-
1
-
-
33750303836
-
An efficient image authentication method based on hamming code
-
CHAN, C. S. AND CHANG, C. C. 2007. An efficient image authentication method based on hamming code. Patt. Recogn. 40, 2, 681-690.
-
(2007)
Patt. Recogn.
, vol.40
, Issue.2
, pp. 681-690
-
-
Chan, C.S.1
Chang, C.C.2
-
2
-
-
32644434350
-
A watermarking-based image ownership and tampering authentication scheme
-
CHANG, C. C., HU, Y. S., AND LU, T. C. 2006. A watermarking-based image ownership and tampering authentication scheme. Patt. Recogn. Lett. 27, 5, 439-446.
-
(2006)
Patt. Recogn. Lett.
, vol.27
, Issue.5
, pp. 439-446
-
-
Chang, C.C.1
Hu, Y.S.2
Lu, T.C.3
-
3
-
-
35349002199
-
A fragile watermarking scheme for digital images authentication using pixel-difference
-
CHANG, C. C., LIN, P. Y., AND CHUANG, J. C. 2007. A fragile watermarking scheme for digital images authentication using pixel-difference. Imaging Sci. J. 55, 3, 140-147.
-
(2007)
Imaging Sci. J.
, vol.55
, Issue.3
, pp. 140-147
-
-
Chang, C.C.1
Lin, P.Y.2
Chuang, J.C.3
-
4
-
-
0024753284
-
A binary single-key-lock system for access control
-
CHANG, C. K. AND JIANG, T. M. 1989. A binary single-key-lock system for access control. IEEE Trans. Computers 38, 10, 1462-1466.
-
(1989)
IEEE Trans. Computers
, vol.38
, Issue.10
, pp. 1462-1466
-
-
Chang, C.K.1
Jiang, T.M.2
-
5
-
-
67651102858
-
A secure and improved self-embedding algorithm to combat digital document forgery
-
CHEDDAD, A., CONDELL, J., CURRAN, K., AND KEVITT, P. M. 2009. A secure and improved self-embedding algorithm to combat digital document forgery. Signal Process. 89, 12, 2324-2332.
-
(2009)
Signal Process.
, vol.89
, Issue.12
, pp. 2324-2332
-
-
Cheddad, A.1
Condell, J.2
Curran, K.3
Kevitt, P.M.4
-
6
-
-
33644995185
-
Analysis and design of secure watermark-based authentication systems
-
CHUHONG, F., KUNDUR, D., AND KWONG, R. H. 2006. Analysis and design of secure watermark-based authentication systems. IEEE Trans. Inf. Forensics Security 1, 1, 43-55.
-
(2006)
IEEE Trans. Inf. Forensics Security
, vol.1
, Issue.1
, pp. 43-55
-
-
Chuhong, F.1
Kundur, D.2
Kwong, R.H.3
-
7
-
-
0033703669
-
Further attacks on yeung-mintzer fragile watermarking scheme
-
FRIDRICH, J., GOLJAN, M., AND MEMON, N. 2000. Further attacks on Yeung-Mintzer fragile watermarking scheme. In Proceedings of the SPIE Conference on Security and Watermarking of Multimedia Contents. vol. 3971, 428-437.
-
(2000)
Proceedings of the SPIE Conference on Security and Watermarking of Multimedia Contents
, vol.3971
, pp. 428-437
-
-
Fridrich, J.1
Goljan, M.2
Memon, N.3
-
8
-
-
33750216800
-
Multiple image watermarking applied to health information management
-
DOI 10.1109/TITB.2006.875655
-
GIAKOUMAKI, A., PAVLOPOULOS, S., AND KOUTSOURIS, D. 2006. Multiple image watermarking applied to health information management. IEEE Trans. Inf. Technol. Biomed.10, 4, 722-732. (Pubitemid 44604902)
-
(2006)
IEEE Transactions on Information Technology in Biomedicine
, vol.10
, Issue.4
, pp. 722-732
-
-
Giakoumaki, A.1
Pavlopoulos, S.2
Koutsouris, D.3
-
9
-
-
49549116187
-
Fragile watermarking based on encoding of the zeroes of the z-transform
-
HO, T. S., ZHU, X., SHEN, J., AND MARZILIANO, P. 2008. Fragile watermarking based on encoding of the zeroes of the z-transform. IEEE Trans. Inf. Forensic Security. 3, 3, 567-569.
-
(2008)
IEEE Trans. Inf. Forensic Security.
