Watermarking and Digital Signature Techniques for Multimedia Authentication and Copyright Protection
暂无分享,去创建一个
[1] Heidi A. Peterson,et al. Luminance-model-based DCT quantization for color image compression , 1992, Electronic Imaging.
[2] Shih-Fu Chang,et al. Generating Robust Digital Signature for Image/Video Authentication , 1998 .
[3] Minerva M. Yeung,et al. An invisible watermarking technique for image verification , 1997, Proceedings of International Conference on Image Processing.
[4] Tiago Rosa Maria Paula Queluz. Content-based integrity protection of digital images , 1999, Electronic Imaging.
[5] László Lovász,et al. On the Shannon capacity of a graph , 1979, IEEE Trans. Inf. Theory.
[6] Jeffrey Lubin,et al. The use of psychophysical data and models in the analysis of display system performance , 1993 .
[7] Shih-Fu Chang,et al. Semifragile watermarking for authenticating JPEG visual content , 2000, Electronic Imaging.
[8] Gaurav Sharma,et al. Digital color imaging , 1997, IEEE Trans. Image Process..
[9] Imre Csiszár,et al. Capacity of the Gaussian arbitrarily varying channel , 1991, IEEE Trans. Inf. Theory.
[10] Andrew B. Watson,et al. Perceptual optimization of DCT color quantization matrices , 1994, Proceedings of 1st International Conference on Image Processing.
[11] Shih-Fu Chang,et al. Conceptual framework for indexing visual information at multiple levels , 1999, Electronic Imaging.
[12] Ralf Steinmetz,et al. Multimedia and Security Workshop at ACM Multimedia , 1998 .
[13] Cesar A. Gonzales,et al. Video compression algorithm with adaptive bit allocation and quantization , 1991, Other Conferences.
[14] Feng Lin,et al. Towards absolute invariants of images under translation, rotation, and dilation , 1993, Pattern Recognit. Lett..
[15] H. Arsenault,et al. Experiments on pattern recognition using invariant Fourier-Mellin descriptors. , 1986, Journal of the Optical Society of America. A, Optics and image science.
[16] Anil K. Jain. Fundamentals of Digital Image Processing , 2018, Control of Color Imaging Systems.
[17] B. Zhu,et al. Transparent robust authentication and distortion measurement technique for images , 1996, 1996 IEEE Digital Signal Processing Workshop Proceedings.
[18] P. J. Brightwell,et al. Flexible switching and editing of MPEG-2 video bitstreams , 1997 .
[19] Thierry Pun,et al. Robust template matching for affine resistant image watermarks , 2000, IEEE Trans. Image Process..
[20] Ernest L. Hall,et al. A Nonlinear Model for the Spatial Characteristics of the Human Visual System , 1977, IEEE Transactions on Systems, Man, and Cybernetics.
[21] Ming-Kuei Hu,et al. Visual pattern recognition by moment invariants , 1962, IRE Trans. Inf. Theory.
[22] Ching-Yung Lin. Public Watermarking Surviving General Scaling and Cropping: An Application for Print-and-Scan Process , 2000 .
[23] Ton Kalker,et al. Video watermarking system for broadcast monitoring , 1999, Electronic Imaging.
[24] Sushil K. Bhattacharjee,et al. Compression tolerant image authentication , 1998, Proceedings 1998 International Conference on Image Processing. ICIP98 (Cat. No.98CB36269).
[25] D. Hubel,et al. Receptive fields of single neurones in the cat's striate cortex , 1959, The Journal of physiology.
[26] Ingemar J. Cox,et al. Review of watermarking and the importance of perceptual modeling , 1997, Electronic Imaging.
[27] M. Ibrahim Sezan,et al. Uniform Perceptual Quantization: Applications to Digital Radiography , 1987, IEEE Transactions on Systems, Man, and Cybernetics.
[28] Ingemar J. Cox,et al. Watermarking as communications with side information , 1999, Proc. IEEE.
[29] Richard W. Young,et al. THE RENEWAL OF ROD AND CONE OUTER SEGMENTS IN THE RHESUS MONKEY , 1971, The Journal of cell biology.
