-
1
-
-
21844463487
-
Watermarking security: Theory and practice
-
IEEE Transactions on
-
F. Cayre, C. Fontaine, and T. Furon. Watermarking security: theory and practice. Signal Processing, IEEE Transactions on, 53(10): 3976-3987, 2005.
-
(2005)
Signal Processing
, vol.53
, Issue.10
, pp. 3976-3987
-
-
Cayre, F.1
Fontaine, C.2
Furon, T.3
-
2
-
-
13244269881
-
Lossless generalized-lsb data embedding
-
IEEE Transactions on
-
M. U. Celik, G. Sharma, A. M. Tekalp, and E. Saber. Lossless generalized-lsb data embedding. Image Processing, IEEE Transactions on, 14(2): 253-266, 2005.
-
(2005)
Image Processing
, vol.14
, Issue.2
, pp. 253-266
-
-
Celik, M.U.1
Sharma, G.2
Tekalp, A.M.3
Saber, E.4
-
3
-
-
34848926024
-
Four-scanning attack on hierarchical digital watermarking method for image tamper detection and recovery
-
C.-C. Chang, Y.-H. Fan, and W.-L. Tai. Four-scanning attack on hierarchical digital watermarking method for image tamper detection and recovery. Pattern Recognition, 41(2): 654-661, 2008.
-
(2008)
Pattern Recognition
, vol.41
, Issue.2
, pp. 654-661
-
-
Chang, C.-C.1
Fan, Y.-H.2
Tai, W.-L.3
-
5
-
-
84893226982
-
An efficient block-based fragile watermarking system for tamper localization and recovery
-
chapter 10 CRC Press, August
-
V. G. Edupuganti, F. Y. Shih, and I.-C. Chang. An efficient block-based fragile watermarking system for tamper localization and recovery. In Multimedia Security, chapter 10, pages 181-198. CRC Press, August 2012.
-
(2012)
Multimedia Security
, pp. 181-198
-
-
Edupuganti, V.G.1
Shih, F.Y.2
Chang, I.-C.3
-
7
-
-
0036530306
-
Cryptanalysis of the yeung-mintzer fragile watermarking technique
-
(Compendex)
-
J. Fridrich, M. Goljan, and N. Memon. Cryptanalysis of the yeung-mintzer fragile watermarking technique. Journal of Electronic Imaging, 11(Compendex): 262-274, 2002.
-
(2002)
Journal of Electronic Imaging
, vol.11
, pp. 262-274
-
-
Fridrich, J.1
Goljan, M.2
Memon, N.3
-
8
-
-
33749844555
-
Synchronous counterfeiting attacks on self-embedding watermarking schemes
-
H. He, J. Zhang, and H. Wang. Synchronous counterfeiting attacks on self-embedding watermarking schemes. International Journal of Computer Science and Network Security, 6(1B): 251-257, 2006.
-
(2006)
International Journal of Computer Science and Network Security
, vol.6
, Issue.1 B
, pp. 251-257
-
-
He, H.1
Zhang, J.2
Wang, H.3
-
9
-
-
0033872149
-
Counterfeiting attacks on oblivious block-wise independent invisible watermarking schemes
-
M. Holliman and N. Memon. Counterfeiting attacks on oblivious block-wise independent invisible watermarking schemes. IEEE Transactions on Image Processing, 9: 432-441, 2000.
-
(2000)
IEEE Transactions on Image Processing
, vol.9
, pp. 432-441
-
-
Holliman, M.1
Memon, N.2
-
10
-
-
0035790994
-
Considerations on watermarking security
-
2001 IEEE Fourth Workshop on
-
T. Kalker. Considerations on watermarking security. In Multimedia Signal Processing, 2001 IEEE Fourth Workshop on, pages 201-206, 2001.
-
(2001)
Multimedia Signal Processing
, pp. 201-206
-
-
Kalker, T.1
-
11
-
-
78049498166
-
Experiment of tamper detection and recovery watermarking in picture archiving and communication systems
-
2010. Export Date: 6 December 2010 Source: Scopus
-
S. C. Liew and J. M. Zain. Experiment of tamper detection and recovery watermarking in picture archiving and communication systems. Journal of Computer Science, 6(7): 794-799, 2010. Export Date: 6 December 2010 Source: Scopus.
-
Journal of Computer Science
, vol.6
, Issue.7
, pp. 794-799
-
-
Liew, S.C.1
Zain, J.M.2
-
12
-
-
25144448272
-
A hierarchical digital watermarking method for image tamper detection and recovery
-
P. L. Lin, C.-K. Hsieh, and P.-W. Huang. A hierarchical digital watermarking method for image tamper detection and recovery. Pattern Recognition, 38(12): 2519-2529, 2005.
-
(2005)
Pattern Recognition
, vol.38
, Issue.12
, pp. 2519-2529
-
-
Lin, P.L.1
Hsieh, C.-K.2
Huang, P.-W.3
-
14
-
-
84869432876
-
On the robustness and security of digital image watermarking
-
H. Nyeem, W. Boles, and C. Boyd. On the robustness and security of digital image watermarking. In Proceedings of the IEEE/IAPR International Conference on Informatics, Electronics & Vision, (ICIEV'12), 2012.
-
(2012)
Proceedings of the IEEE/IAPR International Conference on Informatics, Electronics & Vision, (ICIEV'12)
-
-
Nyeem, H.1
Boles, W.2
Boyd, C.3
-
16
-
-
0036611838
-
Hierarchical watermarking for secure image authentication with localization
-
IEEE Transactions on
-
M. Utku Celik, G. Sharma, E. Saber, and A. Murat Tekalp. Hierarchical watermarking for secure image authentication with localization. Image Processing, IEEE Transactions on, 11(6): 585-595, 2002.
-
(2002)
Image Processing
, vol.11
, Issue.6
, pp. 585-595
-
-
Utku Celik, M.1
Sharma, G.2
Saber, E.3
Murat Tekalp, A.4
-
17
-
-
0035369792
-
Attack modelling: Towards a second generation watermarking benchmark
-
S. Voloshynovskiy, S. Pereira, V. Iquise, and T. Pun. Attack modelling: towards a second generation watermarking benchmark. Signal Processing, 81(6): 1177-1214, 2001.
-
(2001)
Signal Processing
, vol.81
, Issue.6
, pp. 1177-1214
-
-
Voloshynovskiy, S.1
Pereira, S.2
Iquise, V.3
Pun, T.4
-
18
-
-
0031378592
-
An invisible watermarking technique for image verification
-
Proceedings., International Conference on IEEE
-
M. M. Yeung and F. Mintzer. An invisible watermarking technique for image verification. In Image Processing, 1997. Proceedings., International Conference on, Volume 2, pages 680-683. IEEE, 1997.
-
(1997)
Image Processing, 1997
, vol.2
, pp. 680-683
-
-
Yeung, M.M.1
Mintzer, F.2
|