, vol.3
, Issue.3
, pp. 567-569
-
-
Ho, T.S.1
Zhu, X.2
Shen, J.3
Marziliano, P.4
-
10
-
-
0033872149
-
Counterfeiting attacks on oblivious block-wise independent invisible watermarking schemes
-
DOI 10.1109/83.826780
-
HOLLIMAN, M. AND MEMON, N. 2000. Counterfeiting attacks on oblivious block-wise independent invisible watermarking schemes. IEEE Trans. Image Process. 9, 3, 432-441. (Pubitemid 30572357)
-
(2000)
IEEE Transactions on Image Processing
, vol.9
, Issue.3
, pp. 432-441
-
-
Holliman, M.1
Memon, N.2
-
12
-
-
0032648596
-
Digital watermarking for telltale tamper proofing and authentication
-
KUNDUR, D. AND HATZINAKOS, D. 1999. Digital watermarking for telltale tamper proofing and authentication. IEEE Proc. 87, 7, 1167-1180.
-
(1999)
IEEE Proc.
, vol.87
, Issue.7
, pp. 1167-1180
-
-
Kundur, D.1
Hatzinakos, D.2
-
13
-
-
80053038221
-
-
Copyright © photo T. Lankerd
-
LANKERD, T. BRANDY ROSE. Copyright © photo T. Lankerd, http://www.petitcolas.net/fabien/watermarking/image-database.
-
-
-
Lankerd, T.1
Rose, B.2
-
14
-
-
4444342040
-
Secret image sharing with steganography and authentication
-
Lin, C. C. and Tsai, W. H. 2004. Secret image sharing with steganography and authentication. J. Syst. Softw. 73, 3, 405-414.
-
(2004)
J. Syst. Softw.
, vol.73
, Issue.3
, pp. 405-414
-
-
Lin, C.C.1
Tsai, W.H.2
-
15
-
-
0037818310
-
Structural digital signature for image authentication: An incidental distortion resistant scheme
-
LU, C. S. AND LIAO, H. Y. 2003. Structural digital signature for image authentication: An incidental distortion resistant scheme. IEEE Trans. Multimedia 5, 2, 161-173.
-
(2003)
IEEE Trans. Multimedia
, vol.5
, Issue.2
, pp. 161-173
-
-
Lu, C.S.1
Liao, H.Y.2
-
16
-
-
0032165133
-
Objective picture quality scale (PQS) for image coding
-
MAKOTO, M. 1998. Objective picture quality scale (PQS) for image coding. IEEE Trans. Comm. 46, 9, 1215-1226.
-
(1998)
IEEE Trans. Comm.
, vol.46
, Issue.9
, pp. 1215-1226
-
-
Makoto, M.1
-
17
-
-
48149104075
-
Tampering with a watermarking-based image authentication scheme
-
PHAN, R. C. W. 2008. Tampering with a watermarking-based image authentication scheme. Patt. Recogn. 41, 11, 3493-3496.
-
(2008)
Patt. Recogn.
, vol.41
, Issue.11
, pp. 3493-3496
-
-
Phan, R.C.W.1
-
18
-
-
0036627368
-
A survey of watermarking algorithms for image authentication
-
REY, C. AND DUGELAY, J. L. 2002. A survey of watermarking algorithms for image authentication. EURASIP J. Appl. Signal Process. 6, 613-621.
-
(2002)
EURASIP J. Appl. Signal Process.
, vol.6
, pp. 613-621
-
-
Rey, C.1
Dugelay, J.L.2
-
20
-
-
8344236008
-
Fragile image watermarking using a gradient image for improved localization and security
-
SUTHAHARAN, S. 2004. Fragile image watermarking using a gradient image for improved localization and security. Patt. Recogn. Lett. 25, 16, 1893-1903.
-
(2004)
Patt. Recogn. Lett.
, vol.25
, Issue.16
, pp. 1893-1903
-
-
Suthaharan, S.1
-
21
-
-
0142057129
-
A simple and high-hiding capacity method for hiding digit-by-digit data in images based on modulus function
-
THIEN, C. C. AND LIN, J. C. 2003. A simple and high-hiding capacity method for hiding digit-by-digit data in images based on modulus function. Patt. Recogn.36, 12, 2875-2881.
-
(2003)
Patt. Recogn.
, vol.36
, Issue.12
, pp. 2875-2881
-
-
Thien, C.C.1
Lin, J.C.2
-
22
-
-
0142029533
-
Using set partitioning in hierarchical trees to authenticate digital images
-
TSAI, P., HU, Y. C, AND CHANG, C. C. 2003. Using set partitioning in hierarchical trees to authenticate digital images. Signal Process. Image Comm. 18, 9, 813-822.
