-
3
-
-
0035330787
-
Digital steganography
-
D. Artz Digital steganography IEEE Internet Computing 5 3 2001 75 80
-
(2001)
IEEE Internet Computing
, vol.5
, Issue.3
, pp. 75-80
-
-
Artz, D.1
-
6
-
-
0035160549
-
A Survey on watermarking application scenarios and related attacks
-
A. Nikolaidis, S. Tsekeridou, A. Tefas, V. Solachidis
-
A. Nikolaidis, S. Tsekeridou, A. Tefas, and V. Solachidis, A Survey on watermarking application scenarios and related attacks, in: Proceedings of 2001 International Conference on Image Processing, vol. 3, pp. 991-994.
-
Proceedings of 2001 International Conference on Image Processing
, vol.3
, pp. 991-994
-
-
-
8
-
-
49549092237
-
Adaptive data hiding in edge areas of images with spatial LSB domain systems
-
C. Yang, C. Weng, S. Wang, and H. Sun Adaptive data hiding in edge areas of images with spatial LSB domain systems IEEE Transactions on Information Forensics and Security 3 3 2008 488 497
-
(2008)
IEEE Transactions on Information Forensics and Security
, vol.3
, Issue.3
, pp. 488-497
-
-
Yang, C.1
Weng, C.2
Wang, S.3
Sun, H.4
-
9
-
-
34548056717
-
Lossless data embedding with high embedding capacity based on declustering for VQ-compressed codes
-
C. Chang, Y. Hsien, and C. Lin Lossless data embedding with high embedding capacity based on declustering for VQ-compressed codes IEEE Transactions on Information Forensics and Security 2 2007 493 498
-
(2007)
IEEE Transactions on Information Forensics and Security
, vol.2
, pp. 493-498
-
-
Chang, C.1
Hsien, Y.2
Lin, C.3
-
10
-
-
33947127547
-
Binary image authentication with tampering localization by embedding cryptographic signature and block identifier
-
H. Yang, and A.C. Kot Binary image authentication with tampering localization by embedding cryptographic signature and block identifier IEEE Signal Processing Letters 13 2006 741 744
-
(2006)
IEEE Signal Processing Letters
, vol.13
, pp. 741-744
-
-
Yang, H.1
Kot, A.C.2
-
11
-
-
20444404178
-
Steganalysis of LSB matching in grayscale images
-
A.D. Ker Steganalysis of LSB matching in grayscale images IEEE Signal Processing Letters 12 2005 441 444
-
(2005)
IEEE Signal Processing Letters
, vol.12
, pp. 441-444
-
-
Ker, A.D.1
-
13
-
-
8644267842
-
Oblivious fragile watermarking scheme for image authentication
-
Orlando, FL, USA, May
-
C.T. Li, F.M. Yang, C.S. Lee, Oblivious fragile watermarking scheme for image authentication, in: Proceedings of IEEE International Conference on Acoustics, Speech and Signal Processing, vol. VI, Orlando, FL, USA, May 2002, pp. 3445-3448.
-
(2002)
Proceedings of IEEE International Conference on Acoustics, Speech and Signal Processing
, vol.6
, pp. 3445-3448
-
-
Li, C.T.1
Yang, F.M.2
Lee, C.S.3
-
14
-
-
77951206069
-
Geometric distortion insensitive image watermarking in affine covariant regions
-
X. Gao, and C. Deng Geometric distortion insensitive image watermarking in affine covariant regions IEEE Transactions on Systems, Man, Cybernetics, Part C 40 3 2010 278 286
-
(2010)
IEEE Transactions on Systems, Man, Cybernetics, Part C
, vol.40
, Issue.3
, pp. 278-286
-
-
Gao, X.1
Deng, C.2
-
15
-
-
0344271945
-
A joint source-channel coding scheme for image-in-image data hiding
-
Barcelona, Spain, September
-
K. Solanki, O. Dabeer, U. Madhow, B. Manjunath, S. Chandrasekaran, A joint source-channel coding scheme for image-in-image data hiding, in: Proceedings of International Conference Image Processing, Barcelona, Spain, September 2003.
