-
1
-
-
0002500694
-
Image authentication techniques for surveillance applications
-
PII S0018921901084298
-
F. Bartolini, A. Tefas, M. Bami, and I. Pitas Image authentication techniques for surveillance applications Proc. IEEE 89 10 2001 1403 1418 (Pubitemid 33766629)
-
(2001)
Proceedings of the IEEE
, vol.89
, Issue.10
, pp. 1403-1418
-
-
Bartolini, F.1
Tefas, A.2
Barni, M.3
Pitas, I.4
-
2
-
-
0034140535
-
Fault resilient and compression tolerant digital signature for image authentication
-
D.C. Lou, and J.L. Liu Fault resilient and compression tolerant digital signature for image authentication IEEE Trans. Consum. Electron. 46 1 2000 31 39
-
(2000)
IEEE Trans. Consum. Electron.
, vol.46
, Issue.1
, pp. 31-39
-
-
Lou, D.C.1
Liu, J.L.2
-
3
-
-
0035362493
-
Approximate image message authentication codes
-
L. Xie, G.R. Arce, and R.F. Graveman Approximate image message authentication codes IEEE Trans. Multimed. 3 2 2001 242 252
-
(2001)
IEEE Trans. Multimed.
, vol.3
, Issue.2
, pp. 242-252
-
-
Xie, L.1
Arce, G.R.2
Graveman, R.F.3
-
4
-
-
27844494781
-
A novel image authentication scheme based on quadtree segmentation
-
P.Y. Tsai, Y.C. Hu, and C.C. Chang A novel image authentication scheme based on quadtree segmentation Imaging Sci. J. 53 3 2005 149 162
-
(2005)
Imaging Sci. J.
, vol.53
, Issue.3
, pp. 149-162
-
-
Tsai, P.Y.1
Hu, Y.C.2
Chang, C.C.3
-
5
-
-
65649138758
-
Iterative compensation schemes for multimedia content authentication
-
S. Ababneh, R. Ansari, and A. Khokhar Iterative compensation schemes for multimedia content authentication J. Vis. Commun. Image Represent. 20 5 2009 303 311
-
(2009)
J. Vis. Commun. Image Represent.
, vol.20
, Issue.5
, pp. 303-311
-
-
Ababneh, S.1
Ansari, R.2
Khokhar, A.3
-
6
-
-
0035248504
-
A robust image authentication method distinguish JPEG compression from malicious manipulation
-
C.Y. Lin, and S.F. Chang A robust image authentication method distinguish JPEG compression from malicious manipulation IEEE Trans. Circuits Syst. Video Technol. 11 2 2001 153 168
-
(2001)
IEEE Trans. Circuits Syst. Video Technol.
, vol.11
, Issue.2
, pp. 153-168
-
-
Lin, C.Y.1
Chang, S.F.2
-
7
-
-
0035473831
-
Secret and public key image watermarking schemes for image authentication and ownership verification
-
DOI 10.1109/83.951543, PII S1057714901082094
-
P.W. Wong, and N. Memon Secret and public key image watermarking schemes for image authentication and ownership verification IEEE Trans. Image Process. 10 10 2001 1593 1601 (Pubitemid 32981831)
-
(2001)
IEEE Transactions on Image Processing
, vol.10
, Issue.10
, pp. 1593-1601
-
-
Wong, P.W.1
Memon, N.2
-
8
-
-
48149100935
-
Dual watermark for image tamper detection and recovery
-
T.Y. Lee, and S.D. Lin Dual watermark for image tamper detection and recovery Pattern Recognit. 41 11 2008 3497 3506
-
(2008)
Pattern Recognit.
, vol.41
, Issue.11
, pp. 3497-3506
-
-
Lee, T.Y.1
Lin, S.D.2
-
9
-
-
75249099043
-
A secure and robust hash-based scheme for image authentication
-
F. Ahmed, and M.Y. Siyal A secure and robust hash-based scheme for image authentication Signal Process. 90 5 2010 1456 1470
-
(2010)
Signal Process.
, vol.90
, Issue.5
, pp. 1456-1470
-
-
Ahmed, F.1
Siyal, M.Y.2
-
10
-
-
79551680643
-
A quantization-based semi-fragile watermarking scheme for image content authentication
-
X. Qi, and X. Xin A quantization-based semi-fragile watermarking scheme for image content authentication J. Vis. Commun. Image Represent. 22 2 2011 187 200
-
(2011)
J. Vis. Commun. Image Represent.
, vol.22
, Issue.2
, pp. 187-200
-
-
Qi, X.1
Xin, X.2
-
11
-
-
80052535001
-
An image authentication method by applying Hamming code on rearranged bits
-
C.S. Chan An image authentication method by applying Hamming code on rearranged bits Pattern Recognit. Lett. 32 14 2011 1679 1690
-
(2011)
Pattern Recognit. Lett.