-
(2003)
Signal Process. Image Comm.
, vol.18
, Issue.9
, pp. 813-822
-
-
Tsai, P.1
Hu, Y.C.2
Chang, C.C.3
-
23
-
-
14844354093
-
Steganography of capacity required using modulo operator for embedding secret image
-
WANG, S. J. 2005. Steganography of capacity required using modulo operator for embedding secret image. Appl. Math. Comput. 164, 1, 99-116.
-
(2005)
Appl. Math. Comput.
, vol.164
, Issue.1
, pp. 99-116
-
-
Wang, S.J.1
-
24
-
-
1942436689
-
Image quality assessment: From error visibility to structural similarity
-
WANG, Z., BOVIK, A. C., SHEIKH, H. R., AND SIMONCELLI, E. P. 2004. Image quality assessment: From error visibility to structural similarity. IEEE Trans. Image Process.13, 4, 600-612.
-
(2004)
IEEE Trans. Image Process.
, vol.13
, Issue.4
, pp. 600-612
-
-
Wang, Z.1
Bovik, A.C.2
Sheikh, H.R.3
Simoncelli, E.P.4
-
25
-
-
0035473831
-
Secret and public key image watermarking schemes for image authentication and ownership verification
-
DOI 10.1109/83.951543, PII S1057714901082094
-
WONG, P. W AND MEMON, N. 2001. Secret and public key image watermarking schemes for image authentication and ownership verification. IEEE Trans. Image Process. 10, 10, 1593-1601. (Pubitemid 32981831)
-
(2001)
IEEE Transactions on Image Processing
, vol.10
, Issue.10
, pp. 1593-1601
-
-
Wong, P.W.1
Memon, N.2
-
26
-
-
0021386722
-
Access control with single-key-lock
-
WU, M. AND HWANG, T 1984. Access control with single-key-lock. IEEE Trans. Softw. Eng.10, 2, 185-191.
-
(1984)
IEEE Trans. Softw. Eng.
, vol.10
, Issue.2
, pp. 185-191
-
-
Wu, M.1
Hwang, T.2
-
27
-
-
0031378592
-
An invisible watermarking technique for image verification
-
IEEE, Los Alamitos, CA
-
YEUNG, M. AND MINTZER, F 1997. An invisible watermarking technique for image verification. In Proceedings of the IEEE International Conference on Image Processing, IEEE, Los Alamitos, CA, 680-683.
-
(1997)
Proceedings of the IEEE International Conference on Image Processing
, pp. 680-683
-
-
Yeung, M.1
Mintzer, F.2
-
28
-
-
33947611402
-
Pattern-based data hiding for binary image authentication by connectivity-preserving
-
DOI 10.1109/TMM.2006.887990
-
YANG, H. AND KOT, A. C. 2007. Pattern-based data hiding for binary image authentication by connectivity-preserving. IEEE Trans. Multimedia 9, 3, 475-486. (Pubitemid 46479781)
-
(2007)
IEEE Transactions on Multimedia
, vol.9
, Issue.3
, pp. 475-486
-
-
Yang, H.1
Kot, A.C.2
-
29
-
-
36248978560
-
A double layered "Plus-minus one" data embedding scheme
-
DOI 10.1109/LSP.2007.903255
-
ZHANG, W, ZHANG, X. AND WANG, S. 2007. A double layered "plus-minus one" data embedding scheme. IEEE Signal Process. Lett. 14, 11, 848-851. (Pubitemid 350130777)
-
(2007)
IEEE Signal Processing Letters
, vol.14
, Issue.11
, pp. 848-851
-
-
Zhang, W.1
Zhang, X.2
Wang, S.3
-
30
-
-
34548765996
-
Statistical fragile watermarking capable of locating individual tampered pixels
-
DOI 10.1109/LSP.2007.896436
-
ZHANG, X. AND WANG, S. 2007. Statistical fragile watermarking capable of locating individual tampered pixels. IEEE Signal Process. Lett. 14, 10, 727-730. (Pubitemid 47434095)
-
(2007)
IEEE Signal Processing Letters
, vol.14
, Issue.10
, pp. 727-730
-
-
Zhang, X.1
Wang, S.2
-
31
-
-
57749202706
-
Fragile watermarking scheme using hierarchical mechanism
-
ZHANG, X. AND WANG, S. 2009. Fragile watermarking scheme using hierarchical mechanism. Signal Process. 89, 4, 675-679.
-
(2009)
Signal Process.
, vol.89
, Issue.4
, pp. 675-679
-
-
Zhang, X.1
Wang, S.2
|