[30] Shih-Fu Chang,et al. Distortion Modeling and Invariant Extraction for Digital Image Print-and-Scan Process , 2000 .
[31] Arun N. Netravali,et al. Digital Video: An introduction to MPEG-2 , 1996 .
[32] Gordon W. Braudaway,et al. Protecting publicly available images with a visible image watermark , 1996, Electronic Imaging.
[33] Shih-Fu Chang,et al. A robust image authentication method distinguishing JPEG compression from malicious manipulation , 2001, IEEE Trans. Circuits Syst. Video Technol..
[34] Rosario Gennaro,et al. How to Sign Digital Streams , 1997, Inf. Comput..
[35] Shih-Fu Chang,et al. A robust content based digital signature for image authentication , 1996, Proceedings of 3rd IEEE International Conference on Image Processing.
[36] Wenjun Zeng,et al. Image-adaptive watermarking using visual models , 1998, IEEE J. Sel. Areas Commun..
[37] Min Wu,et al. Watermarking for image authentication , 1998, Proceedings 1998 International Conference on Image Processing. ICIP98 (Cat. No.98CB36269).
[38] M. Yeung,et al. Can invisible watermarks resolve rightful ownerships? , 1997, Electronic Imaging.
[39] Harry Wechsler,et al. 2-D Invariant Object Recognition Using Distributed Associative Memory , 1988, IEEE Trans. Pattern Anal. Mach. Intell..
[40] Jiri Fridrich,et al. Image watermarking for tamper detection , 1998, Proceedings 1998 International Conference on Image Processing. ICIP98 (Cat. No.98CB36269).
[41] Jr. Thomas G. Stockham,et al. Image processing in the context of a visual model , 1972 .
[42] Gabriela Csurka,et al. A Bayesian Approach to Affine Transformation Resistant Image and Video Watermarking , 1999, Information Hiding.
[43] Jean-Jacques Quisquater,et al. Cryptology for digital TV broadcasting , 1995, Proc. IEEE.
[44] Edward J. Delp,et al. A watermark for digital images , 1996, Proceedings of 3rd IEEE International Conference on Image Processing.
[45] Deepa Kundur,et al. Digital watermarking for telltale tamper proofing and authentication , 1999, Proc. IEEE.
[46] Chun-Hsien Chou,et al. A perceptually tuned subband image coder based on the measure of just-noticeable-distortion profile , 1995, IEEE Trans. Circuits Syst. Video Technol..
[47] C. Morandi,et al. Registration of Translated and Rotated Images Using Finite Fourier Transforms , 1987, IEEE Transactions on Pattern Analysis and Machine Intelligence.
[48] H. Wilson,et al. Orientation bandwidths of spatial mechanisms measured by masking. , 1984, Journal of the Optical Society of America. A, Optics and image science.
[49] Cornelius W. A. M. van Overveld,et al. Digital watermarking by geometric warping , 1998, Proceedings 1998 International Conference on Image Processing. ICIP98 (Cat. No.98CB36269).
[50] Jessica J. Fridrich,et al. Comparing robustness of watermarking techniques , 1999, Electronic Imaging.
[51] M. McGuire. An image registration technique for recovering rotation, scale and translation parameters , 1998 .
[52] Deepa Kundur. Water-filling for watermarking? , 2000, 2000 IEEE International Conference on Multimedia and Expo. ICME2000. Proceedings. Latest Advances in the Fast Changing World of Multimedia (Cat. No.00TH8532).
[53] Martin Kutter,et al. Watermarking resistance to translation, rotation, and scaling , 1999, Other Conferences.
[54] F. Campbell,et al. Orientational selectivity of the human visual system , 1966, The Journal of physiology.
[55] Thierry Pun,et al. Fast Robust Template Matching for Affine Resistant Image Watermarks , 1999, Information Hiding.
[56] C.-H. Lin,et al. An Image Authenticator Surviving DCT-based Variable Quantization Table Compression , 1997 .
[57] Claude E. Shannon,et al. The zero error capacity of a noisy channel , 1956, IRE Trans. Inf. Theory.