, vol.32
, Issue.14
, pp. 1679-1690
-
-
Chan, C.S.1
-
12
-
-
82055208370
-
Watermarking with flexible self-recovery quality based on compressive sensing and compositive reconstruction
-
X.P. Zhang, Z.X. Qian, Y.L. Ren, and G.R. Feng Watermarking with flexible self-recovery quality based on compressive sensing and compositive reconstruction IEEE Trans. Inf. Forensics Secur. 6 4 2011 1223 1232
-
(2011)
IEEE Trans. Inf. Forensics Secur.
, vol.6
, Issue.4
, pp. 1223-1232
-
-
Zhang, X.P.1
Qian, Z.X.2
Ren, Y.L.3
Feng, G.R.4
-
13
-
-
83955162216
-
Self-embedding fragile watermarking with restoration capability based on adaptive bit allocation mechanism
-
C. Qin, C.C. Chang, and P.Y. Chen Self-embedding fragile watermarking with restoration capability based on adaptive bit allocation mechanism Signal Process. 92 4 2012 1137 1150
-
(2012)
Signal Process.
, vol.92
, Issue.4
, pp. 1137-1150
-
-
Qin, C.1
Chang, C.C.2
Chen, P.Y.3
-
14
-
-
79957706020
-
An adaptive image authentication scheme for vector quantization compressed image
-
J.C. Chuang, and Y.C. Hu An adaptive image authentication scheme for vector quantization compressed image J. Vis. Commun. Image Represent. 22 5 2011 440 449
-
(2011)
J. Vis. Commun. Image Represent.
, vol.22
, Issue.5
, pp. 440-449
-
-
Chuang, J.C.1
Hu, Y.C.2
-
15
-
-
84871946125
-
A novel tamper detection scheme for BTC compressed images
-
Y.C. Hu, W.L. Chen, C.C. Lo, and C.M. Wu A novel tamper detection scheme for BTC compressed images Opto-Electron. Rev. 21 1 2013 137 146
-
(2013)
Opto-Electron. Rev.
, vol.21
, Issue.1
, pp. 137-146
-
-
Hu, Y.C.1
Chen, W.L.2
Lo, C.C.3
Wu, C.M.4
-
16
-
-
84879989159
-
Joint image coding and image authentication based on AMBTC
-
(article no.: 013012)
-
Y.C. Hu, C.C. Lo, W.L. Chen, and C.H. Wen Joint image coding and image authentication based on AMBTC J. Electron. Imaging 22 1 2013 (article no.: 013012)
-
(2013)
J. Electron. Imaging
, vol.22
, Issue.1
-
-
Hu, Y.C.1
Lo, C.C.2
Chen, W.L.3
Wen, C.H.4
-
17
-
-
84875880417
-
Robust image hashing using ring-based entropies
-
Z. Tang, X. Zhang, L. Huang, and Y. Dai Robust image hashing using ring-based entropies Signal Process. 93 7 2013 2061 2069
-
(2013)
Signal Process.
, vol.93
, Issue.7
, pp. 2061-2069
-
-
Tang, Z.1
Zhang, X.2
Huang, L.3
Dai, Y.4
-
18
-
-
70350710022
-
Digital image steganography: Survey and analysis of current methods
-
A. Cheddad, J. Condell, K. Curran, and P. Mc Kevitt Digital image steganography: survey and analysis of current methods Signal Process. 90 3 2010 727 752
-
(2010)
Signal Process.
, vol.90
, Issue.3
, pp. 727-752
-
-
Cheddad, A.1
Condell, J.2
Curran, K.3
Mc Kevitt, P.4
-
19
-
-
33645157142
-
Reversible data hiding
-
Z. Ni, Y.Q. Shi, N. Ansari, and W. Su Reversible data hiding IEEE Trans. Circuits Syst Video Technol. 16 3 2006 354 362
-
(2006)
IEEE Trans. Circuits Syst Video Technol.
