-
1
-
-
0018515312
-
Image compression using block truncation coding
-
E. J. Delp and O. R. Mitcell, "Image compression using block truncation coding", IEEE T. Commun. 27, 1335-1342 (1979).
-
(1979)
IEEE T. Commun.
, vol.27
, pp. 1335-1342
-
-
Delp, E.J.1
Mitcell, O.R.2
-
2
-
-
0021515479
-
Absolute moment block truncation coding and its application to colour image
-
M. D. Lema and O. R. Mitchell, "Absolute moment block truncation coding and its application to colour image", IEEE T. Commun. 32, 1148-1157 (1984).
-
(1984)
IEEE T. Commun.
, vol.32
, pp. 1148-1157
-
-
Lema, M.D.1
Mitchell, O.R.2
-
3
-
-
54549096836
-
Colour image coding scheme using absolute moment block truncation coding and block prediction technique
-
Y. C. Hu, B. H. Su, and P. Y. Tsai, "Colour image coding scheme using absolute moment block truncation coding and block prediction technique", Imaging Sci. J. 56, 254-270 (2008).
-
(2008)
Imaging Sci. J.
, vol.56
, pp. 254-270
-
-
Hu, Y.C.1
Su, B.H.2
Tsai, P.Y.3
-
4
-
-
79954600061
-
A fast near-optimum block truncation coding method using a truncated K-means algorithm and inter-block correlation
-
Y. Yang, Q. Chen, and Y. Wan, "A fast near-optimum block truncation coding method using a truncated K-means algorithm and inter-block correlation", AEUE - Int. J. Electron. Commun. 65, 576-581 (2011).
-
(2011)
AEUE - Int. J. Electron. Commun.
, vol.65
, pp. 576-581
-
-
Yang, Y.1
Chen, Q.2
Wan, Y.3
-
5
-
-
84862798535
-
An improved vector quantization scheme for grayscale image compression
-
Y. C. Hu, W. L. Chen, C. C. Lo, and J. C. Chung, "An improved vector quantization scheme for grayscale image compression", Opto-Electron. Rev. 20, 187-193 (2012).
-
(2012)
Opto-Electron. Rev.
, vol.20
, pp. 187-193
-
-
Hu, Y.C.1
Chen, W.L.2
Lo, C.C.3
Chung, J.C.4
-
6
-
-
0002500694
-
Image authentication techniques for surveillance applications
-
F. Bartolini, A. Tefas, M. Bami, and I. Pitas, "Image authentication techniques for surveillance applications", Proc. IEEE89, 1403-418 (2001).
-
(2001)
Proc. IEEE
, vol.89
, pp. 1403-1418
-
-
Bartolini, F.1
Tefas, A.2
Bami, M.3
Pitas, I.4
-
7
-
-
0034140535
-
Fault resilient and compression tolerant digital signature for image authentication
-
D. C. Lou and J. L. Liu, "Fault resilient and compression tolerant digital signature for image authentication", IEEE T. Consum. Electr. 46, 31-39 (2000).
-
(2000)
IEEE T. Consum. Electr.
, vol.46
, pp. 31-39
-
-
Lou, D.C.1
Liu, J.L.2
-
8
-
-
0035362493
-
Approximate image message authentication codes
-
L. Xie, G. R. Arce and R. F. Graveman, "Approximate image message authentication codes", IEEE T. Multimedia3, 242-252 (2001).
-
(2001)
IEEE T. Multimedia
, vol.3
, pp. 242-252
-
-
Xie, L.1
Arce, G.R.2
Graveman, R.F.3
-
9
-
-
27844494781
-
A novel image authentication scheme based on quadtree segmentation
-
P. Y. Tsai, Y. C. Hu, and C. C. Chang, "A novel image authentication scheme based on quadtree segmentation", Imaging Sci. J. 53, 149-162 (2005).
-
(2005)
Imaging Sci. J.
