-
2
-
-
8644240462
-
Multimedia authentication and watermarking
-
D. Feng, W. C. Siu, and H. Zhang, Eds, Springer-Verlag; ch. 7
-
B.B. Zhu and M.D. Swanson, "Multimedia authentication and watermarking," Multimedia Information Retrieval and Management, D. Feng, W. C. Siu, and H. Zhang, Eds, Springer-Verlag, 2003, ch. 7, pp. 148-177.
-
(2003)
Multimedia Information Retrieval and Management
, pp. 148-177
-
-
Zhu, B.B.1
Swanson, M.D.2
-
3
-
-
0033872149
-
Counterfeiting attacks on oblivious blockwise independent invisible watermarking schemes
-
M. Holliman and N. Memon, "Counterfeiting attacks on oblivious blockwise independent invisible watermarking schemes," IEEE Trans. Image Processing, vol. 9, no. 3, pp. 432-441, 2000.
-
(2000)
IEEE Trans. Image Processing
, vol.9
, Issue.3
, pp. 432-441
-
-
Holliman, M.1
Memon, N.2
-
5
-
-
1542363253
-
On the security of the yeung-mintzer authentication watermark
-
N. Memon, S. Shende, and P.W. Wong, "On the security of the yeung-mintzer authentication watermark," in Proc. IS&T PICS Symp., Savannah, GA, Mar. 1999, pp. 301-306.
-
Proc. IS&T PICS Symp., Savannah, GA, Mar. 1999
, pp. 301-306
-
-
Memon, N.1
Shende, S.2
Wong, P.W.3
-
6
-
-
0033703669
-
Further attacks on Yeung-Mintzer fragile watermarking scheme
-
J. Fridrich, M. Goljan, and N. Memon, "Further attacks on Yeung-Mintzer fragile watermarking scheme," in Proc. SPIE Photonic West, Electronic Imaging 2000, Security and Watermarking of Multimedia Contents, San Jose, CA, Jan, 24-26, 2000, pp. 428-437.
-
Proc. SPIE Photonic West, Electronic Imaging 2000, Security and Watermarking of Multimedia Contents, San Jose, CA, Jan, 24-26, 2000
, pp. 428-437
-
-
Fridrich, J.1
Goljan, M.2
Memon, N.3
-
7
-
-
0034443602
-
New fragile authentication watermark for images
-
J. Fridrich, M. Goljan, and A.C. Baldoza, "New fragile authentication watermark for images," in Proc. IEEE Int. Conf. Image Processing, 2000, pp. 446-449.
-
Proc. IEEE Int. Conf. Image Processing, 2000
, pp. 446-449
-
-
Fridrich, J.1
Goljan, M.2
Baldoza, A.C.3
-
8
-
-
0036030626
-
Security of fragile authentication watermarks with localization
-
J. Fridrich, "Security of fragile authentication watermarks with localization," in Proc. SPIE Photonic West, vol. 4675, Electronic Imaging 2002, Security and Watermarking of Multimedia Contents, 2002, pp. 691-700.
-
Proc. SPIE Photonic West, Vol. 4675, Electronic Imaging 2002, Security and Watermarking of Multimedia Contents, 2002
, pp. 691-700
-
-
Fridrich, J.1
-
9
-
-
0029292158
-
Information authentication for a slippery new age
-
S. Walton, "Information authentication for a slippery new age," Dr. Dobbs J., vol. 20, no. 4, pp. 18-26, 1995.
-
(1995)
Dr. Dobbs J.
, vol.20
, Issue.4
, pp. 18-26
-
-
Walton, S.1
-
10
-
-
0035473831
-
Secret and public key image watermarking schemes for image authentication and ownership verification
-
P.W. Wong and N. Memon, "Secret and public key image watermarking schemes for image authentication and ownership verification," IEEE. Trans. Image Processing, vol. 10, no. 10, pp. 1593-1601, 2001.
-
(2001)
IEEE. Trans. Image Processing
, vol.10
, Issue.10
, pp. 1593-1601
-
-
Wong, P.W.1
Memon, N.2
-
11
-
-
0033601660
-
Fragile imperceptible digital watermark with privacy control
-
D. Coppersmith, F. Mintzer, C. Tresser, C.W. Wu, and M.M. Yeung, "Fragile imperceptible digital watermark with privacy control," in Proc. SPIE/IS&T Int. Symp. Electronic Imaging: Science and Technology, San Jose, CA, 1999, vol. 3657, pp. 79-84.
-
Proc. SPIE/IS&T Int. Symp. Electronic Imaging: Science and Technology, San Jose, CA, 1999
, vol.3657
, pp. 79-84
-
-
Coppersmith, D.1
Mintzer, F.2
Tresser, C.3
Wu, C.W.4
Yeung, M.M.5
-
12
-
-
0035159824
-
A hierarchical image authentication watermark with improved localization and security
-
M.U. Celik, G. Sharma, E. Saber, and A.M. Tekalp, "A hierarchical image authentication watermark with improved localization and security," in Proc. IEEE Int. Conf. Image Processing, 2001, vol. 2, pp. 502-505.
