-
1
-
-
3843102623
-
Reversible watermark using the difference expansion of a generalized integer trans form
-
A. M. Alattar, Reversible watermark using the difference expansion of a generalized integer trans form, IEEE Transactions on Image Process, vol.13, no.8, pp.1147-1156, 2004.
-
(2004)
IEEE Transactions on Image Process
, vol.13
, Issue.8
, pp. 1147-1156
-
-
Alattar, A.M.1
-
2
-
-
0036611838
-
Hierarchical watermarking for secure image authentication with localization
-
M. U. Celik, G. Sharma, E. Saber and A. M. Tekalp, Hierarchical watermarking for secure image authentication with localization, IEEE Transactions on Image Processing, vol.11, no.6, pp.585-595, 2002.
-
(2002)
IEEE Transactions on Image Processing
, vol.11
, Issue.6
, pp. 585-595
-
-
Celik, M.U.1
Sharma, G.2
Saber, E.3
Tekalp, A.M.4
-
3
-
-
33750303836
-
An efficient image authentication method based on hamming code
-
C. S. Chan and C. C. Chang, An efficient image authentication method based on hamming code, Pattern Recognition, vol.40, no.2, pp.681-690, 2007.
-
(2007)
Pattern Recognition
, vol.40
, Issue.2
, pp. 681-690
-
-
Chan, C.S.1
Chang, C.C.2
-
4
-
-
63549106032
-
DCT-based zero replacement reversible image watermarking approach
-
C. C. Chen and D. S. Kao, DCT-based zero replacement reversible image watermarking approach, International Journal of Innovative Computing, Information and Control, vol.4, no.11, pp.3027-3036, 2008.
-
(2008)
International Journal of Innovative Computing, Information and Control
, vol.4
, Issue.11
, pp. 3027-3036
-
-
Chen, C.C.1
Kao, D.S.2
-
5
-
-
47549103010
-
A GA-based nearly optimal image authentication approach
-
C.C. Chen and C. S. Lin, A GA-based nearly optimal image authentication approach, International Journal of Innovative Computing, Information and Control, vol.3, no.3, pp.631-640, 2007.
-
(2007)
International Journal of Innovative Computing, Information and Control
, vol.3
, Issue.3
, pp. 631-640
-
-
Chen, C.C.1
Lin, C.S.2
-
6
-
-
34147187670
-
Very fast watermarking by reversible contrast mapping
-
D.Coltuc and J. M. Chassery, Very fast watermarking by reversible contrast mapping, IEEE Signal Processing Letters, vol.14, no.4, pp.255-258, 2007.
-
(2007)
IEEE Signal Processing Letters
, vol.14
, Issue.4
, pp. 255-258
-
-
Coltuc, D.1
Chassery, J.M.2
-
7
-
-
0036030626
-
Security of fragile authentication watermarks with localization
-
San Jose, CA
-
J. Fridrich, Security of fragile authentication watermarks with localization, Proc. of the SPIE Conference on Security and Watermarking of Multimedia Contents, San Jose, CA, vol.4675, pp.691-700, 2002.
-
(2002)
Proc. of the SPIE Conference on Security and Watermarking of Multimedia Contents
, vol.4675
, pp. 691-700
-
-
Fridrich, J.1
-
8
-
-
0033872149
-
Counterfeiting attacks on oblivious block-wise independent invisible watermarking schemes
-
M. Holliman and N. Memon, Counterfeiting attacks on oblivious block-wise independent invisible watermarking schemes, IEEE Transactions on Image Processing, vol.9, no.3, pp.432-444, 2000.
-
(2000)
IEEE Transactions on Image Processing
, vol.9
, Issue.3
, pp. 432-444
-
-
Holliman, M.1
Memon, N.2
-
9
-
-
49549108193
-
A novel difference expansion transform for reversible data embedding
-
H. J. Kim, V. Sachnev, Y. Q. Shi, J. Nam and H.-G. Choo, A novel difference expansion transform for reversible data embedding, IEEE Transactions on Information Forensics and Security, vol.3, no.3, pp.456-465, 2008.
-
(2008)
IEEE Transactions on Information Forensics and Security
, vol.3
, Issue.3
, pp. 456-465
-
-
Kim, H.J.1
Sachnev, V.2
Shi, Y.Q.3
Nam, J.4
Choo, H.-G.5
-
10
-
-
49449101106
-
Multilevel reversible data hiding based on histogram modification of difference images
-
C. C. Lin, W. L. Tai and C. C. Chang, Multilevel reversible data hiding based on histogram modification of difference images, Pattern Recognition, vol.41, no.12, pp.3582-3591, 2008.
-
(2008)
Pattern Recognition
, vol.41
, Issue.12
, pp. 3582-3591
-
-
Lin, C.C.1
Tai, W.L.2
Chang, C.C.3
-
11
-
-
33847280382
-
An image fragile watermark scheme based on chaotic image pattern and pixel-pairs
-
S. H. Liu, H. X. Yao, W. Gao and Y. L. Liu, An image fragile watermark scheme based on chaotic image pattern and pixel-pairs, Applied Mathematics and Computation, vol.185, no.2, pp.869-882, 2007.
-
(2007)
Applied Mathematics and Computation
, vol.185
, Issue.2
, pp. 869-882
-
-
Liu, S.H.1
Yao, H.X.2
Gao, W.3
Liu, Y.L.4
-
12
-
-
63649157726
-
A LSB steganography approach against pixels sample pairs steganalysis
-
X. Y. Luo, F. L. Liu and P. Z. Liu, A LSB steganography approach against pixels sample pairs steganalysis, International Journal of Innovative Computing, Information and Control, vol.3, no.3, pp.575-588, 2007.
