-
2
-
-
0037508344
-
Invisibility and application functionalities in perceptual watermarking: An overview
-
C.D. Vleeschouwer, J.F. Delaigle, and B. Macq Invisibility and application functionalities in perceptual watermarking: an overview Proceedings of the IEEE 90 1 2002 64 77
-
(2002)
Proceedings of the IEEE
, vol.90
, Issue.1
, pp. 64-77
-
-
Vleeschouwer, C.D.1
Delaigle, J.F.2
MacQ, B.3
-
4
-
-
78049291761
-
A reversible data hiding scheme using complementary embedding strategy
-
C.C. Chang, and T.D. Kieu A reversible data hiding scheme using complementary embedding strategy Information Sciences 180 16 2010 3045 3058
-
(2010)
Information Sciences
, vol.180
, Issue.16
, pp. 3045-3058
-
-
Chang, C.C.1
Kieu, T.D.2
-
5
-
-
32644434350
-
A watermarking-based image ownership and tampering authentication scheme
-
C.C. Chang, Y.S. Hu, and T.C. Lu A watermarking-based image ownership and tampering authentication scheme Pattern Recognition Letters 27 5 2006 439 446
-
(2006)
Pattern Recognition Letters
, vol.27
, Issue.5
, pp. 439-446
-
-
Chang, C.C.1
Hu, Y.S.2
Lu, T.C.3
-
6
-
-
0031362116
-
Secure spread spectrum watermarking for multimedia
-
PII S1057714997084601
-
I.J. Cox, J. Kilian, F.T. Leighton, and T. Shamoon Secure spread spectrum watermarking for multimedia IEEE Transactions on Image Processing 6 12 1997 1673 1687 (Pubitemid 127770522)
-
(1997)
IEEE Transactions on Image Processing
, vol.6
, Issue.12
, pp. 1673-1687
-
-
Cox, I.J.1
Kilian, J.2
Leighton, F.T.3
Shamoon, T.4
-
7
-
-
0141638482
-
A DWT-DFT composite watermarking. scheme robust to both affine transform and JPEG compression
-
X.G. Kang, J.W. Huang, Y.Q. Shi, and Y. Lin A DWT-DFT composite watermarking. scheme robust to both affine transform and JPEG compression IEEE Transactions on Circuits and Systems for Video Technology 13 8 2003 776 786
-
(2003)
IEEE Transactions on Circuits and Systems for Video Technology
, vol.13
, Issue.8
, pp. 776-786
-
-
Kang, X.G.1
Huang, J.W.2
Shi, Y.Q.3
Lin, Y.4
-
10
-
-
0035473831
-
Secret and public key image watermarking schemes for image authentication and ownership verification
-
DOI 10.1109/83.951543, PII S1057714901082094
-
P.W. Wong, and N. Memon Secret and public key image watermarking schemes for image authentication and ownership verification IEEE Transactions on Image Processing 10 10 2001 1593 1601 (Pubitemid 32981831)
-
(2001)
IEEE Transactions on Image Processing
, vol.10
, Issue.10
, pp. 1593-1601
-
-
Wong, P.W.1
Memon, N.2
-
11
-
-
8344236008
-
Fragile image watermarking using a gradient image for improved localization and security
-
S. Suthaharan Fragile image watermarking using a gradient image for improved localization and security Pattern Recognition Letters 25 16 2004 1893 1903
-
(2004)
Pattern Recognition Letters
, vol.25
, Issue.16
, pp. 1893-1903
-
-
Suthaharan, S.1
-
12
-
-
33947127547
-
Binary image authentication with tampering localization by embedding cryptographic signature and block identifier
-
DOI 10.1109/LSP.2006.879829
-
H. Yang, and A.C. Kot Binary image authentication with tampering localization by embedding cryptographic signature and block identifier IEEE Signal Processing Letters 13 12 2006 741 744 (Pubitemid 46405580)
