-
1
-
-
0017930809
-
A method for obtaining digital signatures and public-key cryptosystems
-
R. L. Riverst, A. Shamir and L. Adleman, "A method for obtaining digital signatures and public-key cryptosystems," ACM Truncation on communications, vol. 21, no. 2, (1978), pp. 120-126.
-
(1978)
ACM Truncation on communications
, vol.21
, Issue.2
, pp. 120-126
-
-
Riverst, R.L.1
Shamir, A.2
Adleman, L.3
-
2
-
-
0002500694
-
Image authentication techniques for surveillance applications
-
F. Bartolini, A. Tefas, M. Bami and I. Pitas, "Image authentication techniques for surveillance applications," Proceedings of IEEE, vol. 89, no. 10, (2001), pp. 1403-1418.
-
(2001)
Proceedings of IEEE
, vol.89
, Issue.10
, pp. 1403-1418
-
-
Bartolini, F.1
Tefas, A.2
Bami, M.3
Pitas, I.4
-
3
-
-
0036755019
-
On the design of content-based multimedia authentication systems
-
C. W. Wu, "On the design of content-based multimedia authentication systems," IEEE Transactions on Multimedia, vol. 4, no. 3, (2002), pp. 385-393.
-
(2002)
IEEE Transactions on Multimedia
, vol.4
, Issue.3
, pp. 385-393
-
-
Wu C.W1
-
4
-
-
33645152302
-
Lossless watermarking for image authentication: a new framework and an implementation
-
M. U. Celik, G Sharma and A. Tekalp, "Lossless watermarking for image authentication: a new framework and an implementation," IEEE Transactions on Image Processing, vol. 15, no. 4, (2006), pp. 1042-1049.
-
(2006)
IEEE Transactions on Image Processing
, vol.15
, Issue.4
, pp. 1042-1049
-
-
Celik, M.U.1
Sharma, G.2
Tekalp, A.3
-
5
-
-
32644434350
-
A watermarking-based image ownership and tampering authentication scheme
-
C. C. Chang, Y. S. Hu and T. C. Lu, "A watermarking-based image ownership and tampering authentication scheme," Pattern Recognition Letters, vol. 27, no. 5, (2006), pp. 439-446.
-
(2006)
Pattern Recognition Letters
, vol.27
, Issue.5
, pp. 439-446
-
-
Chang, C.C.1
Hu, Y.S.2
Lu, T.C.3
-
6
-
-
48149100935
-
Dual watermark for image tamper detection and recovery
-
T. Y. Lee and S. D. Lin, "Dual watermark for image tamper detection and recovery," Pattern Recognition, vol. 41, no. 11, (2008), pp. 3497-3506.
-
(2008)
Pattern Recognition
, vol.41
, Issue.11
, pp. 3497-3506
-
-
Lee, T.Y.1
Lin, S.D.2
-
7
-
-
48149104075
-
Tampering with a watermarking-based image authentication
-
R. C. W. Phan, "Tampering with a watermarking-based image authentication," Pattern Recognition, vol. 41, no. 11, (2008), pp. 2493-3496.
-
(2008)
Pattern Recognition
, vol.41
, Issue.11
, pp. 2493-3496
-
-
Phan, R.C.W.1
-
8
-
-
69249216337
-
Recover the tampered image based on VQ indexing
-
C. W. Yang and J. J. Shen, "Recover the tampered image based on VQ indexing," Signal Processing, vol. 90, no. 1, (2010), pp. 331-343.
-
(2010)
Signal Processing
, vol.90
, Issue.1
, pp. 331-343
-
-
Yang, C.W.1
Shen, J.J.2
-
9
-
-
79957706020
-
An adaptive image authentication scheme for vector quantization compressed image
-
J. C. Chuang and Y. C. Hu, "An adaptive image authentication scheme for vector quantization compressed image," Journal of Visual Communication and Image Representation, vol. 22, no. 5, (2011), pp. 440-449.
-
(2011)
Journal of Visual Communication and Image Representation
, vol.22
, Issue.5
, pp. 440-449
-
-
Chuang, J.C.1
Hu, Y.C.2
-
10
-
-
0032648596
-
Digital watermarking for telltale tamper proofing and authentication
-
D. Kundur and D. Hatzinakos, "Digital watermarking for telltale tamper proofing and authentication," Proceedings of the IEEE, vol. 87, no. 7, (1999), pp. 1167-1180.
-
(1999)
Proceedings of the IEEE
, vol.87
, Issue.7
, pp. 1167-1180
-
-
Kundur, D.1
Hatzinakos, D.2
-
11
-
-
0035473830
-
Multipurpose watermarking for image authentication and protection
-
C. S. Lu and H. Y. M. Laio, "Multipurpose watermarking for image authentication and protection," IEEE Transactions on Image Processing, vol. 10, no. 10, (2001), pp. 435-439.
