-
1
-
-
84944878354
-
-
CRC Press, Boca Raton, FL
-
Menezes, A., Oorschot, P., and Vanstone, S., Handbook of Applied Cryptography, CRC Press, Boca Raton, FL, 1996.
-
(1996)
Handbook of Applied Cryptography
-
-
Menezes, A.1
Oorschot, P.2
Vanstone, S.3
-
3
-
-
0033601658
-
-
presented at SPIE International Conference on Security and Watermarking of Multimedia Contents, San Jose
-
Lin, C.-Y. and Chang, S.-F., Issues and Solutions for Authenticating MPEG Video, presented at SPIE International Conference on Security and Watermarking of Multimedia Contents, San Jose, 1999, Vol. 3657, pp. 54-65.
-
(1999)
Issues and Solutions for Authenticating MPEG Video
, vol.3657
, pp. 54-65
-
-
Lin, C.-Y.1
Chang, S.-F.2
-
4
-
-
0036755019
-
On the design of content-based multimedia authentication systems
-
Wu, C.-W., On the design of content-based multimedia authentication systems, IEEE Trans. Multimedia, 4, 385-393, 2002.
-
(2002)
IEEE Trans. Multimedia
, vol.4
, pp. 385-393
-
-
Wu, C.-W.1
-
5
-
-
0027697301
-
The trustworthy digital camera: Restoring credibility to the photographic image
-
Friedman, G. L., The trustworthy digital camera: Restoring credibility to the photographic image, IEEE Trans. Consumer Electron., 39(4), 905-910, 1993.
-
(1993)
IEEE Trans. Consumer Electron.
, vol.39
, Issue.4
, pp. 905-910
-
-
Friedman, G.L.1
-
6
-
-
34249030190
-
-
presented at SPIE International Conference on Storage and Retrieval for Image and Video Databases V, San Jose
-
Quisquater, J.-J., Macq, B., Joye, M., Degand, N., and Bernard, A., Practical Solution to Authentication of Images with a Secure Camera, presented at SPIE International Conference on Storage and Retrieval for Image and Video Databases V, San Jose, 1997, Vol. 3022, pp. 290-297.
-
(1997)
Practical Solution to Authentication of Images with a Secure Camera
, vol.3022
, pp. 290-297
-
-
Quisquater, J.-J.1
Macq, B.2
Joye, M.3
Degand, N.4
Bernard, A.5
-
7
-
-
0000710825
-
How to Sign Digital Streams
-
Santa Barbara, CA
-
Gennaro, R. and Rohatgi, P., How to Sign Digital Streams, in Proceedings of CRYPTO 97, Santa Barbara, CA, 1997.
-
(1997)
Proceedings of CRYPTO 97
-
-
Gennaro, R.1
Rohatgi, P.2
-
9
-
-
84862867186
-
Efficient Multicast Packet Authentication Using Signature Amortization
-
Park, J. M., Chong, E. K. P., and Siegel, H. J., Efficient Multicast Packet Authentication Using Signature Amortization, in Proceedings of the IEEE Symposium on Security and Privacy, 2002, pp. 227-240.
-
(2002)
Proceedings of the IEEE Symposium on Security and Privacy
, pp. 227-240
-
-
Park, J.M.1
Chong, E.K.P.2
Siegel, H.J.3
-
10
-
-
84947260449
-
Distortion-free Data Embedding
-
Goljan, M., Fridrich, J., and Du, R., Distortion-free Data Embedding, in Proceedings of 4th Information Hiding Workshop, 2001, pp. 27-41.
-
(2001)
Proceedings of 4th Information Hiding Workshop
, pp. 27-41
-
-
Goljan, M.1
Fridrich, J.2
Du, R.3
-
11
-
-
85056428306
-
-
Chap. 7, this volume
-
Shi, Y. Q., Chap. 7, this volume.