-
(2006)
IEEE Signal Processing Letters
, vol.13
, Issue.12
, pp. 741-744
-
-
Yang, H.1
Kot, A.C.2
-
13
-
-
77955421057
-
Reversible fragile watermarking for locating tampered blocks in JPEG images
-
X.P. Zhang, S.Z. Wang, Z.X. Qian, and G.R. Feng Reversible fragile watermarking for locating tampered blocks in JPEG images Signal Processing 90 12 2010 3026 3036
-
(2010)
Signal Processing
, vol.90
, Issue.12
, pp. 3026-3036
-
-
Zhang, X.P.1
Wang, S.Z.2
Qian, Z.X.3
Feng, G.R.4
-
14
-
-
57749202706
-
Fragile watermarking scheme using a hierarchical mechanism
-
X.P. Zhang, and S.Z. Wang Fragile watermarking scheme using a hierarchical mechanism Signal Processing 89 4 2009 675 679
-
(2009)
Signal Processing
, vol.89
, Issue.4
, pp. 675-679
-
-
Zhang, X.P.1
Wang, S.Z.2
-
15
-
-
0035248504
-
A robust image authentication method distinguishing JPEG compression from malicious manipulation
-
C.Y. Lin, and S.F. Chang A robust image authentication method distinguishing JPEG compression from malicious manipulation IEEE Transactions on Circuits and Systems for Video Technology 11 2 2001 153 168
-
(2001)
IEEE Transactions on Circuits and Systems for Video Technology
, vol.11
, Issue.2
, pp. 153-168
-
-
Lin, C.Y.1
Chang, S.F.2
-
16
-
-
0033688392
-
Semi-fragile watermarking for authenticating JPEG visual content
-
Jan.
-
C.Y. Lin, S.F. Chang, Semi-fragile watermarking for authenticating JPEG visual content, in: Proceedings of SPIE International Conference on Security and Watermarking of Multimedia Contents II, vol. 3971, Jan. 2000, pp. 140151.
-
(2000)
Proceedings of SPIE International Conference on Security and Watermarking of Multimedia Contents II
, vol.3971
, pp. 140-151
-
-
Lin, C.Y.1
Chang, S.F.2
-
17
-
-
34249908633
-
A new semi-fragile image watermarking with robust tampering restoration using irregular sampling
-
DOI 10.1016/j.image.2007.03.004, PII S0923596507000434
-
X.Z. Zhu, A.T.S. Ho, and P. Marziliano A new semi-fragile image watermarking with robust tampering restoration using irregular sampling Signal Processing: Image Communication 22 5 2007 515 528 (Pubitemid 46874891)
-
(2007)
Signal Processing: Image Communication
, vol.22
, Issue.5
, pp. 515-528
-
-
Zhu, X.1
Ho, A.T.S.2
Marziliano, P.3
-
18
-
-
0037426973
-
Semi-fragile image watermarking method based on index constrained vector quantization
-
Z.M. Lu, C.H. Liu, D.G. Xu, and S.H. Sun Semi-fragile image watermarking method based on index constrained vector quantization Electronics Letters 39 1 2003 35 36
-
(2003)
Electronics Letters
, vol.39
, Issue.1
, pp. 35-36
-
-
Lu, Z.M.1
Liu, C.H.2
Xu, D.G.3
Sun, S.H.4
-
20
-
-
69249216337
-
Recover the tampered image based on VQ indexing
-
C.W. Yang, and J.J. Shen Recover the tampered image based on VQ indexing Signal Processing 90 1 2010 331 343
-
(2010)
Signal Processing
, vol.90
, Issue.1
, pp. 331-343
-
-
Yang, C.W.1
Shen, J.J.2
-
21
-
-
64549124300
-
Adjacent-block based statistical detection method for self-embedding watermarking techniques
-