-
(2001)
IEEE Transactions on Image Processing
, vol.10
, Issue.10
, pp. 435-439
-
-
Lu, C.S.1
Laio, H.Y.M.2
-
12
-
-
0035248504
-
A robust image authentication method distinguish JPEG compression from malicious manipulation
-
C. Y. Lin and S. F. Chang, "A robust image authentication method distinguish JPEG compression from malicious manipulation," IEEE Transactions on Circuits and Systems of Video Technology, vol. 11, no. 2, (2001), pp. 153-168.
-
(2001)
IEEE Transactions on Circuits and Systems of Video Technology
, vol.11
, Issue.2
, pp. 153-168
-
-
Lin, C.Y.1
Chang, S.F.2
-
13
-
-
33748119112
-
Dual protection of JPEG images based on informed embedding and two-stage watermark extraction techniques
-
W. N. Lie, G S. Lin and S. L. Chen, "Dual protection of JPEG images based on informed embedding and two-stage watermark extraction techniques," IEEE Transactions on Information Forensics and Security, vol. 1, no. 3, (2006), pp. 330-341.
-
(2006)
IEEE Transactions on Information Forensics and Security
, vol.1
, Issue.3
, pp. 330-341
-
-
Lie, W.N.1
Lin, G.S.2
Chen S.L3
-
14
-
-
40549093361
-
Fragility and robustness of binary-phase-only-filter-based fragile/semi-fragile digital image watermarking
-
S. Jun and M.S. Alam, "Fragility and robustness of binary-phase-only-filter-based fragile/semi-fragile digital image watermarking," IEEE Transactions on Instrumentation and Measurement, vol. 57, no. 3, (2008), pp. 595-606.
-
(2008)
IEEE Transactions on Instrumentation and Measurement
, vol.57
, Issue.3
, pp. 595-606
-
-
Jun, S.1
Alam, M.S.2
-
15
-
-
77955417038
-
A novel DCT domain CRT-based watermarking scheme for image authentication surviving JPEG compression
-
J. C. Patra, J. E. Phua and C. Bornand, "A novel DCT domain CRT-based watermarking scheme for image authentication surviving JPEG compression," Digital Signal Processing, vol. 20, no. 6, (2010), pp. 1597-1611.
-
(2010)
Digital Signal Processing
, vol.20
, Issue.6
, pp. 1597-1611
-
-
Patra, J.C.1
Phua, J.E.2
Bornand, C.3
-
16
-
-
79551680643
-
A quantization-based semi-fragile watermarking scheme for image content authentication
-
X. Qi and X. Xin, "A quantization-based semi-fragile watermarking scheme for image content authentication," Journal of Visual Communication and Image Representation, vol. 22, no. 2, (2011), pp. 187-200.
-
(2011)
Journal of Visual Communication and Image Representation
, vol.22
, Issue.2
, pp. 187-200
-
-
Qi, X.1
Xin, X.2
-
17
-
-
84879989159
-
Joint image coding and image authentication based on AMBTC
-
(1-12)
-
Y. C. Hu, C. C. Lo, W. L. Chen and C. H. Wen, "Joint image coding and image authentication based on AMBTC," Journal of Electronic Imaging, vol. 22, no. 1, (2013), 013012 (1-12).
-
(2013)
Journal of Electronic Imaging
, vol.22
, Issue.1
, pp. 013012
-
-
Hu, Y.C.1
Lo, C.C.2
Chen, W.L.3
Wen, C.H.4
-
18
-
-
84871946125
-
A novel tamper detection scheme for BTCcompressed images
-
Y. C. Hu, W. L. Chen, C. C. Lo and C. M. Wu, "A novel tamper detection scheme for BTCcompressed images," Opto-Electronics Review, vol. 21, no. 1, (2013), pp. 137-146.
-
(2013)
Opto-Electronics Review
, vol.21
, Issue.1
, pp. 137-146
-
-
Hu, Y.C.1
Chen, W.L.2
Lo, C.C.3
Wu, C.M.4
-
19
-
-
84883220805
-
Probability-based tamper detection scheme for BTC-compressed Images based on quantization levels modification
-
Y. C. Hu, C. C. Lo, C. M. Wu, W. L. Chen and C. H. Wen, "Probability-based tamper detection scheme for BTC-compressed Images based on quantization levels modification," International Journal of Security and Its Applications, vol. 7, no. 3, (2013), pp. 11-32.
