-
1
-
-
84902173693
-
-
http://greyfalcon.us/restored/Himmler%20fake.htm
-
-
-
-
5
-
-
0036544390
-
Toward secure public-key blockwise fragile authentication watermarking
-
DOI 10.1049/ip-vis:20020168
-
Barreto P. S. L. M., Kim H. Y., Rijmen V., Toward secure public-key blockwise fragile authentication watermarking. IEE Proceedings: Vision, Image and Signal Processing 2002 149 2 57 62 2-s2.0-0036544390 10.1049/ip-vis:20020168 (Pubitemid 34750620)
-
(2002)
IEE Proceedings: Vision, Image and Signal Processing
, vol.149
, Issue.2
, pp. 57-62
-
-
Barreto, P.S.L.M.1
Kim, H.Y.2
Rijmen, V.3
-
7
-
-
0033872149
-
Counterfeiting attacks on oblivious block-wise independent invisible watermarking schemes
-
DOI 10.1109/83.826780
-
Holliman M., Memon N., Counterfeiting attacks on oblivious block-wise independent invisible watermarking schemes. IEEE Transactions on Image Processing 2000 9 3 432 441 2-s2.0-0033872149 10.1109/83.826780 (Pubitemid 30572357)
-
(2000)
IEEE Transactions on Image Processing
, vol.9
, Issue.3
, pp. 432-441
-
-
Holliman, M.1
Memon, N.2
-
8
-
-
0033703669
-
-
Security and Watermarking of Multimedia Contents II January 2000 San Jose, Calif, USA Proceedings of SPIE 2-s2.0-0033703669
-
Fridrich J., Goljan M., Memon N., Further attacks on Yeung-Mintzer fragile watermarking scheme. 3971 Security and Watermarking of Multimedia Contents II January 2000 San Jose, Calif, USA 428 437 Proceedings of SPIE 2-s2.0-0033703669
-
Further Attacks on Yeung-Mintzer Fragile Watermarking Scheme
, vol.3971
, pp. 428-437
-
-
Fridrich, J.1
Goljan, M.2
Memon, N.3
-
9
-
-
1542363253
-
On the security of the Yeung-Mintzer authentication watermark
-
March Savannah, Ga, USA 2-s2.0-1542363253
-
Memon N., Shende S., Wong P. W., On the security of the Yeung-Mintzer authentication watermark. Proceedings of the IS & T PICS Symposium March 1999 Savannah, Ga, USA 301 306 2-s2.0-1542363253
-
(1999)
Proceedings of the IS & T PICS Symposium
, pp. 301-306
-
-
Memon, N.1
Shende, S.2
Wong, P.W.3
-
10
-
-
84870428915
-
-
Google Play. https://play.google.com/store
-
Google Play
-
-
-
12
-
-
8344236008
-
Fragile image watermarking using a gradient image for improved localization and security
-
2-s2.0-8344236008 10.1016/j.patrec.2004.08.017
-
Suthaharan S., Fragile image watermarking using a gradient image for improved localization and security. Pattern Recognition Letters 2004 25 16 1893 1903 2-s2.0-8344236008 10.1016/j.patrec.2004.08.017
-
(2004)
Pattern Recognition Letters
, vol.25
, Issue.16
, pp. 1893-1903
-
-
Suthaharan, S.1
-
13
-
-
35349002199
-
Fragile watermarking scheme for digital image authentication using pixel difference
-
2-s2.0-35349002199 10.1179/174313107X165227
-
Chang C.-C., Lin P.-Y., Chuang J.-C., Fragile watermarking scheme for digital image authentication using pixel difference. Imaging Science Journal 2007 55 3 140 147 2-s2.0-35349002199 10.1179/174313107X165227
-
(2007)
Imaging Science Journal
, vol.55
, Issue.3
, pp. 140-147
-
-
Chang, C.-C.1
Lin, P.-Y.2
Chuang, J.-C.3
-
14
-
-
84870243382
-