-
(2003)
Proceedings of International Conference Image Processing
-
-
Solanki, K.1
Dabeer, O.2
Madhow, U.3
Manjunath, B.4
Chandrasekaran, S.5
-
16
-
-
9744279131
-
Robust image-adaptive data hiding algorithm using erasure and error correction
-
k. Solanki, N. Jacobsen, U. Madhow, B. Manjunath, and S. Chandrasekaran Robust image-adaptive data hiding algorithm using erasure and error correction IEEE Transactions on Image Processing 13 12 2004 1627 1639
-
(2004)
IEEE Transactions on Image Processing
, vol.13
, Issue.12
, pp. 1627-1639
-
-
Solanki, K.1
Jacobsen, N.2
Madhow, U.3
Manjunath, B.4
Chandrasekaran, S.5
-
17
-
-
54049139585
-
A large capacity blind information hiding algorithm
-
J. Xie, C. Yang, D. Huang, D. Xie, A large capacity blind information hiding algorithm, in: International Symposium on Electronic Commerce and Security, 2008.
-
(2008)
International Symposium on Electronic Commerce and Security
-
-
Xie, J.1
Yang, C.2
Huang, D.3
Xie, D.4
-
20
-
-
33751544175
-
A semi-fragile lossless digital watermarking scheme based on integer wavelet transform
-
D. Zou, Y. Shi, N. Zhicheng, and W. Su A semi-fragile lossless digital watermarking scheme based on integer wavelet transform IEEE Transactions on Circuits and Systems for Video Technology 16 10 2006 1294 1300
-
(2006)
IEEE Transactions on Circuits and Systems for Video Technology
, vol.16
, Issue.10
, pp. 1294-1300
-
-
Zou, D.1
Shi, Y.2
Zhicheng, N.3
Su, W.4
-
22
-
-
28844486742
-
Reversible data embedding into images using wavelet techniques and sorting
-
L. Kamstra, and H. Heijmans Reversible data embedding into images using wavelet techniques and sorting IEEE Transactions on Image Processing 14 12 2005 2082 2090
-
(2005)
IEEE Transactions on Image Processing
, vol.14
, Issue.12
, pp. 2082-2090
-
-
Kamstra, L.1
Heijmans, H.2
-
26
-
-
48149105121
-
Robust image watermarking based on local Zernike moments
-
N. Singhal, Y. Lee, C. Kim, S. Lee, Robust image watermarking based on local Zernike moments, in: Proceedings of the IEEE 9th International Workshop on Multimedia and Signal Processing, 2007, pp. 401-404.
-
(2007)
Proceedings of the IEEE 9th International Workshop on Multimedia and Signal Processing
, pp. 401-404
-
-
Singhal, N.1
Lee, Y.2
Kim, C.3
Lee, S.4
-
28
-
-
84876923927
-
A novel scheme based on relationship of Tchebicheff moments
-
W. Lv, Y. Guo, J. Ma, B. Luo, A novel scheme based on relationship of Tchebicheff moments, in: Proceedings of the IEEE International Conference on Neural Networks and Signal Processing, 2008, pp. 146-150.