-
Proc. IEEE Int. Conf. Image Processing, 2001
, vol.2
, pp. 502-505
-
-
Celik, M.U.1
Sharma, G.2
Saber, E.3
Tekalp, A.M.4
-
13
-
-
3843119260
-
Lossless recovery of an original image containing embedded data
-
Aug. 21
-
C.W. Honsinger, P.W. Jones, M. Rabbani, and J.C. Stoffel, "Lossless recovery of an original image containing embedded data," U. S. Patent No. 6,278,791, Aug. 21, 2001.
-
(2001)
U. S. Patent No. 6,278,791
-
-
Honsinger, C.W.1
Jones, P.W.2
Rabbani, M.3
Stoffel, J.C.4
-
14
-
-
0034765589
-
Invertible authentication
-
J. Fridrich, M. Goljan, and R.D. Du, "Invertible authentication," in Proc. SPIE, Security Watermarking of Multimedia Contents, San Jose, CA, Jan. 2001, vol. 3971, pp. 197-208.
-
Proc. SPIE, Security Watermarking of Multimedia Contents, San Jose, CA, Jan. 2001
, vol.3971
, pp. 197-208
-
-
Fridrich, J.1
Goljan, M.2
Du, R.D.3
-
15
-
-
0036488240
-
Lossless data embedding - New paradigm in digital watermarking
-
J. Fridrich, M. Gojan, and R. Du, "Lossless data embedding - New paradigm in digital watermarking," EURASIP J. Applied Signal Processing, (Special Issue Emerging Applications Multimedia Data Hiding), vol. 2002, no. 2, pp. 185-196, 2002.
-
(2002)
EURASIP J. Applied Signal Processing, (Special Issue Emerging Applications Multimedia Data Hiding)
, vol.2002
, Issue.2
, pp. 185-196
-
-
Fridrich, J.1
Gojan, M.2
Du, R.3
-
16
-
-
1642302769
-
Reversible data hiding
-
Sept. 22-25
-
M.U. Celik, G. Sharma, A.M. Tekalp, and E. Saber, "Reversible data hiding," in Proc. IEEE Int. Conf. Image Processing, vol. 2, pp. 157-160, Sept. 22-25 2002.
-
(2002)
Proc. IEEE Int. Conf. Image Processing
, vol.2
, pp. 157-160
-
-
Celik, M.U.1
Sharma, G.2
Tekalp, A.M.3
Saber, E.4
-
17
-
-
0029727745
-
A transparent authentication and distortion measurement technique for images
-
B. Zhu, M.D. Swanson, and A.H. Tewfik, "A transparent authentication and distortion measurement technique for images," in Proc. 7th IEEE Digital Signal Processing Workshop, Loen, Norway, Sept. 1996, pp. 45-48.
-
Proc. 7th IEEE Digital Signal Processing Workshop, Loen, Norway, Sept. 1996
, pp. 45-48
-
-
Zhu, B.1
Swanson, M.D.2
Tewfik, A.H.3
-
18
-
-
16544389965
-
Coding and data hiding for multimedia
-
Ph. D. dissertation, Dept. of Electrical and Computer Engineering, Univ. of Minnesota, Twin Cities, MN, Dec.
-
B. Zhu, "Coding and data hiding for multimedia," Ph. D. dissertation, Dept. of Electrical and Computer Engineering, Univ. of Minnesota, Twin Cities, MN, Dec. 1998.
-
(1998)
-
-
Zhu, B.1
-
19
-
-
0032648596
-
Digital watermarking for telltale tamper proofing and authentication
-
D. Kundur and D. Hatzinako, "Digital watermarking for telltale tamper proofing and authentication," Proc. IEEE, vol. 87, no. 7, pp. 1167-1180, 1999.
-
(1999)
Proc. IEEE
, vol.87
, Issue.7
, pp. 1167-1180
-
-
Kundur, D.1
Hatzinako, D.2
-
20
-
-
0033686485
-
Distortion bounded authentication techniques
-
N. Memon, P. Vora, B.-L. Yeo, and M. Yeung, "Distortion bounded authentication techniques," Proc. SPIE, Security and Watermarking of Multimedia Contents II, vol. 3971, pp. 164-174, 2000.
-
(2000)
Proc. SPIE, Security and Watermarking of Multimedia Contents II
, vol.3971
, pp. 164-174
-
-
Memon, N.1
Vora, P.2
Yeo, B.-L.3
Yeung, M.4
-
21
-
-
0036755019
-
On the design of content-based multimedia authentication systems
-
Sept.
-
C.W. Wu, "On the design of content-based multimedia authentication systems," IEEE Trans. Multimedia, vol. 4, pp. 385-393, Sept. 2002.
-
(2002)
IEEE Trans. Multimedia
, vol.4
, pp. 385-393
-
-
Wu, C.W.1
-
22
-
-
0030409375
-
A robust content based digital signature for image authentication
-
M. Schneider and S.-F. Chang, "A robust content based digital signature for image authentication," in Proc. IEEE Int. Conf. Image Processing, 1996, vol. 3, pp. 227-230.