Semi-fragile watermarking for image authentication with sensitive tamper localization in the wavelet domain
-
Preda R. O., Semi-fragile watermarking for image authentication with sensitive tamper localization in the wavelet domain. Measurement 2013 46 367 373
-
(2013)
Measurement
, vol.46
, pp. 367-373
-
-
Preda, R.O.1
-
15
-
-
33644995185
-
Analysis and design of secure watermark-based authentication systems
-
2-s2.0-33644995185 10.1109/TIFS.2005.863505
-
Fei C., Kundur D., Kwong R. H., Analysis and design of secure watermark-based authentication systems. IEEE Transactions on Information Forensics and Security 2006 1 1 43 55 2-s2.0-33644995185 10.1109/TIFS.2005. 863505
-
(2006)
IEEE Transactions on Information Forensics and Security
, vol.1
, Issue.1
, pp. 43-55
-
-
Fei, C.1
Kundur, D.2
Kwong, R.H.3
-
16
-
-
33750303836
-
An efficient image authentication method based on Hamming code
-
DOI 10.1016/j.patcog.2006.05.018, PII S003132030600238X
-
Chan C.-S., Chang C.-C., An efficient image authentication method based on Hamming code. Pattern Recognition 2007 40 2 681 690 2-s2.0-33750303836 10.1016/j.patcog.2006.05.018 (Pubitemid 44635649)
-
(2007)
Pattern Recognition
, vol.40
, Issue.2
, pp. 681-690
-
-
Chan, C.-S.1
Chang, C.-C.2
-
17
-
-
80053006913
-
Protecting the content integrity of digital imagery with fidelity preservation
-
2-s2.0-80053006913 10.1145/2000486.2000489
-
Lin P.-Y., Lee J.-S., Chang C.-C., Protecting the content integrity of digital imagery with fidelity preservation. ACM Transactions on Multimedia Computing, Communications and Applications 2011 7 3, article 15 20 2-s2.0-80053006913 10.1145/2000486.2000489
-
(2011)
ACM Transactions on Multimedia Computing, Communications and Applications
, vol.7
, Issue.3
, pp. 20
-
-
Lin, P.-Y.1
Lee, J.-S.2
Chang, C.-C.3
-
18
-
-
0142029533
-
Using set partitioning in hierarchical trees to authenticate digital images
-
2-s2.0-0142029533 10.1016/j.image.2003.06.001
-
Tsai P., Hu Y.-C., Chang C.-C., Using set partitioning in hierarchical trees to authenticate digital images. Signal Processing: Image Communication 2003 18 9 813 822 2-s2.0-0142029533 10.1016/j.image.2003.06.001
-
(2003)
Signal Processing: Image Communication
, vol.18
, Issue.9
, pp. 813-822
-
-
Tsai, P.1
Hu, Y.-C.2
Chang, C.-C.3
-
19
-
-
4444342040
-
Secret image sharing with steganography and authentication
-
2-s2.0-4444342040 10.1016/S0164-1212(03)00239-5
-
Lin C.-C., Tsai W.-H., Secret image sharing with steganography and authentication. Journal of Systems and Software 2004 73 3 405 414 2-s2.0-4444342040 10.1016/S0164-1212(03)00239-5
-
(2004)
Journal of Systems and Software
, vol.73
, Issue.3
, pp. 405-414
-
-
Lin, C.-C.1
Tsai, W.-H.2
-
20
-
-
0037818310
-
Structural digital signature for image authentication: An incidental distortion resistant scheme
-
2-s2.0-0037818310 10.1109/TMM.2003.811621
-
Lu C.-S., Liao H.-Y. M., Structural digital signature for image authentication: an incidental distortion resistant scheme. IEEE Transactions on Multimedia 2003 5 2 161 173 2-s2.0-0037818310 10.1109/TMM.2003.811621
