Watermarking and Digital Signature Techniques for Multimedia Authentication and Copyright Protection

Watermarking and Digital Signature Techniques for Multimedia Authentication and Copyright Protection

[1]  Heidi A. Peterson,et al.  Luminance-model-based DCT quantization for color image compression , 1992, Electronic Imaging.

[2]  Shih-Fu Chang,et al.  Generating Robust Digital Signature for Image/Video Authentication , 1998 .

[3]  Minerva M. Yeung,et al.  An invisible watermarking technique for image verification , 1997, Proceedings of International Conference on Image Processing.

[4]  Tiago Rosa Maria Paula Queluz Content-based integrity protection of digital images , 1999, Electronic Imaging.

[5]  László Lovász,et al.  On the Shannon capacity of a graph , 1979, IEEE Trans. Inf. Theory.

[6]  Jeffrey Lubin,et al.  The use of psychophysical data and models in the analysis of display system performance , 1993 .

[7]  Shih-Fu Chang,et al.  Semifragile watermarking for authenticating JPEG visual content , 2000, Electronic Imaging.

[8]  Gaurav Sharma,et al.  Digital color imaging , 1997, IEEE Trans. Image Process..

[9]  Imre Csiszár,et al.  Capacity of the Gaussian arbitrarily varying channel , 1991, IEEE Trans. Inf. Theory.

[10]  Andrew B. Watson,et al.  Perceptual optimization of DCT color quantization matrices , 1994, Proceedings of 1st International Conference on Image Processing.

[11]  Shih-Fu Chang,et al.  Conceptual framework for indexing visual information at multiple levels , 1999, Electronic Imaging.

[12]  Ralf Steinmetz,et al.  Multimedia and Security Workshop at ACM Multimedia , 1998 .

[13]  Cesar A. Gonzales,et al.  Video compression algorithm with adaptive bit allocation and quantization , 1991, Other Conferences.

[14]  Feng Lin,et al.  Towards absolute invariants of images under translation, rotation, and dilation , 1993, Pattern Recognit. Lett..

[15]  H. Arsenault,et al.  Experiments on pattern recognition using invariant Fourier-Mellin descriptors. , 1986, Journal of the Optical Society of America. A, Optics and image science.

[16]  Anil K. Jain Fundamentals of Digital Image Processing , 2018, Control of Color Imaging Systems.

[17]  B. Zhu,et al.  Transparent robust authentication and distortion measurement technique for images , 1996, 1996 IEEE Digital Signal Processing Workshop Proceedings.

[18]  P. J. Brightwell,et al.  Flexible switching and editing of MPEG-2 video bitstreams , 1997 .

[19]  Thierry Pun,et al.  Robust template matching for affine resistant image watermarks , 2000, IEEE Trans. Image Process..

[20]  Ernest L. Hall,et al.  A Nonlinear Model for the Spatial Characteristics of the Human Visual System , 1977, IEEE Transactions on Systems, Man, and Cybernetics.

[21]  Ming-Kuei Hu,et al.  Visual pattern recognition by moment invariants , 1962, IRE Trans. Inf. Theory.

[22]  Ching-Yung Lin Public Watermarking Surviving General Scaling and Cropping: An Application for Print-and-Scan Process , 2000 .

[23]  Ton Kalker,et al.  Video watermarking system for broadcast monitoring , 1999, Electronic Imaging.

[24]  Sushil K. Bhattacharjee,et al.  Compression tolerant image authentication , 1998, Proceedings 1998 International Conference on Image Processing. ICIP98 (Cat. No.98CB36269).

[25]  D. Hubel,et al.  Receptive fields of single neurones in the cat's striate cortex , 1959, The Journal of physiology.

[26]  Ingemar J. Cox,et al.  Review of watermarking and the importance of perceptual modeling , 1997, Electronic Imaging.

[27]  M. Ibrahim Sezan,et al.  Uniform Perceptual Quantization: Applications to Digital Radiography , 1987, IEEE Transactions on Systems, Man, and Cybernetics.

[28]  Ingemar J. Cox,et al.  Watermarking as communications with side information , 1999, Proc. IEEE.

[29]  Richard W. Young,et al.  THE RENEWAL OF ROD AND CONE OUTER SEGMENTS IN THE RHESUS MONKEY , 1971, The Journal of cell biology.

[30]  Shih-Fu Chang,et al.  Distortion Modeling and Invariant Extraction for Digital Image Print-and-Scan Process , 2000 .

[31]  Arun N. Netravali,et al.  Digital Video: An introduction to MPEG-2 , 1996 .

[32]  Gordon W. Braudaway,et al.  Protecting publicly available images with a visible image watermark , 1996, Electronic Imaging.

[33]  Shih-Fu Chang,et al.  A robust image authentication method distinguishing JPEG compression from malicious manipulation , 2001, IEEE Trans. Circuits Syst. Video Technol..

