM Multimedia System Journal
, vol.9
, Issue.2
, pp. 121-130
-
-
Chang, E.C.1
Kankanhalli, M.S.2
Guan, X.3
Huang, Z.Y.4
Wu, Y.H.5
-
4
-
-
1842528982
-
A chaos-based robust wavelet-domain watermarking algorithm
-
Z. Dawei, C. Guanrong, and L. Wenbo A chaos-based robust wavelet-domain watermarking algorithm Chaos, Solitons and Fractals 22 October 2004 47 54
-
(2004)
Chaos, Solitons and Fractals
, vol.22
, pp. 47-54
-
-
Dawei, Z.1
Guanrong, C.2
Wenbo, L.3
-
6
-
-
0036030626
-
Security of fragile authentication watermarks with localization
-
DOI 10.1117/12.465330
-
J. Fridrich Security of fragile authentication watermarks with localization Proceedings of SPIE Conference on Security and Watermarking of Multimedia Contents, vol. 4675 San Jose, California, April 2002 2002 691 700 (Pubitemid 35229742)
-
(2002)
Proceedings of SPIE - The International Society for Optical Engineering
, vol.4675
, pp. 691-700
-
-
Fridrich, J.1
-
7
-
-
0034443602
-
New fragile authentication watermark for images
-
J. Fridrich, M. Goljan, and A.C. Baldoza New fragile authentication watermark for images Proceeding of IEEE International Conference on Image Processing, vol. 1 Vancouver, Canada, 2000 2000 446 449 (Pubitemid 32465899)
-
(2000)
IEEE International Conference on Image Processing
, vol.1
, pp. 446-449
-
-
Fridrich, J.1
Goljan, M.2
Baldoza, A.C.3
-
8
-
-
84943817322
-
Error detecting and error correcting codes
-
April
-
R.W. Hamming Error detecting and error correcting codes Bell System Technical Journal 26 April (2) 1950 147 160
-
(1950)
Bell System Technical Journal
, vol.26
, Issue.2
, pp. 147-160
-
-
Hamming, R.W.1
-
9
-
-
77449085413
-
Probability-based tampering detection scheme for digital images
-
C.S. Hsu, and S.F. Tu Probability-based tampering detection scheme for digital images Optics Communications 283 May 2010 May 1737 1743
-
(2010)
Optics Communications
, vol.283
, Issue.MAY
, pp. 1737-1743
-
-
Hsu, C.S.1
Tu, S.F.2
-
10
-
-
0033601658
-
Issues and solutions for authenticating MPEG video
-
San Jose, CA, January 1999
-
C.Y. Lin, and S.F. Chang Issues and solutions for authenticating MPEG video Proceedings of SPIE on Security and Watermarking for Multimedia Contents, vol. 3657 San Jose, CA, January 1999 1999 54 65
-
(1999)
Proceedings of SPIE on Security and Watermarking for Multimedia Contents, Vol. 3657
, pp. 54-65
-
-
Lin, C.Y.1
Chang, S.F.2
-
11
-
-
0035248504
-
A robust image authentication method distinguishing JPEG compression from malicious manipulation
-
February
-
C.Y. Lin, and S.F. Chang A robust image authentication method distinguishing JPEG compression from malicious manipulation IEEE Transactions on Circuits and Systems for Video Technology 11 February (2) 2001 153 168
-
(2001)
IEEE Transactions on Circuits and Systems for Video Technology
, vol.11
, Issue.2
, pp. 153-168
-
-
Lin, C.Y.1
Chang, S.F.2
-
12
-
-
25144448272
-
A hierarchical digital watermarking method for image tamper detection and recovery
-
DOI 10.1016/j.patcog.2005.02.007, PII S0031320305000890
-
P.L. Lin, C.K. Hsieh, and P.W. Huang A hierarchical digital watermarking method for image tamper detection and recovery Pattern Recognition 38 December (12) 2005 2519 2529 (Pubitemid 41336720)
-
(2005)
Pattern Recognition
, vol.38
, Issue.12
, pp. 2519-2529
-
-
Lin, P.L.1
Hsieh, C.-K.2
Huang, P.-W.3
-
14
-
-
33847280382
-
An image fragile watermark scheme based on chaotic image pattern and pixel-pairs
-
February
-
S.H. Liu, H.X. Yao, W. Gao, and Y.L. Liu An image fragile watermark scheme based on chaotic image pattern and pixel-pairs Applied Mathematics and Computation 185 February (2) 2007 869 882
-
(2007)
Applied Mathematics and Computation
, vol.185
, Issue.2
, pp. 869-882
-
-
Liu, S.H.1
Yao, H.X.2
Gao, W.3
Liu, Y.L.4
-
15
-
-
33750491245
-
Robust digital image watermarking based on subsampling
-