-
(2003)
IEEE Transactions on Multimedia
, vol.5
, Issue.2
, pp. 161-173
-
-
Lu, C.-S.1
Liao, H.-Y.M.2
-
21
-
-
48149104075
-
Tampering with a watermarking-based image authentication scheme
-
2-s2.0-48149104075 10.1016/j.patcog.2008.05.009
-
Phan R. C.-W., Tampering with a watermarking-based image authentication scheme. Pattern Recognition 2008 41 11 3493 3496 2-s2.0-48149104075 10.1016/j.patcog.2008.05.009
-
(2008)
Pattern Recognition
, vol.41
, Issue.11
, pp. 3493-3496
-
-
Phan, R.C.-W.1
-
22
-
-
0036627368
-
A survey of watermarking algorithms for image authentication
-
2-s2.0-0036627368 10.1155/S1110865702204047
-
Rey C., Dugelay J.-L., A survey of watermarking algorithms for image authentication. Eurasip Journal on Applied Signal Processing 2002 2002 6 613 621 2-s2.0-0036627368 10.1155/S1110865702204047
-
(2002)
Eurasip Journal on Applied Signal Processing
, vol.2002
, Issue.6
, pp. 613-621
-
-
Rey, C.1
Dugelay, J.-L.2
-
23
-
-
0142057129
-
A simple and high-hiding capacity method for hiding digit-by-digit data in images based on modulus function
-
DOI 10.1016/S0031-3203(03)00221-8
-
Thien C.-C., Lin J.-C., A simple and high-hiding capacity method for hiding digit-by-digit data in images based on modulus function. Pattern Recognition 2003 36 12 2875 2881 2-s2.0-0142057129 10.1016/S0031-3203(03)00221-8 (Pubitemid 37293400)
-
(2003)
Pattern Recognition
, vol.36
, Issue.12
, pp. 2875-2881
-
-
Thien, C.-C.1
Lin, J.-C.2
-
24
-
-
80052030265
-
An efficient wavelet-tree-based watermarking method
-
2-s2.0-80052030265 10.1016/j.eswa.2011.03.024
-
Run R.-S., Horng S.-J., Lin W.-H., Kao T.-W., Fan P., Khan M. K., An efficient wavelet-tree-based watermarking method. Expert Systems with Applications 2011 38 12 14357 14366 2-s2.0-80052030265 10.1016/j.eswa.2011.03. 024
-
(2011)
Expert Systems with Applications
, vol.38
, Issue.12
, pp. 14357-14366
-
-
Run, R.-S.1
Horng, S.-J.2
Lin, W.-H.3
Kao, T.-W.4
Fan, P.5
Khan, M.K.6
-
25
-
-
32644434350
-
A watermarking-based image ownership and tampering authentication scheme
-
2-s2.0-32644434350 10.1016/j.patrec.2005.09.006
-
Chang C.-C., Hu Y.-S., Lu T.-C., A watermarking-based image ownership and tampering authentication scheme. Pattern Recognition Letters 2006 27 5 439 446 2-s2.0-32644434350 10.1016/j.patrec.2005.09.006
-
(2006)
Pattern Recognition Letters
, vol.27
, Issue.5
, pp. 439-446
-
-
Chang, C.-C.1
Hu, Y.-S.2
Lu, T.-C.3
-
26
-
-
67651102858
-
A secure and improved self-embedding algorithm to combat digital document forgery
-
2-s2.0-67651102858 10.1016/j.sigpro.2009.02.001
-
Cheddad A., Condell J., Curran K., Mc Kevitt P., A secure and improved self-embedding algorithm to combat digital document forgery. Signal Processing 2009 89 12 2324 2332 2-s2.0-67651102858 10.1016/j.sigpro.2009.02.001
-
(2009)
Signal Processing
, vol.89
, Issue.12
, pp. 2324-2332
-
-
Cheddad, A.1
Condell, J.2
Curran, K.3
Mc Kevitt, P.4
-
27
-
-
34548765996
-
Statistical fragile watermarking capable of locating individual tampered pixels
-
DOI 10.1109/LSP.2007.896436