, vol.53
, pp. 149-162
-
-
Tsai, P.Y.1
Hu, Y.C.2
Chang, C.C.3
-
10
-
-
65649138758
-
Iterative compensation schemes for multimedia content authentication
-
S. Ababneh, R. Ansari, and A. Khokhar, "Iterative compensation schemes for multimedia content authentication", J. Vis. Commun. Image R. 20, 303-311 (2009).
-
(2009)
J. Vis. Commun. Image R.
, vol.20
, pp. 303-311
-
-
Ababneh, S.1
Ansari, R.2
Khokhar, A.3
-
11
-
-
0035248504
-
A robust image authentication method distinguish JPEG compression from malicious manipulation
-
C. Y. Lin and S. F. Chang, "A robust image authentication method distinguish JPEG compression from malicious manipulation", IEEE T. Circ. Syst. Vid. 11, 153-168 (2001).
-
(2001)
IEEE T. Circ. Syst. Vid.
, vol.11
, pp. 153-168
-
-
Lin, C.Y.1
Chang, S.F.2
-
12
-
-
0035473831
-
Secret and public key image watermarking schemes for image authentication and ownership verification
-
P. W. Wong and N. Memon, "Secret and public key image watermarking schemes for image authentication and ownership verification", IEEE T. Image Process. 10, 1593-1601 (2001).
-
(2001)
IEEE T. Image Process.
, vol.10
, pp. 1593-1601
-
-
Wong, P.W.1
Memon, N.2
-
13
-
-
48149100935
-
Dual watermark for image tamper detection and recovery
-
T. Y. Lee and S. D. Lin, "Dual watermark for image tamper detection and recovery", Pattern Recogn. 41, 3497-3506 (2008).
-
(2008)
Pattern Recogn.
, vol.41
, pp. 3497-3506
-
-
Lee, T.Y.1
Lin, S.D.2
-
14
-
-
75249099043
-
A secure and robust hash-based scheme for image authentication
-
F. Ahmed and M. Y. Siyal, "A secure and robust hash-based scheme for image authentication", Signal Process. 90, 1456-1470 (2010).
-
(2010)
Signal Process.
, vol.90
, pp. 1456-1470
-
-
Ahmed, F.1
Siyal, M.Y.2
-
15
-
-
79551680643
-
A quantization-based semi-fragile watermarking scheme for image content authentication
-
X. Qi and X. Xin, "A quantization-based semi-fragile watermarking scheme for image content authentication", J. Vis. Commun. Image R. 22, 187-200 (2011).
-
(2011)
J. Vis. Commun. Image R.
, vol.22
, pp. 187-200
-
-
Qi, X.1
Xin, X.2
-
16
-
-
79957706020
-
An adaptive image authentication scheme for vector quantization compressed image
-
J. C. Chuang and Y. C. Hu, "An adaptive image authentication scheme for vector quantization compressed image", J. Vis. Commun. Image R. 22, 440-449 (2011).
-
(2011)
J. Vis. Commun. Image R.
, vol.22
, pp. 440-449
-
-
Chuang, J.C.1
Hu, Y.C.2
-
17
-
-
80052535001
-
An image authentication method by applying Hamming code on rearranged bits
-
C. S. Chan, "An image authentication method by applying Hamming code on rearranged bits", Pattern Recogn. Lett. 32, 1679-1690 (2011).
-
(2011)
Pattern Recogn. Lett.
, vol.32
, pp. 1679-1690
-
-
Chan, C.S.1
-
18
-
-
84862827077
-
Tamper detection and self-recovery of biometric images using salient region-based authentication watermarking scheme
-
C. Li, Y. Wang, B. Ma, and Z. Zhang, "Tamper detection and self-recovery of biometric images using salient region-based authentication watermarking scheme", Comp. Stand. Inter. 34, 367-379 (2012).
-
(2012)
Comp. Stand. Inter.
, vol.34
, pp. 367-379
-
-
Li, C.1
Wang, Y.2
Ma, B.3
Zhang, Z.4
|