H.J. He, J.S. Zhang, and F. Chen Adjacent-block based statistical detection method for self-embedding watermarking techniques Signal Processing 89 8 2009 1557 1566
-
(2009)
Signal Processing
, vol.89
, Issue.8
, pp. 1557-1566
-
-
He, H.J.1
Zhang, J.S.2
Chen, F.3
-
22
-
-
57849140746
-
Fragile watermarking with error-free restoration capability
-
X.P. Zhang, and S.Z. Wang Fragile watermarking with error-free restoration capability IEEE Transactions on Multimedia 10 8 2008 1490 1499
-
(2008)
IEEE Transactions on Multimedia
, vol.10
, Issue.8
, pp. 1490-1499
-
-
Zhang, X.P.1
Wang, S.Z.2
-
23
-
-
79551658534
-
Reference sharing mechanism for watermark self-embedding
-
X.P. Zhang, S.Z. Wang, Z.X. Qian, and G.R. Feng Reference sharing mechanism for watermark self-embedding IEEE Transactions on Image Processing 20 2 2011 485 495
-
(2011)
IEEE Transactions on Image Processing
, vol.20
, Issue.2
, pp. 485-495
-
-
Zhang, X.P.1
Wang, S.Z.2
Qian, Z.X.3
Feng, G.R.4
-
24
-
-
78149440151
-
Inpainting assisted self recovery with decreased embedding data
-
Z.X. Qian, and G.R. Feng Inpainting assisted self recovery with decreased embedding data IEEE Signal Processing Letters 17 11 2010 929 932
-
(2010)
IEEE Signal Processing Letters
, vol.17
, Issue.11
, pp. 929-932
-
-
Qian, Z.X.1
Feng, G.R.2
-
25
-
-
79551500587
-
Image self-embedding with high-quality restoration capability
-
Z.X. Qian, G.R. Feng, X.P. Zhang, and S.Z. Wang Image self-embedding with high-quality restoration capability Digital Signal Processing 21 2 2011 278 286
-
(2011)
Digital Signal Processing
, vol.21
, Issue.2
, pp. 278-286
-
-
Qian, Z.X.1
Feng, G.R.2
Zhang, X.P.3
Wang, S.Z.4
-
28
-
-
33749161371
-
The nonsubsampled contourlet transform: Theory, design, and applications
-
DOI 10.1109/TIP.2006.877507
-
A.L. Cunha, J.P. Zhou, and M.N. Do The nonsubsampled contourlet transform: theory, design, and applications IEEE Transactions on Image Processing 15 10 2006 3089 3101 (Pubitemid 44473649)
-
(2006)
IEEE Transactions on Image Processing
, vol.15
, Issue.10
, pp. 3089-3101
-
-
Da Cunha, A.L.1
Zhou, J.2
Do, M.N.3
-
29
-
-
33749584934
-
Nonsubsampled contourlet transform: Filter design and applications in denoising
-
DOI 10.1109/ICIP.2005.1529859, 1529859, IEEE International Conference on Image Processing 2005, ICIP 2005
-
A.L. Cunha, J.P. Zhou, M.N. Do, Nonsubsampled contourlet transform: filter design and application in denoising, in: Proceedings of IEEE International Conference on Image Processing, 2005, pp. 749752. (Pubitemid 44538746)
-
(2005)
Proceedings - International Conference on Image Processing, ICIP
, vol.1
, pp. 749-752
-
-
Da Cunha, A.L.1
Zhou, J.2
Do, M.N.3
-
30
-
-
0035690734
-
NavierStokes, fluid dynamics, and image and video inpainting
-
M. Bertalmio, A.L. Bertozzi, G. Sapiro, NavierStokes, fluid dynamics, and image and video inpainting, in: Proceedings of the 2001 IEEE Computer Society Conference on Computer Vision and Pattern Recognition, vol. 1, 2001, pp. 355362.
-
(2001)
Proceedings of the 2001 IEEE Computer Society Conference on Computer Vision and Pattern Recognition
, vol.1
, pp. 355-362
-
-
Bertalmio, M.1
Bertozzi, A.L.2
Sapiro, G.3
|