-
Zhang X., Wang S., Statistical fragile watermarking capable of locating individual tampered pixels. IEEE Signal Processing Letters 2007 14 10 727 730 2-s2.0-34548765996 10.1109/LSP.2007.896436 (Pubitemid 47434095)
-
(2007)
IEEE Signal Processing Letters
, vol.14
, Issue.10
, pp. 727-730
-
-
Zhang, X.1
Wang, S.2
-
28
-
-
57749202706
-
Fragile watermarking scheme using a hierarchical mechanism
-
2-s2.0-57749202706 10.1016/j.sigpro.2008.10.001
-
Zhang X., Wang S., Fragile watermarking scheme using a hierarchical mechanism. Signal Processing 2009 89 4 675 679 2-s2.0-57749202706 10.1016/j.sigpro.2008.10.001
-
(2009)
Signal Processing
, vol.89
, Issue.4
, pp. 675-679
-
-
Zhang, X.1
Wang, S.2
-
31
-
-
49549116187
-
Fragile watermarking based on encoding of the zeroes of the z-transform
-
2-s2.0-49549116187 10.1109/TIFS.2008.926994
-
Ho A. T. S., Zhu X., Shen J., Marziliano P., Fragile watermarking based on encoding of the zeroes of the z-transform. IEEE Transactions on Information Forensics and Security 2008 3 3 567 569 2-s2.0-49549116187 10.1109/TIFS.2008. 926994
-
(2008)
IEEE Transactions on Information Forensics and Security
, vol.3
, Issue.3
, pp. 567-569
-
-
Ho, A.T.S.1
Zhu, X.2
Shen, J.3
Marziliano, P.4
-
32
-
-
84879843710
-
Analysis and improvement of the watermark strategy for quantum images based on quantum Fourier transform
-
10.1007/s11128-013-0561-5
-
Yang Y.-G., Jia X., Xu P., Tian J., Analysis and improvement of the watermark strategy for quantum images based on quantum Fourier transform. Quantum Information Processing 2013 12 8 2765 2769 10.1007/s11128-013-0561-5
-
(2013)
Quantum Information Processing
, vol.12
, Issue.8
, pp. 2765-2769
-
-
Yang, Y.-G.1
Jia, X.2
Xu, P.3
Tian, J.4
-
33
-
-
84869383080
-
Application of binary image authentication algorithm in digital watermarking
-
Lecture Notes in Electrical Engineering 10.1007/978-3-642-34531-9-95
-
Wang C., Li H., Application of binary image authentication algorithm in digital watermarking. Proceedings of the International Conference on Information Technology and Software Engineering 2012 212 887 894 Lecture Notes in Electrical Engineering 10.1007/978-3-642-34531-9-95
-
(2012)
Proceedings of the International Conference on Information Technology and Software Engineering
, vol.212
, pp. 887-894
-
-
Wang, C.1
Li, H.2
-
34
-
-
84869417490
-
Semi-fragile water marking technique based on JPEG invariant and chaotic maps
-
Li Z. H., Hou J. J., Semi-fragile water marking technique based on JPEG invariant and chaotic maps Computer Engineering and Applications 2007 43 32 40 43
-
(2007)
Computer Engineering and Applications
, vol.43
, Issue.32
, pp. 40-43
-
-
Li, Z.H.1
Hou, J.J.2
-
36
-
-
0035473831
-
Secret and public key image watermarking schemes for image authentication and ownership verification
-
DOI 10.1109/83.951543, PII S1057714901082094
-
Wong P. W., Memon N., Secret and public key image watermarking schemes for image authentication and ownership verification. IEEE Transactions on Image Processing 2001 10 10 1593 1601 2-s2.0-0035473831 10.1109/83.951543 (Pubitemid 32981831)