-
-
-
Shi, Y.Q.1
-
13
-
-
0035473831
-
Secret and public key image watermarking schemes for image authentication and ownership verification
-
Wong, P. W. and Memon, N., Secret and public key image watermarking schemes for image authentication and ownership verification, IEEE Trans. Image Process., 10(10), 1593-1601, 2001.
-
(2001)
IEEE Trans. Image Process.
, vol.10
, Issue.10
, pp. 1593-1601
-
-
Wong, P.W.1
Memon, N.2
-
15
-
-
0035248504
-
A robust image authentication method distinguishing JPEG compression from malicious manipulation
-
Lin, C.-Y. and Chang, S.-F., A robust image authentication method distinguishing JPEG compression from malicious manipulation, IEEE Trans. Circuits Systems Video Technol., 11(2), 153-168, 2001.
-
(2001)
IEEE Trans. Circuits Systems Video Technol.
, vol.11
, Issue.2
, pp. 153-168
-
-
Lin, C.-Y.1
Chang, S.-F.2
-
16
-
-
0032650557
-
Content-based Digital Signature for Motion Pictures Authentication and Content-Fragile Watermarking
-
Dittmann, J., Steinmetz, A., and Steinmetz, R., Content-based Digital Signature for Motion Pictures Authentication and Content-Fragile Watermarking, in Proceedings of the IEEE International Conference on Multimedia Computing and Systems, 1999, Vol. II, pp. 209-213.
-
(1999)
Proceedings of the IEEE International Conference on Multimedia Computing and Systems
, vol.2
, pp. 209-213
-
-
Dittmann, J.1
Steinmetz, A.2
Steinmetz, R.3
-
17
-
-
0035097432
-
Authentication of digital image and video: Generic models and a new contribution
-
Queluz, M. P., Authentication of digital image and video: generic models and a new contribution, Signal Process.: Image Commn., 16, 461-475, 2001.
-
(2001)
Signal Process.: Image Commn.
, vol.16
, pp. 461-475
-
-
Queluz, M.P.1
-
18
-
-
0037818310
-
Structural digital signature for image authentication: An incidental distortion resistant scheme
-
Lu, C. S. and Liao, H.-Y.M., Structural digital signature for image authentication:an incidental distortion resistant scheme, IEEE Trans. Multimedia, 5(2), 161-173, 2003.
-
(2003)
IEEE Trans. Multimedia
, vol.5
, Issue.2
, pp. 161-173
-
-
Lu, C.S.1
Liao, H.-Y.M.2
-
19
-
-
0034797508
-
A New Technique for Authentication of Image/Video for Multimedia Applications
-
Canada
-
Tzeng, C.-H. and Tsai, W.-H., A New Technique for Authentication of Image/Video for Multimedia Applications, in Proceedings of ACM Multimedia Workshop’01, Canada, 2001.
-
(2001)
Proceedings of ACM Multimedia Workshop’01
-
-
Tzeng, C.-H.1
Tsai, W.-H.2
-
20
-
-
85056385981
-
-
presented at SPIE International Symposium on Electronic Imaging 2002, San Jose, CA
-
Wu, C.-P. and Kuo, C.-C. J., Comparison of Two Speech Content Authentication Approaches, presented at SPIE International Symposium on Electronic Imaging 2002, San Jose, CA, 2002.
-
(2002)
Comparison of Two Speech Content Authentication Approaches
-
-
Wu, C.-P.1
Kuo, C.-C.J.2
-
21
-
-
0033703670
-
-
presented at SPIE International Conference on Security and Watermarking of Multimedia Contents II, San Jose, CA
-
Sun, Q., Zhong, D., Chang, S.-F., and Narasimhalu, A., VQ-based Digital Signature Scheme for Multimedia Content, presented at SPIE International Conference on Security and Watermarking of Multimedia Contents II, San Jose, CA, 2000, Vol. 3971, pp. 404-416.
