-
2
-
-
0021515479
-
Absolute moment block truncation coding and its application to color images
-
M. D. Lema and O. R. Mitchell, "Absolute moment block truncation coding and its application to color image," IEEE Trans. Commun. 32(10), 1148-1157 (1984). (Pubitemid 14671306)
-
(1984)
IEEE Transactions on Communications
, vol.COM-32
, Issue.10
, pp. 1148-1157
-
-
Lema, M.D.1
Mitchell, O.R.2
-
3
-
-
0042976319
-
Low-complexity and low-bit-rate image compression scheme based on AMBTC
-
Y. C. Hu, "Low-complexity and low-bit-rate image compression scheme based on AMBTC," Opt. Eng. 42(7), 1964-1975 (2003).
-
(2003)
Opt. Eng
, vol.42
, Issue.7
, pp. 1964-1975
-
-
Hu, Y.C.1
-
4
-
-
54549096836
-
Color image coding scheme using absolute moment block truncation coding and block prediction technique
-
Y. C. Hu, B. H. Su, and P. Y. Tsai, "Color image coding scheme using absolute moment block truncation coding and block prediction technique," Imaging Sci. J. 56(5), 254-270 (2008).
-
(2008)
Imaging Sci. J
, vol.56
, Issue.5
, pp. 254-270
-
-
Hu, Y.C.1
Su, B.H.2
Tsai, P.Y.3
-
6
-
-
0036703236
-
A novel two-stage edge detection scheme for digital color images
-
P. Y. Tsai, C. C. Chang, and Y. C. Hu, "A novel two-stage edge detection scheme for digital color images," R. Time Imag. 8(4), 329-343 (2002).
-
(2002)
R. Time Imag
, vol.8
, Issue.4
, pp. 329-343
-
-
Tsai, P.Y.1
Chang, C.C.2
Hu, Y.C.3
-
7
-
-
58049217733
-
A BTC-based watermarking scheme for digital images
-
S. F. Tu and C. S. Hsu, "A BTC-based watermarking scheme for digital images," Inf. Sec. 15(2), 214-226 (2004).
-
(2004)
Inf. Sec
, vol.15
, Issue.2
, pp. 214-226
-
-
Tu, S.F.1
Hsu, C.S.2
-
8
-
-
66049131563
-
Watermarking in conjugate ordered dither block truncation coding images
-
J. M. Guo, M. F. Wu, and Y. C. Kang, "Watermarking in conjugate ordered dither block truncation coding images," Signal Process. 89(10), 1864-1882 (2009).
-
(2009)
Signal Process
, vol.89
, Issue.10
, pp. 1864-1882
-
-
Guo, J.M.1
Wu, M.F.2
Kang, Y.C.3
-
9
-
-
77954718010
-
Joint compression/watermarking scheme using majority-parity guidance and halftoning-based block truncation coding
-
J. M. Guo and Y. F. Liu, "Joint compression/watermarking scheme using majority-parity guidance and halftoning-based block truncation coding," IEEE Trans. Image Process. 19(8), 2056-2069 (2010).
-
(2010)
IEEE Trans. Image Process
, vol.19
, Issue.8
, pp. 2056-2069
-
-
Guo, J.M.1
Liu, Y.F.2
-
10
-
-
55549099235
-
A data embedding scheme for color images based on genetic algorithm and absolute moment block truncation coding
-
C. C. Chang, Y. H. Chen, and C. C. Lin, "A data embedding scheme for color images based on genetic algorithm and absolute moment block truncation coding," Soft Comput. 13(4), 321-331 (2009).
-
(2009)
Soft Comput
, vol.13
, Issue.4
, pp. 321-331
-
-
Chang, C.C.1
Chen, Y.H.2
Lin, C.C.3
-
11
-
-
41549096759
-
Lossless data hiding for color images based on block truncation coding
-
C. C. Chang, C. Y. Lin, and Y. H. Fan, "Lossless data hiding for color images based on block truncation coding," Pattern Recognit. 41(7), 2347-2357 (2008).
-
(2008)
Pattern Recognit
, vol.41
, Issue.7
, pp. 2347-2357
-
-
Chang, C.C.1
Lin, C.Y.2
Fan, Y.H.3
-
12
-
-
0002500694
-
Image authentication techniques for surveillance applications
-
PII S0018921901084298
-
F. Bartolini et al., "Image authentication techniques for surveillance applications," Proc. IEEE 89(10), 1403-1418 (2001). (Pubitemid 33766629)
-
(2001)
Proceedings of the IEEE
, vol.89
, Issue.10
, pp. 1403-1418
-
-
Bartolini, F.1
Tefas, A.2
Barni, M.3
Pitas, I.4
-
13
-
-
0035362493
-
Approximate image message authentication codes
-
L. Xie, G. R. Arce, and R. F. Graveman, "Approximate image message authentication codes," IEEE Trans. Multimed. 3(2), 242-252 (2001).
-
(2001)
IEEE Trans. Multimed
, vol.3
, Issue.2
, pp. 242-252
-
-
Xie, L.1
Arce, G.R.2
Graveman, R.F.3
-
14
-
-
27844494781
-
A novel image authentication scheme based on quadtree segmentation
-
P. Y. Tsai, Y. C. Hu, and C. C. Chang, "A novel image authentication scheme based on quadtree segmentation," Imaging Sci. J. 53(3), 149-162 (2005).
-
(2005)
Imaging Sci. J
, vol.53
, Issue.3
, pp. 149-162
-
-
Tsai, P.Y.1
Hu, Y.C.2
Chang, C.C.3
-
15
-
-
33750303836
-
An efficient image authentication method based on Hamming code
-
C. S. Chan and C. C. Chang, "An efficient image authentication method based on Hamming code," Pattern Recognit. 40(2), 681-691 (2007).