-
(2001)
IEEE Transactions on Image Processing
, vol.10
, Issue.10
, pp. 1593-1601
-
-
Wong, P.W.1
Memon, N.2
-
37
-
-
77952623584
-
A blind grayscale watermark algorithm based on chaos and mixed transform domain
-
February 2-s2.0-77952623584 10.1109/ICCAE.2010.5451305
-
Gao G., A blind grayscale watermark algorithm based on chaos and mixed transform domain. Proceedings of the 2nd International Conference on Computer and Automation Engineering (ICCAE '10) February 2010 658 662 2-s2.0-77952623584 10.1109/ICCAE.2010.5451305
-
(2010)
Proceedings of the 2nd International Conference on Computer and Automation Engineering (ICCAE '10)
, pp. 658-662
-
-
Gao, G.1
-
38
-
-
69149091825
-
Robust and transparent watermarking scheme for colour images
-
2-s2.0-69149091825 10.1049/iet-ipr.2008.0068
-
Liu K.-C., Chou C.-H., Robust and transparent watermarking scheme for colour images. IET Image Processing 2009 3 4 228 242 2-s2.0-69149091825 10.1049/iet-ipr.2008.0068
-
(2009)
IET Image Processing
, vol.3
, Issue.4
, pp. 228-242
-
-
Liu, K.-C.1
Chou, C.-H.2
-
39
-
-
78650098359
-
A blind digital watermark technique for color image wavelet transform and SIFT
-
Thorat C. G., Jadhav B. D., A blind digital watermark technique for color image wavelet transform and SIFT. Procedia Computer Science 2010 2 236 241
-
(2010)
Procedia Computer Science
, vol.2
, pp. 236-241
-
-
Thorat, C.G.1
Jadhav, B.D.2
-
40
-
-
0032312612
-
A public key watermark for image verification and authentication
-
October Chicago, III, USA 2-s2.0-0032312612
-
Wong P. W., A public key watermark for image verification and authentication. 1 Proceedings of the International Conference on Image Processing (ICIP '98) October 1998 Chicago, III, USA 455 459 2-s2.0-0032312612
-
(1998)
Proceedings of the International Conference on Image Processing (ICIP '98)
, vol.1
, pp. 455-459
-
-
Wong, P.W.1
-
41
-
-
0032292342
-
Watermarking for image authentication
-
October Chicago, III, USA 2-s2.0-0032292342
-
Wu M., Liu B., Watermarking for image authentication. 2 Proceedings of the International Conference on Image Processing (ICIP '98) October 1998 Chicago, III, USA 437 441 2-s2.0-0032292342
-
(1998)
Proceedings of the International Conference on Image Processing (ICIP '98)
, vol.2
, pp. 437-441
-
-
Wu, M.1
Liu, B.2
-
42
-
-
0034442403
-
Image authentication and integrity verification via content-based watermarks and a public key cryptosystem
-
September Vancouver, Canada 2-s2.0-0034442403
-
Li C.-T., Lou D.-C., Chen T.-H., Image authentication and integrity verification via content-based watermarks and a public key cryptosystem. 3 Proceedings of the International Conference on Image Processing (ICIP '00) September 2000 Vancouver, Canada 694 697 2-s2.0-0034442403
-
(2000)
Proceedings of the International Conference on Image Processing (ICIP '00)
, vol.3
, pp. 694-697
-
-
Li, C.-T.1
Lou, D.-C.2
Chen, T.-H.3
-
43
-
-
0037721337
-
One-dimensional neighborhood forming strategy for fragile watermarking
-
2-s2.0-0037721337 10.1117/1.1557156
