-
1
-
-
0027697301
-
The trustworthy digital camera: Restoring credibility to the photographic image
-
G.L. Friedman, "The Trustworthy Digital Camera: Restoring Credibility to the Photographic Image", IEEE Trans. Consumer Electronics, vol. 39, 1993, pp. 905-910.
-
(1993)
IEEE Trans. Consumer Electronics
, vol.39
, pp. 905-910
-
-
Friedman, G.L.1
-
2
-
-
0017930809
-
A method for obtaining digital signatures and public-key cryptosystem
-
February
-
R.L. Rivest, A. Shamir, L. Adlemann, "A Method for Obtaining Digital Signatures and Public-Key Cryptosystem", Comm. Of ACM, February 1978, pp. 120126.
-
(1978)
Comm. of ACM
, pp. 120126
-
-
Rivest, R.L.1
Shamir, A.2
Adlemann, L.3
-
5
-
-
84962642939
-
Watermarking applications and their properties
-
March 27-29, Las Vegas, Nevada
-
I.J. Cox, M.L. Miller, J.A.Bloom, "Watermarking applications and their properties", Proc. of Int. Conf. On Information Technology: Coding and Computing, ITCC, March 27-29 2000, Las Vegas, Nevada.
-
(2000)
Proc. of Int. Conf. on Information Technology: Coding and Computing, ITCC
-
-
Cox, I.J.1
Miller, M.L.2
Bloom, J.A.3
-
7
-
-
0033688392
-
Semi-fragile watermarking for authenticating jpeg visual content
-
San Jose, CA, Jan
-
Ching-Yung Lin and Shih-Fu Chang, "Semi-Fragile Watermarking for Authenticating JPEG Visual Content," SPIE Security and Watermarking of Multimedia Contents II, EI '00, San Jose, CA, Jan. 2000.
-
(2000)
SPIE Security and Watermarking of Multimedia Contents II, EI '00
-
-
Lin, C.-Y.1
Chang, S.-F.2
-
8
-
-
0033717154
-
Detection of image alterations using semi-fragile watermarks
-
24-26 January
-
Eugene T. Lin, Christine I. Podilchuck, Edward J. Delp, "Detection of Image Alterations using Semi-Fragile Watermarks", Proc. of SPIE Security and Watermarking of Multimedia Contents II, Vol. 3971, 24-26 January 2000, pp. 152-163.
-
(2000)
Proc. of SPIE Security and Watermarking of Multimedia Contents II
, vol.3971
, pp. 152-163
-
-
Lin, E.T.1
Podilchuck, C.I.2
Delp, E.J.3
-
9
-
-
0033684204
-
Image Authentication using Chatic mixinhg Systems
-
A. Tefas, I. Pitas, "Image Authentication using Chatic mixinhg Systems", ISCAS 2000, May 28-31, 2000, Geneva, Switzerland, pp.216-219
-
ISCAS 2000, May 28-31, 2000, Geneva, Switzerland
, pp. 216-219
-
-
Tefas, A.1
Pitas, I.2
-
10
-
-
0031378592
-
An invisible watermarking technique for image verification
-
M. Yeung, C. Mintzer, "An invisible watermarking technique for image verification", Proc. of ICIP 1997, pp.680-683.
-
(1997)
Proc. of ICIP
, pp. 680-683
-
-
Yeung, M.1
Mintzer, C.2
-
11
-
-
0003356542
-
A watermark for image integrity and ownership verification
-
Portland, OR
-
P.W. Wong, "A watermark for image integrity and ownership verification", Proc. of IS&T PIC Conf., Portland, OR, 1997.
-
(1997)
Proc. of IS&T PIC Conf.
-
-
Wong, P.W.1
-
12
-
-
0033601660
-
Fragile imperceptible watermark with privacy control
-
25-27 January
-
D. Coppersmith, F. Mintzer, C.W. Wu, M.M. Yeung, "Fragile Imperceptible watermark with Privacy Control", Proc. of SPIE Security and Watermarking of Multimedia Contents II, Vol. 3971, 25-27 January 1999, pp. 79-84
-
(1999)
Proc. of SPIE Security and Watermarking of Multimedia Contents II
, vol.3971
, pp. 79-84
-
-
Coppersmith, D.1
Mintzer, F.2
Wu, C.W.3
Yeung, M.M.4
-
13
-
-
0032648596
-
Digital watermarking for telltale tamper proofing and authentication
-
July
-
D. Kundur, D. Hatzinakos, "Digital Watermarking for Telltale Tamper Proofing and Authentication", Proc. of IEEE, vol. 87, no. 7, July 1999.