-
(2000)
VQ-based Digital Signature Scheme for Multimedia Content
, vol.3971
, pp. 404-416
-
-
Sun, Q.1
Zhong, D.2
Chang, S.-F.3
Narasimhalu, A.4
-
23
-
-
0034140535
-
Fault resilient and compression tolerant digital signature for image authentication
-
Lou, D.-C. and Liu, J.-L., Fault resilient and compression tolerant digital signature for image authentication, IEEE Trans. Consumer Electron., 46(1), 31-39, 2000.
-
(2000)
IEEE Trans. Consumer Electron.
, vol.46
, Issue.1
, pp. 31-39
-
-
Lou, D.-C.1
Liu, J.-L.2
-
24
-
-
1442357585
-
Image authentication using content based compression
-
Chang, E.-C., Kankanhalli, M. S., Guan, X., Huang, Z., and Wu, Y., Image authentication using content based compression, ACM Multimedia Syst., 9(2), 121-130, 2003.
-
(2003)
ACM Multimedia Syst.
, vol.9
, Issue.2
, pp. 121-130
-
-
Chang, E.-C.1
Kankanhalli, M.S.2
Guan, X.3
Huang, Z.4
Wu, Y.5
-
25
-
-
0033686485
-
-
presented at SPIE International Conference on Security and Watermarking of Multimedia Contents II, San Jose, CA
-
Memon, N. D., Vora, P., and Yeung, M., Distortion Bound Authentication Techniques, presented at SPIE International Conference on Security and Watermarking of Multimedia Contents II, San Jose, CA, 2000, Vol. 3971, pp. 164-175.
-
(2000)
Distortion Bound Authentication Techniques
, vol.3971
, pp. 164-175
-
-
Memon, N.D.1
Vora, P.2
Yeung, M.3
-
27
-
-
0035362493
-
Approximate image message authentication codes
-
Xie, L., Arce, G. R., and Graveman, R. F., Approximate image message authentication codes, IEEE Trans. Multimedia, 3(2), 242-252, 2001.
-
(2001)
IEEE Trans. Multimedia
, vol.3
, Issue.2
, pp. 242-252
-
-
Xie, L.1
Arce, G.R.2
Graveman, R.F.3
-
28
-
-
0034444578
-
Robust Image Hashing
-
Vancouver
-
Venkatesan, R., Koon, S.-M., Jakubowski, M.H., and Moulin, P., Robust Image Hashing, in Proceedings of IEEE International Conference on Image Processing’00, Vancouver, 2000.
-
(2000)
Proceedings of IEEE International Conference on Image Processing’00
-
-
Venkatesan, R.1
Koon, S.-M.2
Jakubowski, M.H.3
Moulin, P.4
-
29
-
-
20144386063
-
Compression Tolerant DCT Based Image Hash
-
Rhode Island
-
Kailasanathan, C., Naini, R. S., and Ogunbona, P., Compression Tolerant DCT Based Image Hash, in Proceedings of the 23rd International Conference on Distributed Computing Systems Workshops (ICDCSW’03), Rhode Island, 2003.
-
(2003)
Proceedings of the 23rd International Conference on Distributed Computing Systems Workshops (ICDCSW’03)
-
-
Kailasanathan, C.1
Naini, R.S.2
Ogunbona, P.3
-
30
-
-
0036290727
-
A New Semi-fragile Image Authentication Framework Combining ECC and PKI Infrastructure
-
Phoenix
-
Sun, Q., Chang, S.-F., and Maeno, K., A New Semi-fragile Image Authentication Framework Combining ECC and PKI Infrastructure, in Proceeding of International Symposium on Circuits and Systems’02, Phoenix, 2002.
-
(2002)
Proceeding of International Symposium on Circuits and Systems’02
-
-
Sun, Q.1
Chang, S.-F.2
Maeno, K.3
-
31
-
-
33847228664
-
A Robust and Secure Media Signature Scheme for JPEG Images
-
Virgin Island
-
Sun, Q., Tian, Q., and Chang, S.-F., A Robust and Secure Media Signature Scheme for JPEG Images, in Proceeding of Workshop on Multimedia Signal Processing’02, Virgin Island, 2002.