-
Li C.-T., Yang F.-M., One-dimensional neighborhood forming strategy for fragile watermarking. Journal of Electronic Imaging 2003 12 2 284 291 2-s2.0-0037721337 10.1117/1.1557156
-
(2003)
Journal of Electronic Imaging
, vol.12
, Issue.2
, pp. 284-291
-
-
Li, C.-T.1
Yang, F.-M.2
-
44
-
-
8644267842
-
Oblivious fragile watermarking scheme for image authentication
-
May Orlando, Fla, USA 2-s2.0-8644267842
-
Li C.-T., Yang F.-M., Lee C.-S., Oblivious fragile watermarking scheme for image authentication. 6 Proceedings of the IEEE International Conference on Acoustic, Speech, and Signal Processing May 2002 Orlando, Fla, USA 3445 3448 2-s2.0-8644267842
-
(2002)
Proceedings of the IEEE International Conference on Acoustic, Speech, and Signal Processing
, vol.6
, pp. 3445-3448
-
-
Li, C.-T.1
Yang, F.-M.2
Lee, C.-S.3
-
45
-
-
79951747222
-
A new public-key oblivious fragile watermarking for image authentication using discrete cosine transform
-
Chang C.-C., Chou H., A new public-key oblivious fragile watermarking for image authentication using discrete cosine transform. International Journal of Signal Processing, Image Processing and Pattern 2009 2 1 133 140
-
(2009)
International Journal of Signal Processing, Image Processing and Pattern
, vol.2
, Issue.1
, pp. 133-140
-
-
Chang, C.-C.1
Chou, H.2
-
46
-
-
0036028633
-
-
Security and Watermarking of Multimedia Contents IV January 2002 San Jose, Calif, USA Proceedings of SPIE 2-s2.0-0036028633 10.1117/12.465292
-
Winne D. A., Knowles H. D., Bull D. R., Canagarajah C. N., Digital watermarking in wavelet domain with predistortion for authenticity verification and localization. 4675 Security and Watermarking of Multimedia Contents IV January 2002 San Jose, Calif, USA 349 356 Proceedings of SPIE 2-s2.0-0036028633 10.1117/12.465292
-
Digital Watermarking in Wavelet Domain with Predistortion for Authenticity Verification and Localization
, vol.4675
, pp. 349-356
-
-
Winne, D.A.1
Knowles, H.D.2
Bull, D.R.3
Canagarajah, C.N.4
-
48
-
-
0035509773
-
A class of authentication digital watermarks for secure multimedia communication
-
DOI 10.1109/83.967402, PII S1057714901093629
-
Xie L., Arce G. R., A class of authentication digital watermarks for secure multimedia communication. IEEE Transactions on Image Processing 2001 10 11 1754 1764 2-s2.0-0035509773 10.1109/83.967402 (Pubitemid 33149058)
-
(2001)
IEEE Transactions on Image Processing
, vol.10
, Issue.11
, pp. 1754-1764
-
-
Xie, L.1
Arce, G.R.2
-
49
-
-
84961844573
-
Invertible authentication watermark for JPEG images
-
April Las Vegas, Nev, USA
-
Fridrich J., Goljan M., Du R., Invertible authentication watermark for JPEG images. Proceedings of the IEEE International Conference on Information Technology: Coding and Computing April 2001 Las Vegas, Nev, USA 223 227
-
(2001)
Proceedings of the IEEE International Conference on Information Technology: Coding and Computing
, pp. 223-227
-
-
Fridrich, J.1
Goljan, M.2
Du, R.3
-
50
-
-
0035400742
-
Use of chaotic dynamical systems in cryptography
-
