-
1
-
-
84882472841
-
Passive-blindImage Forensics
-
Elsvier
-
T.T.Ng, S.F.Chang, C.Y.Lin, Q.B.Sun."Passive-blindImage Forensics," In Multimedia Security Technologies for Digital Rights, Elsvier, Vol.15, pp.383-412, 2006.
-
(2006)
Multimedia Security Technologies for Digital Rights
, vol.15
, pp. 383-412
-
-
Ng, T.T.1
Chang, S.F.2
Lin, C.Y.3
Sun, Q.B.4
-
2
-
-
0036611838
-
Hierarchical watermarking for secure image authentication with localization
-
M.U.Celik, G.Sharma, E.Saber, A.M.Tekalp,"Hierarchical watermarking for secure image authentication with localization," IEEE Signal Processing Magazine, Vol.11(6), pp.585-595, 2002.
-
(2002)
IEEE Signal Processing Magazine
, vol.11
, Issue.6
, pp. 585-595
-
-
Celik, M.U.1
Sharma, G.2
Saber, E.3
Tekalp, A.M.4
-
3
-
-
85032752228
-
When seeing isn't believing
-
B.B. Zhu, M.D.Swanson, A.H.Tewfik. "When seeing isn't believing," IEEE Signal Processing Magazine, Vol.21(2), pp.40-49, 2004.
-
(2004)
IEEE Signal Processing Magazine
, vol.21
, Issue.2
, pp. 40-49
-
-
Zhu, B.B.1
Swanson, M.D.2
Tewfik, A.H.3
-
4
-
-
8644248272
-
Image authentication based on digital watermarking
-
J.Wu, F.Lin, "Image authentication based on digital watermarking," Chinese Journal of Conputers, Vol.27(9), pp.1153-1161, 2004.
-
(2004)
Chinese Journal of Conputers
, vol.27
, Issue.9
, pp. 1153-1161
-
-
Wu, J.1
Lin, F.2
-
5
-
-
58149230256
-
An image authentication watermarking with self localization and recovery
-
Chongqing. China: World Scientfic
-
Q.Wu, G.H.Li, D.Tu. "An image authentication watermarking with self localization and recovery," In Proceedings of the 11th Joint International Computer Conference. Chongqing. China: World Scientfic, pp.960-963, 2005.
-
(2005)
Proceedings of the 11th Joint International Computer Conference
, pp. 960-963
-
-
Wu, Q.1
Li, G.H.2
Tu, D.3
-
6
-
-
0027697301
-
The trustworthy digital camera: Restoring credibility to the photographic image
-
G.L.Friedman, "The trustworthy digital camera: restoring credibility to the photographic image," IEEE Transaction Consumer Electronics, Vol.39(4), pp.905-910, 1993.
-
(1993)
IEEE Transaction Consumer Electronics
, vol.39
, Issue.4
, pp. 905-910
-
-
Friedman, G.L.1
-
7
-
-
0035248504
-
A robust image authentication method distinguishing JPEG compression from malicious manipulation
-
C.Y.Lin, S.F.Chang. "A robust image authentication method distinguishing JPEG compression from malicious manipulation," WEE Transactions on Circuits and Systems for Video Technology,Vol. 11(2), pp.153-168, 2001.
-
(2001)
WEE Transactions on Circuits and Systems for Video Technology
, vol.11
, Issue.2
, pp. 153-168
-
-
Lin, C.Y.1
Chang, S.F.2
-
8
-
-
0037818310
-
Structural digital signature forimag eauthentication: An incidental distortion resistant scheme
-
C.S.Lu, H.Y.M.Liao. "Structural digital signature forimag eauthentication: an incidental distortion resistant scheme," IEEE Transaction Multimddia. Vol.5(2),pp.161-173, 2003.
-
(2003)
IEEE Transaction Multimddia
, vol.5
, Issue.2
, pp. 161-173
-
-
Lu, C.S.1
Liao, H.Y.M.2
-
9
-
-
84862910224
-
Digital Image Forgery Detection
-
B.L.Shivakumar, S.Santhosh Baboo,"Digital Image Forgery Detection", SAJOSPS, Vol.10(2), pp.1 16-119, 2010.
-
(2010)
SAJOSPS
, vol.10
, Issue.2
, pp. 116-119
-
-
Shivakumar, B.L.1
Santhosh Baboo, S.2
-
11
-
-
27844542239
-
-
Computer Science, Dartmouth College, Tech. Rep. TR2004-515
-
A.C.Popescu, H.Farid,"Exposing Digital Forgeries by Detecting Duplicated Image Regions," Computer Science, Dartmouth College, Tech. Rep. TR2004-515, 2004.
-
(2004)
Exposing Digital Forgeries by Detecting Duplicated Image Regions
-
-
Popescu, A.C.1
Farid, H.2
-
12
-
-
79960718594
-
Detecting Copy-Move Forgery in Digital Images: A Survey and Analysis of Cuff ent Methods
-
B.L.Shivakumar, S.Santhoth Baboo, "Detecting Copy-Move Forgery in Digital Images: A Survey and Analysis of Cuff ent Methods," Global Journal of Computer Science and Technology, Vol.10(7), pp.61-65, 2010.
-
(2010)
Global Journal of Computer Science and Technology
, vol.10
, Issue.7
, pp. 61-65
-
-
Shivakumar, B.L.1
Santhoth Baboo, S.2
-
13
-
-
58149235809
-
A sorted neighborhood approach for detecting duplicated regions in image forgeries based on DWT and SVD
-
IEEE, Beijing
-
G.H.Li, Q.Wu, D.Tu,S.J.Sun, "A sorted neighborhood approach for detecting duplicated regions in image forgeries based on DWT and SVD," In Proceedings of 2007 IEEE ICME, pp.1750-1753. IEEE, Beijing 2007.
-
(2007)
Proceedings of 2007 IEEE ICME
, pp. 1750-1753
-
-
Li, G.H.1
Wu, Q.2
Tu, D.3
Sun, S.J.4
-
14
-
-
42449164842
-
-
Chester F. Carlson Center for Imaging Science, Rochester Institute of Technology, May 29
-
E.J.Ientilucci, "Using the Singular Value Decompostion," Chester F. Carlson Center for Imaging Science, Rochester Institute of Technology, May 29, 2003.
-
(2003)
Using the Singular Value Decompostion
-
-
Ientilucci, E.J.1
-
15
-
-
34147142845
-
Robust Detection of Region Dup-lication Forgery in Digital Image
-
W.Luo, J.Huang, G.P.Qiu,"Robust Detection of Region Dup-lication Forgery in Digital Image," In Proceedings of the 18th International Conference on Pattern Recognition, Vol.4, pp.746-749, 2006.
-
(2006)
Proceedings of the 18th International Conference on Pattern Recognition
, vol.4
, pp. 746-749
-
-
Luo, W.1
Huang, J.2
Qiu, G.P.3
|