Reversible fragile watermarking for locating tampered blocks in JPEG images
暂无分享,去创建一个
Zhenxing Qian | Xinpeng Zhang | Guorui Feng | Shuozhong Wang | Xinpeng Zhang | Shuozhong Wang | Zhenxing Qian | Guorui Feng
[1] Jean-Francois Delaigle,et al. Invisibility and application functionalities in perceptual watermarking an overview , 2002, Proc. IEEE.
[2] Jeffrey J. Rodríguez,et al. Expansion Embedding Techniques for Reversible Watermarking , 2007, IEEE Transactions on Image Processing.
[3] F. Chung,et al. Fragile watermarking scheme for image authentication , 2003 .
[4] Adnan M. Alattar,et al. > REPLACE THIS LINE WITH YOUR PAPER IDENTIFICATION NUMBER (DOUBLE-CLICK HERE TO EDIT) < Reversible Watermark Using the Difference Expansion of A Generalized Integer Transform , 2022 .
[5] Hefei Ling,et al. VLC-counted watermarking for JPEG image complete authentication , 2005, IEEE International Symposium on Communications and Information Technology, 2005. ISCIT 2005..
[6] Jun Tian,et al. Reversible data embedding using a difference expansion , 2003, IEEE Trans. Circuits Syst. Video Technol..
[7] Akio Ogihara,et al. Reversible Watermarking Method for JPEG Images , 2008, IEICE Trans. Inf. Syst..
[8] Chang-Tsun Li. Digital fragile watermarking scheme for authentication of JPEG images , 2004 .
[9] Jeho Nam,et al. A Novel Difference Expansion Transform for Reversible Data Embedding , 2008, IEEE Transactions on Information Forensics and Security.
[10] Yun Q. Shi,et al. Reversible Data Hiding for JPEG Images Based on Histogram Pairs , 2007, ICIAR.
[11] Henk J. A. M. Heijmans,et al. Reversible data embedding into images using wavelet techniques and sorting , 2005, IEEE Transactions on Image Processing.
[12] P. Laguna,et al. Signal Processing , 2002, Yearbook of Medical Informatics.
[13] Xinpeng Zhang,et al. Fragile Watermarking With Error-Free Restoration Capability , 2008, IEEE Transactions on Multimedia.
[14] Xinpeng Zhang,et al. Fragile watermarking scheme using a hierarchical mechanism , 2009, Signal Process..
[15] A. Murat Tekalp,et al. Lossless watermarking for image authentication: a new framework and an implementation , 2006, IEEE Transactions on Image Processing.
[16] Markus G. Kuhn,et al. Information hiding-a survey , 1999, Proc. IEEE.
[17] Wen Gao,et al. An image fragile watermark scheme based on chaotic image pattern and pixel-pairs , 2007, Appl. Math. Comput..
[18] Anthony Tung Shuen Ho,et al. A new semi-fragile image watermarking with robust tampering restoration using irregular sampling , 2007, Signal Process. Image Commun..
[19] Chin-Chen Chang,et al. Reversible Steganographic Method with High Payload for JPEG Images , 2008, IEICE Trans. Inf. Syst..
[20] Ke Ding,et al. Chaotic watermarking scheme for authentication of JPEG Images , 2008, 2008 International Symposium on Biometrics and Security Technologies.
[21] Nasir Memon,et al. Secret and public key image watermarking schemes for image authentication and ownership verification , 2001, IEEE Trans. Image Process..
[22] Chien-Chang Chen,et al. DCT-Based Reversible Image Watermarking Approach , 2007, Third International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2007).
[23] Jessica J. Fridrich,et al. Lossless data embedding for all image formats , 2002, IS&T/SPIE Electronic Imaging.
[24] Jiri Fridrich,et al. Images with self-correcting capabilities , 1999, Proceedings 1999 International Conference on Image Processing (Cat. 99CH36348).
[25] Xinpeng Zhang,et al. Statistical Fragile Watermarking Capable of Locating Individual Tampered Pixels , 2007, IEEE Signal Processing Letters.
[26] Shan Suthaharan,et al. Fragile image watermarking using a gradient image for improved localization and security , 2004, Pattern Recognit. Lett..
[27] Gerardo Pineda Betancourth,et al. Fragile Watermarking Scheme for Image Authentication , 2012, 2012 5th International Conference on Human System Interactions.
[28] A. Murat Tekalp,et al. Lossless generalized-LSB data embedding , 2005, IEEE Transactions on Image Processing.