-
1
-
-
75249099043
-
A secure and Robust Hash-based scheme for image authentication
-
F. Ahmed, M.Y. Siyal, and V.U. Abbas A secure and Robust Hash-based scheme for image authentication Signal Process. 90 2010 1456 1470
-
(2010)
Signal Process.
, vol.90
, pp. 1456-1470
-
-
Ahmed, F.1
Siyal, M.Y.2
Abbas, V.U.3
-
2
-
-
33750303836
-
An efficient image authentication method based on hamming code
-
C.S. Chan, and C.C. Chang An efficient image authentication method based on hamming code Pattern Recognition 40 2 2007 681 690
-
(2007)
Pattern Recognition
, vol.40
, Issue.2
, pp. 681-690
-
-
Chan, C.S.1
Chang, C.C.2
-
3
-
-
0742288850
-
A watermarking scheme based on principal component analysis technique
-
C.C. Chang, and C.S. Chan A watermarking scheme based on principal component analysis technique Informatica 14 4 2003 431 444
-
(2003)
Informatica
, vol.14
, Issue.4
, pp. 431-444
-
-
Chang, C.C.1
Chan, C.S.2
-
4
-
-
34848926024
-
Four-scanning attack on hierarchical digital watermarking method for image tamper detection and recovery
-
C.C. Chang, Y.H. Fan, and W.L. Tai Four-scanning attack on hierarchical digital watermarking method for image tamper detection and recovery Pattern Recognition 41 2008 654 661
-
(2008)
Pattern Recognition
, vol.41
, pp. 654-661
-
-
Chang, C.C.1
Fan, Y.H.2
Tai, W.L.3
-
5
-
-
0036611838
-
Hierarchical watermarking for secure image authentication with localization
-
M.U. Celik, G. Sharmar, and A.M. Tekalp Hierarchical watermarking for secure image authentication with localization IEEE Trans. Image Process. 11 6 2002 585 594
-
(2002)
IEEE Trans. Image Process.
, vol.11
, Issue.6
, pp. 585-594
-
-
Celik, M.U.1
Sharmar, G.2
Tekalp, A.M.3
-
6
-
-
84943817322
-
Error detecting and error correcting codes
-
R.W. Hamming Error detecting and error correcting codes Bell System Tech. J. 26 2 1950 147 160
-
(1950)
Bell System Tech. J.
, vol.26
, Issue.2
, pp. 147-160
-
-
Hamming, R.W.1
-
7
-
-
0037818310
-
Structural digital signature for image authentication: An incidental distortion resistant scheme
-
C.S. Lu, and H.Y. Liao Structural digital signature for image authentication: An incidental distortion resistant scheme IEEE Trans. Multimedia 5 2 2003 161 173
-
(2003)
IEEE Trans. Multimedia
, vol.5
, Issue.2
, pp. 161-173
-
-
Lu, C.S.1
Liao, H.Y.2
-
8
-
-
48149100935
-
Dual watermark for image tamper detection and recovery
-
T.Y. Lee, and S.D. Lin Dual watermark for image tamper detection and recovery Pattern Recognition 41 2008 3497 3506
-
(2008)
Pattern Recognition
, vol.41
, pp. 3497-3506
-
-
Lee, T.Y.1
Lin, S.D.2
-
9
-
-
77955417038
-
A novel DCT domain CRT-based watermarking scheme for image authentication surviving JPEG compression
-
J.C. Patra, J.E. Phua, and C. Bornand A novel DCT domain CRT-based watermarking scheme for image authentication surviving JPEG compression Digital Signal Process. 20 2010 1597 1611
-
(2010)
Digital Signal Process.
, vol.20
, pp. 1597-1611
-
-
Patra, J.C.1
Phua, J.E.2
Bornand, C.3
-
11
-
-
0142029533
-
Using set partitioning in hierarchical trees to authenticate digital image
-
P.Y. Tsai, Y.C. Hu, and C.C. Chang Using set partitioning in hierarchical trees to authenticate digital image Signal Process.: Image Comm. J. 18 2003 813 822
-
(2003)
Signal Process.: Image Comm. J.
, vol.18
, pp. 813-822
-
-
Tsai, P.Y.1
Hu, Y.C.2
Chang, C.C.3
-
12
-
-
0345356532
-
A color image watermarking scheme based on color quantization
-
P.Y. Tsai, Y.C. Hu, and C.C. Chang A color image watermarking scheme based on color quantization Signal Process. 84 4 2004 95 106
-
(2004)
Signal Process.
, vol.84
, Issue.4
, pp. 95-106
-
-
Tsai, P.Y.1
Hu, Y.C.2
Chang, C.C.3
-
13
-
-
0142057129
-
A simple high-hiding capacity method for hiding digit-by-digit data in images based on modulus function
-
C.C. Thien, and J.C. Lin A simple high-hiding capacity method for hiding digit-by-digit data in images based on modulus function Pattern Recognition 36 12 2003 2875 2881
-
(2003)
Pattern Recognition
, vol.36
, Issue.12
, pp. 2875-2881
-
-
Thien, C.C.1
Lin, J.C.2
-
14
-
-
0000861888
-
Chaotic mixing of digital images applications to watermarking
-
G. Voyatzis, and I. Pitas Chaotic mixing of digital images applications to watermarking Proc. Eur. Conf. Multimedia Appl. 2 1996 687 695
-
(1996)
Proc. Eur. Conf. Multimedia Appl.
, vol.2
, pp. 687-695
-
-
Voyatzis, G.1
Pitas, I.2
-
15
-
-
12344332735
-
An adjusted-purpose digital watermarking technique
-
Y.T. Wu, and Y.F. Shih An adjusted-purpose digital watermarking technique Pattern Recognition 37 12 2004 2349 2359
-
(2004)
Pattern Recognition
, vol.37
, Issue.12
, pp. 2349-2359
-
-
Wu, Y.T.1
Shih, Y.F.2
-
16
-
-
34848924292
-
Automatic image authentication recovery using fractal code embedding image inpainting
-
S.S. Wang, and S.L. Tsai Automatic image authentication recovery using fractal code embedding image inpainting Pattern Recognition 41 2008 701 712
-
(2008)
Pattern Recognition
, vol.41
, pp. 701-712
-
-
Wang, S.S.1
Tsai, S.L.2
-
17
-
-
69249216337
-
Recover the tampered image based on VQ indexing
-
C.W. Yang, and J.J. Shen Recover the tampered image based on VQ indexing Signal Process. 90 2010 331 343
-
(2010)
Signal Process.
, vol.90
, pp. 331-343
-
-
Yang, C.W.1
Shen, J.J.2
|