-
1
-
-
0003855464
-
Applied Cryptography: Protocols, Algorithms, and Source Code in C
-
2nd ed. New York: Wiley
-
B. Schneier, Applied Cryptography: Protocols, Algorithms, and Source Code in C, 2nd ed. New York: Wiley, 1996.
-
(1996)
-
-
Schneier, B.1
-
2
-
-
85032752228
-
When seeing isn’t believing: Current multimedia authentication technologies and their applications
-
Mar.
-
B. B. Zhu, M. D. Swanson, and A. H. Tewfik, “When seeing isn’t believing: Current multimedia authentication technologies and their applications,” IEEE Signal Process. Mag., pp. 40–49, Mar. 2004.
-
(2004)
IEEE Signal Process. Mag.
, pp. 40-49
-
-
Zhu, B.B.1
Swanson, M.D.2
Tewfik, A.H.3
-
3
-
-
0036755019
-
On the design of content-based multimedia authentication systems
-
Sep.
-
C. W. Wu, “On the design of content-based multimedia authentication systems,” IEEE Trans. Multimedia, vol. 4, no. 3, pp. 385–393, Sep. 2002.
-
(2002)
IEEE Trans. Multimedia
, vol.4
, Issue.3
, pp. 385-393
-
-
Wu, C.W.1
-
4
-
-
0003240793
-
Approximate message authentication codes
-
College Park, MD, Feb.
-
R. Graveman and K. Fu, “Approximate message authentication codes,” in Proc. 3rd Annu. Fedlab Symp. Advanced Telecommunications/Information Distribution, vol. 1, College Park, MD, Feb. 1999.
-
(1999)
Proc. 3rd Annu. Fedlab Symp. Advanced Telecommunications/Information Distribution
, vol.1
-
-
Graveman, R.1
Fu, K.2
-
5
-
-
0003346446
-
Approximate image authentication codes
-
College Park, MD, Mar.
-
G. R. Arce, L. Xie, and R. F. Graveman, “Approximate image authentication codes,” in Proc. 4th Annu. Fedlab Symp. Advanced Telecommunications/Information Distribution, vol. 1, College Park, MD, Mar. 2000.
-
(2000)
Proc. 4th Annu. Fedlab Symp. Advanced Telecommunications/Information Distribution
, vol.1
-
-
Arce, G.R.1
Xie, L.2
Graveman, R.F.3
-
6
-
-
0035362493
-
Approximate image message authentication codes
-
Jun.
-
L. Xie, G. R. Arce, and R. F. Gravemen, “Approximate image message authentication codes,” IEEE Trans. Multimedia, vol. 3, no. 2, pp. 242–252, Jun. 2001.
-
(2001)
IEEE Trans. Multimedia
, vol.3
, Issue.2
, pp. 242-252
-
-
Xie, L.1
Arce, G.R.2
Gravemen, R.F.3
-
7
-
-
33750901987
-
A formal security analysis of approximate message authentication codes
-
College Park, MD, Apr.
-
G. Di Crescenzo, R. Graveman, G. Arce, and R. Ge, “A formal security analysis of approximate message authentication codes,” in Proc. CTA Communications and Networks, College Park, MD, Apr. 2003, pp. 217–221.
-
(2003)
Proc. CTA Communications and Networks
, pp. 217-221
-
-
Di Crescenzo, G.1
Graveman, R.2
Arce, G.3
Ge, R.4
-
9
-
-
0004325716
-
GENETICS A Molecular Approach
-
2nd ed. London, U.K.: Chapman & Hall
-
T. A. Brown, GENETICS A Molecular Approach, 2nd ed. London, U.K.: Chapman & Hall, 1995.
-
(1995)
-
-
Brown, T.A.1
-
10
-
-
0030409375
-
A robust content based digital signature for image authentication
-
Lausanne, Switzerland, Sept.
-
M. Schneider and S. Chang, “A robust content based digital signature for image authentication,” in Proc. IEEE Intl. Conf. Image Processing, Lausanne, Switzerland, Sept. 1996.
-
(1996)
Proc. IEEE Intl. Conf. Image Processing
-
-
Schneider, M.1
Chang, S.2
-
11
-
-
0034140535
-
Fault resilient and compression tolerant digital signature for image authentication
-
Feb.
-
D.-C. Lou and J.-L. Liu, “Fault resilient and compression tolerant digital signature for image authentication,” IEEE Trans. Consumer Electron., vol. 46, no. 1, pp. 31–39, Feb. 2000.
-
(2000)
IEEE Trans. Consumer Electron.
, vol.46
, Issue.1
, pp. 31-39
-
-
Lou, D.-C.1
Liu, J.-L.2
-
12
-
-
1442357585
-
Robust image authentication using content based compression
-
Aug.
-
E. Chang, M. Kankanhalli, and X. Guan, “Robust image authentication using content based compression,” ACM Multimedia Syst., vol. 9, pp. 121–130, Aug. 2003.
-
(2003)
ACM Multimedia Syst.
, vol.9
, pp. 121-130
-
-
Chang, E.1
Kankanhalli, M.2
Guan, X.3
-
13
-
-
0035248504
-
A robust image authentication method distinguishing JPEG compression from malicious manipulation
-
Feb.
-
C.-Y. Lin and S.-F. Chang, “A robust image authentication method distinguishing JPEG compression from malicious manipulation,” IEEE Trans. Circuits Syst. Video Technol., vol. 11, no. 2, pp. 153–168, Feb. 2001.
-
(2001)
IEEE Trans. Circuits Syst. Video Technol.
, vol.11
, Issue.2
, pp. 153-168
-
-
Lin, C.-Y.1
Chang, S.-F.2
-
14
-
-
0037818310
-
Structural digital signature for image authentication: An incidental distortion resistant scheme
-
Jun.
-
C.-S. Lu and H.-Y. Liao, “Structural digital signature for image authentication: An incidental distortion resistant scheme,” IEEE Trans. Multimedia, vol. 5, no. 2, pp. 161–173, Jun. 2003.
-
(2003)
IEEE Trans. Multimedia
, vol.5
, Issue.2
, pp. 161-173
-
-
Lu, C.-S.1
Liao, H.-Y.2
-
15
-
-
0033686485
-
Distortion bounded authentication techniques
-
San Jose, CA, Feb.
-
N. Memon, P. Vora, B. Yeo, and M. Yeung, “Distortion bounded authentication techniques,” in Proc. SPIE, Security and Watermarking of Multimedia Contents, vol. 3971, San Jose, CA, Feb. 2000, pp. 164–174.
-
(2000)
Proc. SPIE, Security and Watermarking of Multimedia Contents
, vol.3971
, pp. 164-174
-
-
Memon, N.1
Vora, P.2
Yeo, B.3
Yeung, M.4
|