, vol.16
, Issue.3
, pp. 354-362
-
-
Ni, Z.1
Shi, Y.Q.2
Ansari, N.3
Su, W.4
-
20
-
-
60749112009
-
Reversible image hiding scheme using predictive coding and histogram shifting
-
P.Y. Tsai, Y.C. Hu, and H.L. Yeh Reversible image hiding scheme using predictive coding and histogram shifting Signal Process. 89 6 2009 1129 1143
-
(2009)
Signal Process.
, vol.89
, Issue.6
, pp. 1129-1143
-
-
Tsai, P.Y.1
Hu, Y.C.2
Yeh, H.L.3
-
21
-
-
84878656390
-
A novel reversible data hiding scheme based on two-dimensional difference-histogram modification
-
X. Li, W. Zhang, X. Gui, and B. Yang A novel reversible data hiding scheme based on two-dimensional difference-histogram modification IEEE Trans. Inf. Forensics Secur. 8 7 2013 1091 1100
-
(2013)
IEEE Trans. Inf. Forensics Secur.
, vol.8
, Issue.7
, pp. 1091-1100
-
-
Li, X.1
Zhang, W.2
Gui, X.3
Yang, B.4
-
22
-
-
84875220373
-
Reversible data hiding scheme based on neighboring pixel differences
-
Y.Y. Tsai, D.S. Tsai, and C.L. Liu Reversible data hiding scheme based on neighboring pixel differences Digital Signal Process.: Rev. J. 23 3 2013 919 927
-
(2013)
Digital Signal Process.: Rev. J.
, vol.23
, Issue.3
, pp. 919-927
-
-
Tsai, Y.Y.1
Tsai, D.S.2
Liu, C.L.3
-
23
-
-
0141862029
-
Reversible data embedding using a difference expansion
-
J. Tian Reversible data embedding using a difference expansion IEEE Trans. Circuits Syst. Video Technol. 13 8 2003 890 896
-
(2003)
IEEE Trans. Circuits Syst. Video Technol.
, vol.13
, Issue.8
, pp. 890-896
-
-
Tian, J.1
-
24
-
-
49549108193
-
A novel difference expansion transform for reversible data embedding
-
H.J. Kim, V. Sachnev, Y.Q. Shi, J. Nam, and H.G. Choo A novel difference expansion transform for reversible data embedding IEEE Trans. Inf. Forensics Secur. 3 3 2008 356 465
-
(2008)
IEEE Trans. Inf. Forensics Secur.
, vol.3
, Issue.3
, pp. 356-465
-
-
Kim, H.J.1
Sachnev, V.2
Shi, Y.Q.3
Nam, J.4
Choo, H.G.5
-
25
-
-
84877279434
-
Reversible data hiding scheme for color image based on prediction-error expansion and cross-channel correlation
-
J. Li, X. Li, and B. Yang Reversible data hiding scheme for color image based on prediction-error expansion and cross-channel correlation Signal Process. 93 9 2013 2748 2758
-
(2013)
Signal Process.
, vol.93
, Issue.9
, pp. 2748-2758
-
-
Li, J.1
Li, X.2
Yang, B.3
-
26
-
-
42449100313
-
Reversible data hiding using the companding technique and improved de method
-
S. Weng, Y. Zhao, J.S. Pan, and R. Ni Reversible data hiding using the companding technique and improved DE method Circuits Syst. Signal Process. 27 2 2008 229 245
-
(2008)
Circuits Syst. Signal Process.
, vol.27
, Issue.2
, pp. 229-245
-
-
Weng, S.1
Zhao, Y.2
Pan, J.S.3
Ni, R.4
-
27
-
-
84872675370
-
A reversible data hiding method by histogram shifting in high quality medical images
-
L.C. Huang, L.Y. Tseng, and M.S. Hwang A reversible data hiding method by histogram shifting in high quality medical images J. Syst. Software 86 3 2013 716 727
-
(2013)
J. Syst. Software
, vol.86
, Issue.3
, pp. 716-727
-
-
Huang, L.C.1
Tseng, L.Y.2
Hwang, M.S.3
-
28
-
-
84905971572
-
High capacity reversible hiding scheme based on interpolation, difference expansion, and histogram shifting
-
in press
-
T.C. Lu, C.C. Chang, Y.H. Huang, High capacity reversible hiding scheme based on interpolation, difference expansion, and histogram shifting, Multimed. Tools Appl., 10.1007/s11042-013-1369-0, in press
-
Multimed. Tools Appl.
-
-
Lu, T.C.1
Chang, C.C.2
Huang, Y.H.3
|