-
(2007)
International Journal of Innovative Computing, Information and Control
, vol.3
, Issue.3
, pp. 575-588
-
-
Luo, X.Y.1
Liu, F.L.2
Liu, P.Z.3
-
13
-
-
33645157142
-
Reversible data hiding
-
Z. Ni, Y. Q. Shi, N. Ansari and W. Su, Reversible data hiding, IEEE Transactions on Circuits and Systems for Video Technology, vol.16, no.3, pp.354-361, 2006.
-
(2006)
IEEE Transactions on Circuits and Systems for Video Technology
, vol.16
, Issue.3
, pp. 354-361
-
-
Ni, Z.1
Shi, Y.Q.2
Ansari, N.3
Su, W.4
-
15
-
-
77953887246
-
Nonparametric classification of data viz. clustering for extracting color features: An application for image retrieval
-
M. V. Sudhamani and C. R. Venugopal, Nonparametric classification of data viz. clustering for extracting color features: An application for image retrieval, ICIC Express Letters, vol.1, no.l, pp.15-20, 2007.
-
(2007)
ICIC Express Letters
, vol.1
, Issue.1
, pp. 15-20
-
-
Sudhamani, M.V.1
Venugopal, C.R.2
-
16
-
-
0141862029
-
Reversible data embedding using a difference expansion
-
J. Tian, Reversible data embedding using a difference expansion, IEEE Transactions on Circuits Systems for Video Technology, vol.13, no.8, pp.890-896, 2003.
-
(2003)
IEEE Transactions on Circuits Systems for Video Technology
, vol.13
, Issue.8
, pp. 890-896
-
-
Tian, J.1
-
17
-
-
54049152776
-
A novel reversible data hiding scheme
-
S. W. Weng, Y. Zhao and J. S. Pan, A novel reversible data hiding scheme, International Journal of Innovative Computing, Information and Control, vol.4, no.2, pp.351-358, 2008.
-
(2008)
International Journal of Innovative Computing, Information and Control
, vol.4
, Issue.2
, pp. 351-358
-
-
Weng, S.W.1
Zhao, Y.2
Pan, J.S.3
-
18
-
-
8644231988
-
New attacks on sari image authentication system
-
J. H. Wu, B. B. Zhu, S. P. Li and F. Z. Lin, New attacks on sari image authentication system, Proc of the SPIE, vol.5306, pp.602-609, 2004.
-
(2004)
Proc of the SPIE
, vol.5306
, pp. 602-609
-
-
Wu, J.H.1
Zhu, B.B.2
Li, S.P.3
Lin, F.Z.4
-
19
-
-
9644303109
-
One-way hash function construction based on the chaotic map with changeable-parameter
-
D. Xiao, X. F. Liao and S. J. Deng, One-way hash function construction based on the chaotic map with changeable-parameter, Chaos Solitons and Fractals, vol.24, no.l, pp.65-71, 2005.
-
(2005)
Chaos Solitons and Fractals
, vol.24
, Issue.1
, pp. 65-71
-
-
Xiao, D.1
Liao, X.F.2
Deng, S.J.3
-
20
-
-
44449128947
-
Parallel keyed hash function construction based on chaotic maps
-
D. Xiao, X. F. Liao and S. J. Deng, Parallel keyed hash function construction based on chaotic maps, Physics Letters A, vol.372, no.26, pp.4682-4688, 2008.
-
(2008)
Physics Letters A
, vol.372
, Issue.26
, pp. 4682-4688
-
-
Xiao, D.1
Liao, X.F.2
Deng, S.J.3
-
21
-
-
0031378592
-
An invisible watermarking technique for image verification
-
Santa Barbara, CA
-
M. Yeung and F. Mintzer, An invisible watermarking technique for image verification, Proc of the IEEE International Conference on Image Processing, Santa Barbara, CA, vol.2, pp.680-683, 1997.
-
(1997)
Proc of the IEEE International Conference on Image Processing
, vol.2
, pp. 680-683
-
-
Yeung, M.1
Mintzer, F.2
-
22
-
-
22244444503
-
Hash function based on the chaotic tent map
-
X. Yi, Hash function based on the chaotic tent map, IEEE Transactions on Circuits and Systems-II, vol.52, no.6, pp.354-357, 2005.
-
(2005)
IEEE Transactions on Circuits and Systems-II
, vol.52
, Issue.6
, pp. 354-357
-
-
Yi, X.1
-
23
-
-
33846348219
-
Chaotic keyed hash function based on feedforward - Feedback nonlinear digital filter
-
J. S. Zhang, X. M. Wang and W. F. Zhang, Chaotic keyed hash function based on feedforward - Feedback nonlinear digital filter, Physics Letters A, vol.362, no.5-6, pp.439-448, 2007.
-
(2007)
Physics Letters A
, vol.362
, Issue.5-6
, pp. 439-448
-
-
Zhang, J.S.1
Wang, X.M.2
Zhang, W.F.3
-
24
-
-
57749202706
-
Fragile watermarking scheme using a hierarchical mechanism
-
X. P. Zhang and S. Z. Wang, Fragile watermarking scheme using a hierarchical mechanism, Signal Processing, vol.89, no.4, pp.675-679, 2009.
-
(2009)
Signal Processing
, vol.89
, Issue.4
, pp. 675-679
-
-
Zhang, X.P.1
Wang, S.Z.2
|