-
(1999)
Proc. of IEEE
, vol.87
, Issue.7
-
-
Kundur, D.1
Hatzinakos, D.2
-
14
-
-
0033706181
-
Compression compatibile fragile e semi-fragile tamper detection
-
2426 January
-
Lisa M. Marvel, George W. Hartwig, Jr., Charles Boncelet, Jr, "Compression Compatibile Fragile e Semi-Fragile Tamper Detection", Proc. of SPIE Security and Watermarking of Multimedia Contents II, Vol. 3971, 2426 January 2000, pp. 131-139.
-
(2000)
Proc. of SPIE Security and Watermarking of Multimedia Contents II
, vol.3971
, pp. 131-139
-
-
Marvel, L.M.1
Hartwig Jr., G.W.2
Boncelet Jr., C.3
-
15
-
-
0032292847
-
Image watermarking for tamper detection
-
J. Fridrich, "Image Watermarking for Tamper Detection", Proc. of ICIP 1998.
-
(1998)
Proc. of ICIP
-
-
Fridrich, J.1
-
16
-
-
0033723294
-
Spatial watermark for image verification
-
24-26 January
-
M.P. Quelez, P. Lamy, "Spatial Watermark for Image Verification", Proc. of SPIE Security and Watermarking of Multimedia Contents II, Vol. 3971, 24-26 January 2000, pp. 120-127.
-
(2000)
Proc. of SPIE Security and Watermarking of Multimedia Contents II
, vol.3971
, pp. 120-127
-
-
Quelez, M.P.1
Lamy, P.2
-
20
-
-
0033872149
-
Counterfeiting attacks on oblivious block-wise independent invisible watermarking schemes
-
March
-
M. Holliman, N. Memon, "Counterfeiting Attacks on Oblivious Block-wise Independent Invisible Watermarking Schemes", IEEE Trans. Image Proc, vol. 9, no. 3, March 2000, pp. 422-441.
-
(2000)
IEEE Trans. Image Proc
, vol.9
, Issue.3
, pp. 422-441
-
-
Holliman, M.1
Memon, N.2
-
21
-
-
0033682895
-
Secret and public key authentication watermarking schemes that resist vector quantization attack
-
2426 January
-
W. Wong, N.Memon, "Secret and Public Key Authentication Watermarking Schemes that Resist Vector Quantization Attack", ", Proc. of SPIE Security and Watermarking of Multimedia Contents II, Vol. 3971, 2426 January 2000, pp. 417-427.
-
(2000)
Proc. of SPIE Security and Watermarking of Multimedia Contents II
, vol.3971
, pp. 417-427
-
-
Wong, W.1
Memon, N.2
-
22
-
-
0032682054
-
Spread spectrum image steganography
-
August
-
L.M. Marvel, C.G. Bonchelet.C.T. Retter, "Spread Spectrum Image Steganography", IEEE Trans, on Image Processing, vol.8, no. 8, August 1999, ppl075-1083.
-
(1999)
IEEE Trans, on Image Processing
, vol.8
, Issue.8
-
-
Marvel, L.M.1
Bonchelet, C.T.2
Retter, C.G.3
-
23
-
-
0033703669
-
Further attacks on yeung-mintzer fragile watermarking scheme
-
24-26 January
-
J. Fridrich, M.Goljan, N. Memon, "Further Attacks on Yeung-Mintzer fragile Watermarking Scheme", Proc. of SPIE Security and Watermarking of Multimedia Content, Vol. 3657, 24-26 January 2000, pp. 428-437.
-
(2000)
Proc. of SPIE Security and Watermarking of Multimedia Content
, vol.3657
, pp. 428-428
-
-
Fridrich, J.1
Goljan, M.2
Memon, N.3
|