-
Proc. IEEE Int. Conf. Image Processing, 1996
, vol.3
, pp. 227-230
-
-
Schneider, M.1
Chang, S.-F.2
-
23
-
-
0034140535
-
Fault resilient and compression tolerant digital signature for image authentication
-
D.-C. Lou and J.-L. Liu, "Fault resilient and compression tolerant digital signature for image authentication," IEEE Trans. Consumer Electron., vol. 46, no. 1, pp. 31-39, 2000.
-
(2000)
IEEE Trans. Consumer Electron.
, vol.46
, Issue.1
, pp. 31-39
-
-
Lou, D.-C.1
Liu, J.-L.2
-
25
-
-
0032650557
-
Content-based digital signature for motion pictures authentication and content-fragile watermarking
-
J. Dittman, A. Steinmetz, and R. Steinmetz, "Content-based digital signature for motion pictures authentication and content-fragile watermarking," IEEE Int. Conf. Multimedia Computing and Systems, 1999, vol. 2, pp. 209-213.
-
IEEE Int. Conf. Multimedia Computing and Systems, 1999
, vol.2
, pp. 209-213
-
-
Dittman, J.1
Steinmetz, A.2
Steinmetz, R.3
-
26
-
-
0034442403
-
Image authentication and integrity verification via content-based watermarks and a public key cryptosystem
-
C.-T. Li, D.-C. Lou, and T.-H. Chen, "Image authentication and integrity verification via content-based watermarks and a public key cryptosystem," in Proc. IEEE Int. Conf. Image Processing, 2000, vol. 3, pp. 694-697.
-
Proc. IEEE Int. Conf. Image Processing, 2000
, vol.3
, pp. 694-697
-
-
Li, C.-T.1
Lou, D.-C.2
Chen, T.-H.3
-
28
-
-
0035248504
-
A robust image authentication method distinguishing JPEG compression from malicious manipulation
-
C.-Y. Lin and S.-F. Chang, "A robust image authentication method distinguishing JPEG compression from malicious manipulation," IEEE Trans. Circuits Syst. Video Technol., vol. 11, no. 2, pp. 153-168, 2001.
-
(2001)
IEEE Trans. Circuits Syst. Video Technol.
, vol.11
, Issue.2
, pp. 153-168
-
-
Lin, C.-Y.1
Chang, S.-F.2
-
29
-
-
6344278566
-
Generating robust digital signature for image/video authentication
-
C.-Y. Lin and S.-F. Chang, "Generating robust digital signature for image/video authentication," in Multimedia Security Workshop ACM Multimedia 98, Bristol, U.K., Sept. 1998. Available: http://www.ctr.columbua.edu/-cylin/publications.html.
-
Multimedia Security Workshop ACM Multimedia 98, Bristol, U.K., Sept. 1998
-
-
Lin, C.-Y.1
Chang, S.-F.2
-
30
-
-
0036451808
-
A quantitative semi-fragile JPEG2000 image authentication system
-
Q. Sun, S.-F. Chang, M. Kurato, and M. Suto, "A quantitative semi-fragile JPEG2000 image authentication system," in Proc. IEEE Int. Conf. Image Processing, Sept. 2002, vol. 2, pp. 22-25.
-
Proc. IEEE Int. Conf. Image Processing, Sept. 2002
, vol.2
, pp. 22-25
-
-
Sun, Q.1
Chang, S.-F.2
Kurato, M.3
Suto, M.4
-
31
-
-
0033688392
-
Semi-fragile watermarking for authenticating JPEG visual content
-
C.-Y. Lin and S.-F. Chang, "Semi-fragile watermarking for authenticating JPEG visual content," in Proc. SPIE Security and Watermarking of Multimedia Contents II, San Jose, CA, Jan. 2000, pp. 140-151.
-
Proc. SPIE Security and Watermarking of Multimedia Contents II, San Jose, CA, Jan. 2000
, pp. 140-151
-
-
Lin, C.-Y.1
Chang, S.-F.2
-
32
-
-
0035163017
-
On the security of the SARI image authentication system
-
R. Radhakrishnan and N. Memon, "On the security of the SARI image authentication system," in Proc. IEEE Int. Conf. Image Processing, 2001, vol. 3, pp. 971-974.
-
Proc. IEEE Int. Conf. Image Processing, 2001
, vol.3
, pp. 971-974
-
-
Radhakrishnan, R.1
Memon, N.2
-
33
-
-
84908310270
-
Speech content authentication integrated with CELP speech coders
-
C.-P. Wu and C.-C.J. Kuo, "Speech content authentication integrated with CELP speech coders," in Proc. IEEE Int. Conf. Multimedia Expo (ICME2001), Aug. 22-25, 2001, pp. 1009-1012.
-
Proc. IEEE Int. Conf. Multimedia Expo (ICME2001), Aug. 22-25, 2001
, pp. 1009-1012
-
-
Wu, C.-P.1
Kuo, C.-C.J.2
|