-
(2007)
Pattern Recognit
, vol.40
, Issue.2
, pp. 681-691
-
-
Chan, C.S.1
Chang, C.C.2
-
16
-
-
65649138758
-
Iterative compensation schemes for multimedia content authentication
-
S. Ababneh, R. Ansari, and A. Khokhar, "Iterative compensation schemes for multimedia content authentication," J. Vis. Commun. Image Represent. 20(5), 303-311 (2009).
-
(2009)
J. Vis. Commun. Image Represent
, vol.20
, Issue.5
, pp. 303-311
-
-
Ababneh, S.1
Ansari, R.2
Khokhar, A.3
-
17
-
-
0035248504
-
A robust image authentication method distinguish JPEG compression from malicious manipulation
-
C. Y. Lin and S. F. Chang, "A robust image authentication method distinguish JPEG compression from malicious manipulation," IEEE Trans. Circ. Syst. Video Tech. 11(2), 153-168 (2001).
-
(2001)
IEEE Trans. Circ. Syst. Video Tech
, vol.11
, Issue.2
, pp. 153-168
-
-
Lin, C.Y.1
Chang, S.F.2
-
18
-
-
0035473831
-
Secret and public key image watermarking schemes for image authentication and ownership verification
-
DOI 10.1109/83.951543, PII S1057714901082094
-
P. W. Wong and N. Memon, "Secret and public key image watermarking schemes for image authentication and ownership verification," IEEE Trans. Image Process. 10(10), 1593-1601 (2001). (Pubitemid 32981831)
-
(2001)
IEEE Transactions on Image Processing
, vol.10
, Issue.10
, pp. 1593-1601
-
-
Wong, P.W.1
Memon, N.2
-
19
-
-
0142029533
-
Using set partitioning in hierarchical trees to authenticate digital images
-
P. Y. Tsai, Y. C. Hu, and C. C. Chang, "Using set partitioning in hierarchical trees to authenticate digital images," Signal Process. Image Commun. 18(9), 813-822 (2003).
-
(2003)
Signal Process. Image Commun
, vol.18
, Issue.9
, pp. 813-822
-
-
Tsai, P.Y.1
Hu, Y.C.2
Chang, C.C.3
-
20
-
-
33748119112
-
Dual protection of JPEG images based on informed embedding and two-stage watermark extraction techniques
-
W. N. Lie, G. S. Lin, and S. L. Chen, "Dual protection of JPEG images based on informed embedding and two-stage watermark extraction techniques," IEEE Trans. Inf. Foren. Sec. 1(3), 330-341 (2006).
-
(2006)
IEEE Trans. Inf. Foren. Sec
, vol.1
, Issue.3
, pp. 330-341
-
-
Lie, W.N.1
Lin, G.S.2
Chen, S.L.3
-
21
-
-
40549093361
-
Fragility and robustness of binary-phase-only-filter-based fragile/ semifragile digital image watermarking
-
DOI 10.1109/TIM.2007.911585
-
S. Jun and M. S. Alam, "Fragility and robustness of binary-phase-onlyfilter-based fragile/semifragile digital image watermarking," IEEE Trans. Instrum. Meas. 57(3), 595-606 (2008). (Pubitemid 351359254)
-
(2008)
IEEE Transactions on Instrumentation and Measurement
, vol.57
, Issue.3
, pp. 595-606
-
-
Sang, J.1
Alam, M.S.2
-
22
-
-
48149100935
-
Dual watermark for image tamper detection and recovery
-
T. Y. Lee and S. D. Lin, "Dual watermark for image tamper detection and recovery," Pattern Recognit. 41(11), 3497-3506 (2008).
-
(2008)
Pattern Recognit
, vol.41
, Issue.11
, pp. 3497-3506
-
-
Lee, T.Y.1
Lin, S.D.2
-
23
-
-
79551680643
-
A quantization-based semi-fragile watermarking scheme for image content authentication
-
X. Qi and X. Xin, "A quantization-based semi-fragile watermarking scheme for image content authentication," J. Vis. Commun. Image Represent. 22(2), 187-200 (2011).
-
(2011)
J. Vis. Commun. Image Represent
, vol.22
, Issue.2
, pp. 18-200
-
-
Qi, X.1
Xin, X.2
-
24
-
-
79957706020
-
An adaptive image authentication scheme for vector quantization compressed image
-
J. C. Chuang and Y. C. Hu, "An adaptive image authentication scheme for vector quantization compressed image," J. Vis. Commun. Image Represent. 22(5), 440-449 (2011).
-
(2011)
J. Vis. Commun. Image Represent
, vol.22
, Issue.5
, pp. 440-449
-
-
Chuang, J.C.1
Hu, Y.C.2
-
25
-
-
81755185936
-
Tampering attacks on binary phase only filter-based watermarking schemes for image authentication
-
C. Gang, Z. Yao, and N. Rongrong, "Tampering attacks on binary phase only filter-based watermarking schemes for image authentication," Opt. Eng. 50(5), 057004 (2011).
-
(2011)
Opt. Eng
, vol.50
, Issue.5
, pp. 057004
-
-
Gang, C.1
Yao, Z.2
Rongrong, N.3
-
26
-
-
33644995185
-
Analysis and design of secure watermark-based authentication systems
-
C. Fei, D. Kundur, and R. H. Kwong, "Analysis and design of secure watermark-based authentication systems," IEEE Trans. Inf. Foren. Sec. 1(1), 43-55 (2006).
-
(2006)
IEEE Trans. Inf. Foren. Sec
, vol.1
, Issue.1
, pp. 43-55
-
-
Fei, C.1
Kundur, D.2
Kwong, R.H.3
|