[34]  Rosario Gennaro,et al.  How to Sign Digital Streams , 1997, Inf. Comput..

[35]  Shih-Fu Chang,et al.  A robust content based digital signature for image authentication , 1996, Proceedings of 3rd IEEE International Conference on Image Processing.

[36]  Wenjun Zeng,et al.  Image-adaptive watermarking using visual models , 1998, IEEE J. Sel. Areas Commun..

[37]  Min Wu,et al.  Watermarking for image authentication , 1998, Proceedings 1998 International Conference on Image Processing. ICIP98 (Cat. No.98CB36269).

[38]  M. Yeung,et al.  Can invisible watermarks resolve rightful ownerships? , 1997, Electronic Imaging.

[39]  Harry Wechsler,et al.  2-D Invariant Object Recognition Using Distributed Associative Memory , 1988, IEEE Trans. Pattern Anal. Mach. Intell..

[40]  Jiri Fridrich,et al.  Image watermarking for tamper detection , 1998, Proceedings 1998 International Conference on Image Processing. ICIP98 (Cat. No.98CB36269).

[41]  Jr. Thomas G. Stockham,et al.  Image processing in the context of a visual model , 1972 .

[42]  Gabriela Csurka,et al.  A Bayesian Approach to Affine Transformation Resistant Image and Video Watermarking , 1999, Information Hiding.

[43]  Jean-Jacques Quisquater,et al.  Cryptology for digital TV broadcasting , 1995, Proc. IEEE.

[44]  Edward J. Delp,et al.  A watermark for digital images , 1996, Proceedings of 3rd IEEE International Conference on Image Processing.

[45]  Deepa Kundur,et al.  Digital watermarking for telltale tamper proofing and authentication , 1999, Proc. IEEE.

[46]  Chun-Hsien Chou,et al.  A perceptually tuned subband image coder based on the measure of just-noticeable-distortion profile , 1995, IEEE Trans. Circuits Syst. Video Technol..

[47]  C. Morandi,et al.  Registration of Translated and Rotated Images Using Finite Fourier Transforms , 1987, IEEE Transactions on Pattern Analysis and Machine Intelligence.

[48]  H. Wilson,et al.  Orientation bandwidths of spatial mechanisms measured by masking. , 1984, Journal of the Optical Society of America. A, Optics and image science.

[49]  Cornelius W. A. M. van Overveld,et al.  Digital watermarking by geometric warping , 1998, Proceedings 1998 International Conference on Image Processing. ICIP98 (Cat. No.98CB36269).

[50]  Jessica J. Fridrich,et al.  Comparing robustness of watermarking techniques , 1999, Electronic Imaging.

[51]  M. McGuire An image registration technique for recovering rotation, scale and translation parameters , 1998 .

[52]  Deepa Kundur Water-filling for watermarking? , 2000, 2000 IEEE International Conference on Multimedia and Expo. ICME2000. Proceedings. Latest Advances in the Fast Changing World of Multimedia (Cat. No.00TH8532).

[53]  Martin Kutter,et al.  Watermarking resistance to translation, rotation, and scaling , 1999, Other Conferences.

[54]  F. Campbell,et al.  Orientational selectivity of the human visual system , 1966, The Journal of physiology.

[55]  Thierry Pun,et al.  Fast Robust Template Matching for Affine Resistant Image Watermarks , 1999, Information Hiding.

[56]  C.-H. Lin,et al.  An Image Authenticator Surviving DCT-based Variable Quantization Table Compression , 1997 .

[57]  Claude E. Shannon,et al.  The zero error capacity of a noisy channel , 1956, IRE Trans. Inf. Theory.

[58]  Gregory K. Wallace,et al.  The JPEG still picture compression standard , 1991, CACM.

[59]  Andrew B. Watson,et al.  The cortex transform: rapid computation of simulated neural images , 1987 .

[60]  P. N. Tudor,et al.  Real-time transcoding of MPEG-2 video bit streams , 1997 .

[61]  O. Faugeras Digital color image processing within the framework of a human visual model , 1979 .

[62]  Nasir D. Memon,et al.  Protecting digital media content , 1998, CACM.

[63]  Ingemar J. Cox,et al.  Secure spread spectrum watermarking for images, audio and video , 1996, Proceedings of 3rd IEEE International Conference on Image Processing.

[64]  Xiao-fan Feng,et al.  Noise measurement technique for document scanners , 1996, Electronic Imaging.

[65]  Kannan Ramchandran,et al.  Capacity issues in digital image watermarking , 1998, Proceedings 1998 International Conference on Image Processing. ICIP98 (Cat. No.98CB36269).

[66]  Alon Orlitsky,et al.  Zero-Error Information Theory , 1998, IEEE Trans. Inf. Theory.