-
(2013)
International Journal of Security and Its Applications
, vol.7
, Issue.3
, pp. 11-32
-
-
Hu, Y.C.1
Lo, C.C.2
Wu, C.M.3
Chen, W.L.4
Wen, C.H.5
-
20
-
-
0018918171
-
An algorithm for vector quantizer design
-
Y. Linde, A. Buzo and R.M. Gray, "An algorithm for vector quantizer design," IEEE Transactions on Communications, vol. 28, (1980), pp. 84-95.
-
(1980)
IEEE Transactions on Communications
, vol.28
, pp. 84-95
-
-
Linde, Y.1
Buzo, A.2
Gray, R.M.3
-
21
-
-
0032206554
-
A fact codebook search algorithm for vector quantization
-
C. C. Chang and Y. C. Hu, "A fact codebook search algorithm for vector quantization," IEEE Transactions on Consumer Electronics, vol. 44, no. 4, (1998), pp. 1201-1208.
-
(1998)
IEEE Transactions on Consumer Electronics
, vol.44
, Issue.4
, pp. 1201-1208
-
-
Chang, C.C.1
Hu, Y.C.2
-
22
-
-
0348225868
-
An effective codebook search algorithm for vector quantization
-
Y. C. Hu and C. C. Chang, "An effective codebook search algorithm for vector quantization," Imaging Science Journal, vol. 51, no. 4, (2003), pp. 221-234.
-
(2003)
Imaging Science Journal
, vol.51
, Issue.4
, pp. 221-234
-
-
Hu, Y.C.1
Chang, C.C.2
-
23
-
-
3042566978
-
An adaptive bit rate encoding mechanism based on irregular sampling and side-match vector quantization
-
P. Y. Tsai, C. C. Chang, M. H. Lin and Y. C. Hu, "An adaptive bit rate encoding mechanism based on irregular sampling and side-match vector quantization', Imaging Science Journal, vol. 52, no. 2, (2004), pp. 73-84.
-
(2004)
Imaging Science Journal
, vol.52
, Issue.2
, pp. 73-84
-
-
Tsai, P.Y.1
Chang, C.C.2
Lin, M.H.3
Hu, Y.C.4
-
24
-
-
39749177817
-
Fast VQ codebook search algorithm for grayscale image coding
-
Y. C. Hu, B. H. Su and C.C. Tsou, "Fast VQ codebook search algorithm for grayscale image coding," Image and Vision Computing, vol. 26, no. 5, (2008), pp. 657-666.
-
(2008)
Image and Vision Computing
, vol.26
, Issue.5
, pp. 657-666
-
-
Hu, Y.C.1
Su, B.H.2
Tsou, C.C.3
-
25
-
-
78650747940
-
Effect grayscale image compression technique based on VQ
-
Y. C. Hu, J. C. Chuang, C. C. Lo and C. Y. Lee, "Effect grayscale image compression technique based on VQ," Opto-Electronics Review, vol. 19, no. 1, (2011), pp. 104-113.
-
(2011)
Opto-Electronics Review
, vol.19
, Issue.1
, pp. 104-113
-
-
Hu, Y.C.1
Chuang, J.C.2
Lo, C.C.3
Lee, C.Y.4
-
26
-
-
84862798535
-
An improved vector quantization scheme for grayscale image compression
-
Y. C. Hu, W. L. Chen, C. C. Lo and J. C. Chung, "An improved vector quantizationschemefor grayscale image compression," Opto-Electronics Review, vol. 20, no. 2, (2012), pp. 187-193
-
(2012)
Opto-Electronics Review
, vol.20
, Issue.2
, pp. 187-193
-
-
Hu, Y.C.1
Chen, W.L.2
Lo, C.C.3
Chung, J.C.4
-
27
-
-
84879975634
-
Image vector quantization using geometric transform and lossless index coding
-
Y. C. Hu, C. H. Wen, C. C. Lo and W. L. Chen, "Image vector quantization using geometric transform and lossless index coding," Optical Engineering, vol. 52, no. 3, (2013), 037402
-
(2013)
Optical Engineering
, vol.52
, Issue.3
, pp. 037402
-
-
Hu, Y.C.1
Wen, C.H.2
Lo, C.C.3
Chen, W.L.4
-
28
-
-
84877077991
-
Efficient VQ-based image coding scheme using inverse function and lossless index coding
-
Y. C. Hu, W. L. Chen, C. C. Lo, C. M. Wu and C. H. Wen, "Efficient VQ-based image coding scheme using inverse function and lossless index coding," Signal Processing, vol. 93, no. 9, (2013), pp. 2432-2439.
-
(2013)
Signal Processing
, vol.93
, Issue.9
, pp. 2432-2439
-
-
Hu, Y.C.1
Chen, W.L.2
Lo, C.C.3
Wu, C.M.4
Wen, C.H.5
|