-
(2008)
Proceedings of the IEEE International Conference on Neural Networks and Signal Processing
, pp. 146-150
-
-
Lv, W.1
Guo, Y.2
Ma, J.3
Luo, B.4
-
29
-
-
33847738550
-
Geometric invariant blind image watermarking by Tchebicheff moments
-
L. Zhang, G. Qian, W. Xiao, and Z. Ji Geometric invariant blind image watermarking by Tchebicheff moments Optics Express 15 5 2007 2251 2261
-
(2007)
Optics Express
, vol.15
, Issue.5
, pp. 2251-2261
-
-
Zhang, L.1
Qian, G.2
Xiao, W.3
Ji, Z.4
-
32
-
-
64549118174
-
A local Tchebichef moments-based robust image watermarking
-
C. Deng, and X. Gao A local Tchebichef moments-based robust image watermarking Signal Processing 89 8 Aug. 2009 1531 1539
-
(2009)
Signal Processing
, vol.89
, Issue.8
, pp. 1531-1539
-
-
Deng, C.1
Gao, X.2
-
36
-
-
0019047147
-
Image analysis via the general theory of moments
-
M.R. Teague Image analysis via the general theory of moments Journal of Optical Society of America 70 1980 920 930
-
(1980)
Journal of Optical Society of America
, vol.70
, pp. 920-930
-
-
Teague, M.R.1
-
38
-
-
0035443387
-
Image analysis by Tchebicheff moments
-
R. Mukundan Image analysis by Tchebicheff moments IEEE Transactions on Image Processing 10 9 2001 1357 1364
-
(2001)
IEEE Transactions on Image Processing
, vol.10
, Issue.9
, pp. 1357-1364
-
-
Mukundan, R.1
-
40
-
-
50049090684
-
Noise analysis and reconstruction accuracy for Tchebichief moments
-
S. Elshoura, and D. Megherbi Noise analysis and reconstruction accuracy for Tchebichief moments Proceedings of IEEE Southeastcon 2008 521 526
-
(2008)
Proceedings of IEEE Southeastcon
, pp. 521-526
-
-
Elshoura, S.1
Megherbi, D.2
-
41
-
-
50649116414
-
Comparison of Zernike and Tchebicheff moments for image tampering detection sensitivity and watermark recovery
-
May
-
S. Elshoura, D. Megherbi, Comparison of Zernike and Tchebicheff moments for image tampering detection sensitivity and watermark recovery, in: Proceedings of IEEE Conference on Technologies for Home land Security, May 2008, pp. 615-619.
-
(2008)
Proceedings of IEEE Conference on Technologies for Home Land Security
, pp. 615-619
-
-
Elshoura, S.1
Megherbi, D.2
-
43
-
-
8744314608
-
What's the point? Interpolation or extrapolation with a regular grid DEM
-
Fredericksburg, VA, USA
-
D. Kidner, M. Dorey, D. Smith, What's the point? Interpolation or extrapolation with a regular grid DEM, in: International Conference on Geocomputation, Fredericksburg, VA, USA, 1999.
-
(1999)
International Conference on Geocomputation
-
-
Kidner, D.1
Dorey, M.2
Smith, D.3
-
45
-
-
0030370716
-
A comparison of rotation-based methods for iterative reconstruction algorithms
-
E. Bella, A. Barclay, R. Eisner, and R. Schafer A comparison of rotation-based methods for iterative reconstruction algorithms IEEE Transactions on Nuclear Science 43 6 1996 3370 3376
-
(1996)
IEEE Transactions on Nuclear Science
, vol.43
, Issue.6
, pp. 3370-3376
-
-
Bella, E.1
Barclay, A.2
Eisner, R.3
Schafer, R.4
-
46
-
-
0030394116
-
Midpoint line algorithm for high-speed high-accuracy rotation of images
-
C. Xuede, L. Siwei, Y. Xiaobu, C. Ling, and Z. Beikai Midpoint line algorithm for high-speed high-accuracy rotation of images Proceedings of IEEE International Conference on Systems, Man, and Cybernetics 4 1996 2739 2744
-
(1996)
Proceedings of IEEE International Conference on Systems, Man, and Cybernetics 4
, pp. 2739-2744
-
-
Xuede, C.1
Siwei, L.2
Xiaobu, Y.3
Ling, C.4
Beikai, Z.5
-
52
-
-
78049326931
-
High capacity information hiding schemes using Tchebicheff moments
-
Wahun, China, May
-
S.M. Elshoura, D. Megherbi, High capacity information hiding schemes using Tchebicheff moments, in: IEEE Proceedings of the 2nd International Conference in Future Computer and Communication (ICFCC), Wahun, China, May 2010.
-
(2010)
IEEE Proceedings of the 2nd International Conference in Future Computer and Communication (ICFCC)
-
-
Elshoura, S.M.1
Megherbi, D.2
-
53
-
-
77956104404
-
A new rotation estimation and recovery algorithm
-
Tainan, Taiwan, May 5-7
-
S. Elshoura, D. Megherbi, A new rotation estimation and recovery algorithm, in: Proceedings of the International Symposium on Computer, Communication, Control, and Automation, Tainan, Taiwan, May 5-7 2010.
-
(2010)
Proceedings of the International Symposium on Computer, Communication, Control, and Automation
-
-
Elshoura, S.1
Megherbi, D.2
|