-
(2002)
Proceeding of Workshop on Multimedia Signal Processing’02
-
-
Sun, Q.1
Tian, Q.2
Chang, S.-F.3
-
32
-
-
85056071822
-
A quantitative semi-fragile JPEG2000 image authentication solution
-
press
-
Sun, Q., and Chang, S.-F., A quantitative semi-fragile JPEG2000 image authentication solution, IEEE Trans. Multimedia, in press.
-
IEEE Trans. Multimedia
-
-
Sun, Q.1
Chang, S.-F.2
-
33
-
-
85056042457
-
An Object Based Authentication System
-
press
-
He, D., Sun, Q., and Tian, Q., An Object Based Authentication System, EURASIP J. Appl. Signal Process., in press.
-
EURASIP J. Appl. Signal Process.
-
-
He, D.1
Sun, Q.2
Tian, Q.3
-
34
-
-
84908591115
-
A Robust and Secure Approach to Scalable Video Authentication
-
Sun, Q., He, D., Zhang, Z., and Tian, Q., A Robust and Secure Approach to Scalable Video Authentication, in Proceedings of International Conference on Multimedia and Expo’03, 2003.
-
(2003)
Proceedings of International Conference on Multimedia and Expo’03
-
-
Sun, Q.1
He, D.2
Zhang, Z.3
Tian, Q.4
-
35
-
-
84884742176
-
A crypto signature scheme for image authentication over wireless channel
-
Sun, Q., Ye, S., Lin, C.-Y., and Chang, S.-F., A crypto signature scheme for image authentication over wireless channel, Int. J. Image Graphics, 5(1), 1-14, 2005.
-
(2005)
Int. J. Image Graphics
, vol.5
, Issue.1
, pp. 1-14
-
-
Sun, Q.1
Ye, S.2
Lin, C.-Y.3
Chang, S.-F.4
-
36
-
-
84889617580
-
-
ISO/IEC JTC 1/SC 29/WG1, N3074, and N3107
-
Zhang, Z., Qiu, G., Sun, Q., Lin, X., Ni, Z., and Shi, Y., A unified authentication framework for JPEG2000, ISO/IEC JTC 1/SC 29/WG1, N3074, and N3107, 2003.
-
(2003)
A unified authentication framework for JPEG2000
-
-
Zhang, Z.1
Qiu, G.2
Sun, Q.3
Lin, X.4
Ni, Z.5
Shi, Y.6
-
37
-
-
85056377058
-
-
JPEG2000 Part 1: Core coding system, ISO/IEC 15444-1:2000
-
JPEG2000 Part 1: Core coding system, ISO/IEC 15444-1:2000.
-
-
-
-
38
-
-
11244267668
-
A Novel Lossless Data Hiding Algorithm and Its Application in Authentication of JPEG2000 Images
-
New Jersey Institute of Technology
-
Ni, Z. and Shi, Y. Q., A Novel Lossless Data Hiding Algorithm and Its Application in Authentication of JPEG2000 Images, Technical Report, New Jersey Institute of Technology, 2003.
-
(2003)
Technical Report
-
-
Ni, Z.1
Shi, Y.Q.2
-
39
-
-
85056425049
-
-
Face database
-
Face database: http://www.ee.surrey.ac.uk/Research/VSSP/xm2vtsdb, 2002.
-
(2002)
-
-
-
40
-
-
0003476270
-
-
Prentice-Hall, Englewood Cliffs, NJ
-
Lin, S. and Costello, D. J., Error Control Coding: Fundamentals and Applications, Prentice-Hall, Englewood Cliffs, NJ, 1983.
-
(1983)
Error Control Coding: Fundamentals and Applications
-
-
Lin, S.1
Costello, D.J.2
|