[67]  Jürgen Altmann,et al.  On the Digital Implementation of the Rotation-Invariant Fourier-Mellin Transform , 1987, J. Inf. Process. Cybern..

[68]  Imre Csiszár,et al.  Capacity and decoding rules for classes of arbitrarily varying channels , 1989, IEEE Trans. Inf. Theory.

[69]  Markus G. Kuhn,et al.  Attacks on Copyright Marking Systems , 1998, Information Hiding.

[70]  Alexandros Eleftheriadis,et al.  Constrained and general dynamic rate shaping of compressed digital video , 1995, Proceedings., International Conference on Image Processing.

[71]  Jian Zhao,et al.  Embedding Robust Labels into Images for Copyright Protection , 1995, KnowRight.

[72]  Shih-Fu Chang,et al.  VQ-based digital signature scheme for multimedia content authentication , 2000, Electronic Imaging.

[73]  P. G. J. Barten,et al.  Subjective image quality of high-definition television pictures , 1990 .

[74]  Whitfield Diffie,et al.  New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.

[75]  RUDOLF AHLSWEDE Arbitrarily varying channels with states sequence known to the sender , 1986, IEEE Trans. Inf. Theory.

[76]  Gary Friedman,et al.  The trustworthy digital camera: restoring credibility to the photographic image , 1993 .

[77]  Shih-Fu Chang,et al.  Issues and solutions for authenticating MPEG video , 1999, Electronic Imaging.

[78]  Sushil Jajodia,et al.  Recovery of Watermarks from Distorted Images , 1999, Information Hiding.

[79]  Franck Davoine,et al.  Geometrical and frequential watermarking scheme using similarities , 1999, Electronic Imaging.

[80]  D. Casasent,et al.  Position, rotation, and scale invariant optical correlation. , 1976, Applied optics.

[81]  R. L. Valois,et al.  The orientation and direction selectivity of cells in macaque visual cortex , 1982, Vision Research.

[82]  Stefano Alliney Digital Analysis of Rotated Images , 1993, IEEE Trans. Pattern Anal. Mach. Intell..

[83]  Ingemar J. Cox,et al.  Secure spread spectrum watermarking for multimedia , 1997, IEEE Trans. Image Process..

[84]  Ying Yao,et al.  Performance evaluation of a high-quality TDI-CCD color scanner , 1992, Electronic Imaging.

[85]  Scott J. Daly,et al.  Visible differences predictor: an algorithm for the assessment of image fidelity , 1992, Electronic Imaging.

[86]  Oliver Werner,et al.  Generic Quantiser for Transcoding of Hybrid Video , 1997 .

[87]  A B Watson,et al.  Estimation of local spatial scale. , 1987, Journal of the Optical Society of America. A, Optics and image science.

[88]  Shih-Fu Chang,et al.  CVEPS - a compressed video editing and parsing system , 1997, MULTIMEDIA '96.

[89]  Nasir D. Memon,et al.  Secret and public key authentication watermarking schemes that resist vector quantization attack , 2000, Electronic Imaging.

[90]  Eero P. Simoncelli,et al.  A filter design technique for steerable pyramid image transforms , 1996, 1996 IEEE International Conference on Acoustics, Speech, and Signal Processing Conference Proceedings.

[91]  Claude E. Shannon,et al.  Channels with Side Information at the Transmitter , 1958, IBM J. Res. Dev..

[92]  Mauro Barni,et al.  Capacity of the watermark channel: how many bits can be hidden within a digital image? , 1999, Electronic Imaging.

[93]  Jeffrey A. Bloom,et al.  Computing the Probability of False Watermark Detection , 1999, Information Hiding.

[94]  Chien-Chang Chen,et al.  Robust image authentication method surviving JPEG lossy compression , 1997, Electronic Imaging.

[95]  Wei Ding,et al.  Rate control of MPEG video coding and recording by rate-quantization modeling , 1996, IEEE Trans. Circuits Syst. Video Technol..

[96]  D. Casasent,et al.  New optical transforms for pattern recognition , 1977, Proceedings of the IEEE.

[97]  Ingemar J. Cox,et al.  Informed embedding: exploiting image and detector information during watermark insertion , 2000, Proceedings 2000 International Conference on Image Processing (Cat. No.00CH37101).

[98]  David Bearman,et al.  Authenticity of Digital Resources: Towards a Statement of Requirements in the Research Process , 1998, D Lib Mag..

[99]  John D. Villasenor,et al.  Visibility of wavelet quantization noise , 1997, IEEE Transactions on Image Processing.

[100]  G. G. Stokes "J." , 1890, The New Yale Book of Quotations.

[101]  Radia J. Perlman,et al.  Network security - private communication in a public world , 2002, Prentice Hall series in computer networking and distributed systems.

[102]  Andrew B. Watson,et al.  DCT quantization matrices visually optimized for individual images , 1993, Electronic Imaging.