DOI 10.1016/S0016-0032(00)00087-9, PII S0016003200000879
-
Schmitz R., Use of chaotic dynamical systems in cryptography. Journal of the Franklin Institute 2001 338 4 429 441 2-s2.0-0035400742 10.1016/S0016- 0032(00)00087-9 (Pubitemid 32446618)
-
(2001)
Journal of the Franklin Institute
, vol.338
, Issue.4
, pp. 429-441
-
-
Schmitz, R.1
-
51
-
-
79960457002
-
A secure fragile watermarking scheme based on chaos-and-hamming code
-
2-s2.0-79960457002 10.1016/j.jss.2011.02.029
-
Chang C.-C., Chen K.-N., Lee C.-F., Liu L.-J., A secure fragile watermarking scheme based on chaos-and-hamming code. Journal of Systems and Software 2011 84 9 1462 1470 2-s2.0-79960457002 10.1016/j.jss.2011.02.029
-
(2011)
Journal of Systems and Software
, vol.84
, Issue.9
, pp. 1462-1470
-
-
Chang, C.-C.1
Chen, K.-N.2
Lee, C.-F.3
Liu, L.-J.4
-
52
-
-
34547662251
-
Digital watermarking based on chaotic map and reference register
-
DOI 10.1016/j.patcog.2007.04.013, PII S0031320307001847
-
Wu Y.-T., Shih F. Y., Digital watermarking based on chaotic map and reference register. Pattern Recognition 2007 40 12 3753 3763 2-s2.0-34547662251 10.1016/j.patcog.2007.04.013 (Pubitemid 47223288)
-
(2007)
Pattern Recognition
, vol.40
, Issue.12
, pp. 3753-3763
-
-
Wu, Y.-T.1
Shih, F.Y.2
-
53
-
-
34247361264
-
A novel digital watermark algorithm based on chaotic maps
-
2-s2.0-34247361264 10.1016/j.physleta.2007.01.034
-
Wu X., Guan Z.-H., A novel digital watermark algorithm based on chaotic maps. Physics Letters A 2007 365 5-6 403 406 2-s2.0-34247361264 10.1016/j.physleta.2007.01.034
-
(2007)
Physics Letters A
, vol.365
, Issue.5-6
, pp. 403-406
-
-
Wu, X.1
Guan, Z.-H.2
-
54
-
-
1842528982
-
A chaos-based robust wavelet-domain watermarking algorithm
-
2-s2.0-1842528982 10.1016/j.chaos.2003.12.104
-
Dawei Z., Guanrong C., Wenbo L., A chaos-based robust wavelet-domain watermarking algorithm. Chaos, Solitons & Fractals 2004 22 1 47 54 2-s2.0-1842528982 10.1016/j.chaos.2003.12.104
-
(2004)
Chaos, Solitons & Fractals
, vol.22
, Issue.1
, pp. 47-54
-
-
Dawei, Z.1
Guanrong, C.2
Wenbo, L.3
-
57
-
-
1942436689
-
Image quality assessment: From error visibility to structural similarity
-
2-s2.0-1942436689 10.1109/TIP.2003.819861
-
Wang Z., Bovik A. C., Sheikh H. R., Simoncelli E. P., Image quality assessment: from error visibility to structural similarity. IEEE Transactions on Image Processing 2004 13 4 600 612 2-s2.0-1942436689 10.1109/TIP.2003.819861
-
(2004)
IEEE Transactions on Image Processing
, vol.13
, Issue.4
, pp. 600-612
-
-
Wang, Z.1
Bovik, A.C.2
Sheikh, H.R.3
Simoncelli, E.P.4
-
58
-
-
33846419477
-
Chaotic secure content-based hidden transmission of biometric templates
-
DOI 10.1016/j.chaos.2005.12.015, PII S0960077905012154
-
Khan M. K., Zhang J., Tian L., Chaotic secure content-based hidden transmission of biometric templates. Chaos, Solitons & Fractals 2007 32 5 1749 1759 2-s2.0-33846419477 10.1016/j.chaos.2005.12.015 (Pubitemid 46138161)
-
(2007)
Chaos, Solitons and Fractals
, vol.32
, Issue.5
, pp. 1749-1759
-
-
Khan, M.K.1
Zhang, J.2
Tian, L.3
|