DOI 10.1016/j.amc.2006.02.012, PII S0096300306001688
-
W. Lu, H. Lu, and F.L. Chung Robust digital image watermarking based on subsampling Applied Mathematics and Computation 181 October (2) 2006 886 893 (Pubitemid 44646566)
-
(2006)
Applied Mathematics and Computation
, vol.181
, Issue.2
, pp. 886-893
-
-
Lu, W.1
Lu, H.2
Chung, F.-L.3
-
16
-
-
27644475510
-
Generation and detection of watermarks derived from chaotic functions
-
DOI 10.1117/12.605983, 07, Opto-Ireland 2005: Imaging and Vision
-
A. Mooney, and J.G. Keating Generation and detection of watermarks derived from chaotic functions Proceedings of Opto-Ireland 2005: Imaging and Vision, vol. 5823 Dublin, June 2005 2005 58 69 (Pubitemid 41565733)
-
(2005)
Proceedings of SPIE - The International Society for Optical Engineering
, vol.5823
, pp. 58-69
-
-
Mooney, A.1
Keating, J.G.2
-
17
-
-
35248861265
-
A comparative study of chaotic and white noise signals in digital watermarking
-
DOI 10.1016/j.chaos.2006.05.073, PII S0960077906005340
-
A. Mooney, J.G. Keating, and I. Pitas A comparative study of chaotic and white noise signals in digital watermarking Chaos, Solitons and Fractals 35 March (5) 2008 913 921 (Pubitemid 47562749)
-
(2008)
Chaos, Solitons and Fractals
, vol.35
, Issue.5
, pp. 913-921
-
-
Mooney, A.1
Keating, J.G.2
Pitas, I.3
-
18
-
-
0042823356
-
Wavelet packets-based digital watermarking for image verification and authentication
-
October
-
A.H. Paquet, R.K. Ward, and I. Pitas Wavelet packets-based digital watermarking for image verification and authentication Signal Processing l83 October (10) 2003 2117 2132
-
(2003)
Signal Processing
, vol.83 L
, Issue.10
, pp. 2117-2132
-
-
Paquet, A.H.1
Ward, R.K.2
Pitas, I.3
-
19
-
-
38349119511
-
Color image authentication based on spatiotemporal chaos and SVD
-
May
-
Z. Peng, and W. Liu Color image authentication based on spatiotemporal chaos and SVD Chaos, Solitons and Fractals 36 May (4) 2008 946 952
-
(2008)
Chaos, Solitons and Fractals
, vol.36
, Issue.4
, pp. 946-952
-
-
Peng, Z.1
Liu, W.2
-
21
-
-
0037513449
-
A feature-based robust digital image watermarking scheme
-
April
-
C.W. Tang, and H.M. Hang A feature-based robust digital image watermarking scheme IEEE Transactions on Signal Processing 51 April (4) 2003 950 958
-
(2003)
IEEE Transactions on Signal Processing
, vol.51
, Issue.4
, pp. 950-958
-
-
Tang, C.W.1
Hang, H.M.2
-
22
-
-
0035369792
-
Attack modelling: Towards a second generation watermarking benchmark
-
DOI 10.1016/S0165-1684(01)00039-1, PII S0165168401000391
-
S. Voloshynovskiy, S. Pereira, V. Iquise, and T. Pun Attack modeling: toward a second generation watermarking benchmark Signal Processing 81 June (6) 2001 1177 1214 (Pubitemid 32509289)
-
(2001)
Signal Processing
, vol.81
, Issue.6
, pp. 1177-1214
-
-
Voloshynovskiy, S.1
Pereira, S.2
Iquise, V.3
Pun, T.4
-
23
-
-
0033682895
-
Secret and public key authentication watermarking schemes that resist vector quantization attack
-
San Jose, California, USA, January 2000
-
P. Wong, and N. Memon Secret and public key authentication watermarking schemes that resist vector quantization attack Proceedings of SPIE on Security and Watermarking of Multimedia Contents, vol. 3971 San Jose, California, USA, January 2000 2000 417 427
-
(2000)
Proceedings of SPIE on Security and Watermarking of Multimedia Contents, Vol. 3971
, pp. 417-427
-
-
Wong, P.1
Memon, N.2
-
24
-
-
0031378592
-
An invisible watermarking technique for image verification
-
Santa Barbara, California, October 1997
-
M. Yeung, and F. Mintzer An invisible watermarking technique for image verification Proceeding of IEEE International Conference on Image Processing, vol. 2 Santa Barbara, California, October 1997 1997 680 683
-
(1997)
Proceeding of IEEE International Conference on Image Processing, Vol. 2
, pp. 680-683
-
-
Yeung, M.1
Mintzer, F.2
|