Chaotic watermark for blind forgery detection in images
暂无分享,去创建一个
[1] Safya Belghith,et al. Tamper detection and self-recovery scheme by DWT watermarking , 2015 .
[2] Safya Belghith,et al. Correlation properties of sequences generated by a simple first order scalar time-delay chaotic system , 2014, 2014 World Symposium on Computer Applications & Research (WSCAR).
[3] Mei Yu,et al. Stereo image watermarking scheme for authentication with self-recovery capability using inter-view reference sharing , 2014, Multimedia Tools and Applications.
[4] S. Horng,et al. An adaptive watermarking scheme for e-government document images , 2014, Multimedia Tools and Applications.
[5] Pingzhi Fan,et al. A low cost fragile watermarking scheme in H.264/AVC compressed domain , 2014, Multimedia Tools and Applications.
[6] Minyi Guo,et al. A blind image copyright protection scheme for e-government , 2013, J. Vis. Commun. Image Represent..
[7] Pingzhi Fan,et al. An adaptive watermarking scheme for e-government document images , 2013, Multimedia Tools and Applications.
[8] Lin Teng,et al. Cryptanalysis and improvement of a chaotic system based fragile watermarking scheme , 2013 .
[9] Hongjie He,et al. A semi-fragile image watermarking algorithm with two-stage detection , 2014, Multimedia Tools and Applications.
[10] Qigui Yang,et al. Period of the discrete Arnold cat map and general cat map , 2012 .
[11] Salvatore Sessa,et al. Fragile watermarking tamper detection with images compressed by fuzzy transform , 2012, Inf. Sci..
[12] Pingzhi Fan,et al. Copyright Protection for E-Government Document Images , 2012, IEEE MultiMedia.
[13] M. Hemahlathaa,et al. A feature-based robust digital image watermarking scheme , 2012, 2012 International Conference on Computing, Communication and Applications.
[14] R. Rajesh,et al. Chaotic model based semi fragile watermarking using integer transforms for digital fundus image authentication , 2012, Multimedia Tools and Applications.
[15] Balasubramanian Raman,et al. A chaotic system based fragile watermarking scheme for image tamper detection , 2011 .
[16] Mingyu Lu,et al. A novel color image watermarking scheme in nonsampled contourlet-domain , 2011, Expert Syst. Appl..
[17] Shu-Fen Tu,et al. Probability-based tampering detection scheme for digital images , 2010 .
[18] Gaurav Bhatnagar,et al. A new robust reference logo watermarking scheme , 2011, Multimedia Tools and Applications.
[19] Takao Terano,et al. Image copyright protection with forward error correction , 2009, Expert Syst. Appl..
[20] Yi Pan,et al. A blind watermarking method using maximum wavelet coefficient quantization , 2009, Expert Syst. Appl..
[21] Shi-Jinn Horng,et al. A wavelet-tree-based watermarking method using distance vector of binary cluster , 2009, Expert Syst. Appl..
[22] V. Aslantaş,et al. Improving the performance of DCT-based fragile watermarking using intelligent optimization algorithms , 2009 .
[23] Shinfeng D. Lin,et al. Dual watermark for image tamper detection and recovery , 2008, Pattern Recognit..
[24] Pingzhi Fan,et al. An Efficient Watermarking Method Based on Significant Difference of Wavelet Coefficient Quantization , 2008, IEEE Transactions on Multimedia.
[25] Jar-Ferr Yang,et al. A Highly Efficient VLSI Architecture for H.264/AVC CAVLC Decoder , 2008, IEEE Transactions on Multimedia.
[26] Zhi-Hong Guan,et al. A novel digital watermark algorithm based on chaotic maps , 2007 .
[27] Korris Fu-Lai Chung,et al. Robust digital image watermarking based on subsampling , 2006, Appl. Math. Comput..
[28] Zhiwu Lu,et al. A regularized minimum cross-entropy algorithm on mixtures of experts for time series prediction and curve detection , 2006, Pattern Recognit. Lett..
[29] Chin-Chen Chang,et al. A watermarking-based image ownership and tampering authentication scheme , 2006, Pattern Recognit. Lett..
[30] Po-Whei Huang,et al. A hierarchical digital watermarking method for image tamper detection and recovery , 2005, Pattern Recognit..
[31] Rabab Kreidieh Ward,et al. Wavelet packets-based digital watermarking for image verification and authentication , 2003, Signal Process..
[32] Mohan S. Kankanhalli,et al. Robust image authentication using content based compression , 2003, Multimedia Systems.
[33] Michael G. Strintzis,et al. Robust image watermarking based on generalized Radon transformations , 2003, IEEE Trans. Circuits Syst. Video Technol..
[34] Hsueh-Ming Hang,et al. A feature-based robust digital image watermarking scheme , 2003, IEEE Trans. Signal Process..
[35] A. Murat Tekalp,et al. Hierarchical watermarking for secure image authentication with localization , 2002, IEEE Trans. Image Process..
[36] Jessica J. Fridrich,et al. Security of fragile authentication watermarks with localization , 2002, IS&T/SPIE Electronic Imaging.
[37] Shih-Fu Chang,et al. SARI: self-authentication-and-recovery image watermarking system , 2001, MULTIMEDIA '01.
[38] Shih-Fu Chang,et al. A robust image authentication method distinguishing JPEG compression from malicious manipulation , 2001, IEEE Trans. Circuits Syst. Video Technol..
[39] Chun-Shien Lu,et al. Structural digital signature for image authentication: an incidental distortion resistant scheme , 2000, MULTIMEDIA '00.
[40] Jiri Fridrich,et al. New fragile authentication watermark for images , 2000, Proceedings 2000 International Conference on Image Processing (Cat. No.00CH37101).
[41] Nasir D. Memon,et al. Secret and public key authentication watermarking schemes that resist vector quantization attack , 2000, Electronic Imaging.
[42] Ralf Steinmetz,et al. Content-based digital signature for motion pictures authentication and content-fragile watermarking , 1999, Proceedings IEEE International Conference on Multimedia Computing and Systems.
[43] Chien-Chang Chen,et al. Robust image authentication method surviving JPEG lossy compression , 1997, Electronic Imaging.
[44] Minerva M. Yeung,et al. An invisible watermarking technique for image verification , 1997, Proceedings of International Conference on Image Processing.