[58] Gregory K. Wallace,et al. The JPEG still picture compression standard , 1991, CACM.
[59] Andrew B. Watson,et al. The cortex transform: rapid computation of simulated neural images , 1987 .
[60] P. N. Tudor,et al. Real-time transcoding of MPEG-2 video bit streams , 1997 .
[61] O. Faugeras. Digital color image processing within the framework of a human visual model , 1979 .
[62] Nasir D. Memon,et al. Protecting digital media content , 1998, CACM.
[63] Ingemar J. Cox,et al. Secure spread spectrum watermarking for images, audio and video , 1996, Proceedings of 3rd IEEE International Conference on Image Processing.
[64] Xiao-fan Feng,et al. Noise measurement technique for document scanners , 1996, Electronic Imaging.
[65] Kannan Ramchandran,et al. Capacity issues in digital image watermarking , 1998, Proceedings 1998 International Conference on Image Processing. ICIP98 (Cat. No.98CB36269).
[66] Alon Orlitsky,et al. Zero-Error Information Theory , 1998, IEEE Trans. Inf. Theory.
[67] Jürgen Altmann,et al. On the Digital Implementation of the Rotation-Invariant Fourier-Mellin Transform , 1987, J. Inf. Process. Cybern..
[68] Imre Csiszár,et al. Capacity and decoding rules for classes of arbitrarily varying channels , 1989, IEEE Trans. Inf. Theory.
[69] Markus G. Kuhn,et al. Attacks on Copyright Marking Systems , 1998, Information Hiding.
[70] Alexandros Eleftheriadis,et al. Constrained and general dynamic rate shaping of compressed digital video , 1995, Proceedings., International Conference on Image Processing.
[71] Jian Zhao,et al. Embedding Robust Labels into Images for Copyright Protection , 1995, KnowRight.
[72] Shih-Fu Chang,et al. VQ-based digital signature scheme for multimedia content authentication , 2000, Electronic Imaging.
[73] P. G. J. Barten,et al. Subjective image quality of high-definition television pictures , 1990 .
[74] Whitfield Diffie,et al. New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.
[75] RUDOLF AHLSWEDE. Arbitrarily varying channels with states sequence known to the sender , 1986, IEEE Trans. Inf. Theory.
[76] Gary Friedman,et al. The trustworthy digital camera: restoring credibility to the photographic image , 1993 .
[77] Shih-Fu Chang,et al. Issues and solutions for authenticating MPEG video , 1999, Electronic Imaging.
[78] Sushil Jajodia,et al. Recovery of Watermarks from Distorted Images , 1999, Information Hiding.
[79] Franck Davoine,et al. Geometrical and frequential watermarking scheme using similarities , 1999, Electronic Imaging.
[80] D. Casasent,et al. Position, rotation, and scale invariant optical correlation. , 1976, Applied optics.
[81] R. L. Valois,et al. The orientation and direction selectivity of cells in macaque visual cortex , 1982, Vision Research.
[82] Stefano Alliney. Digital Analysis of Rotated Images , 1993, IEEE Trans. Pattern Anal. Mach. Intell..
[83] Ingemar J. Cox,et al. Secure spread spectrum watermarking for multimedia , 1997, IEEE Trans. Image Process..
[84] Ying Yao,et al. Performance evaluation of a high-quality TDI-CCD color scanner , 1992, Electronic Imaging.
[85] Scott J. Daly,et al. Visible differences predictor: an algorithm for the assessment of image fidelity , 1992, Electronic Imaging.
[86] Oliver Werner,et al. Generic Quantiser for Transcoding of Hybrid Video , 1997 .
[87] A B Watson,et al. Estimation of local spatial scale. , 1987, Journal of the Optical Society of America. A, Optics and image science.
[88] Shih-Fu Chang,et al. CVEPS - a compressed video editing and parsing system , 1997, MULTIMEDIA '96.
[89] Nasir D. Memon,et al. Secret and public key authentication watermarking schemes that resist vector quantization attack , 2000, Electronic Imaging.
[90] Eero P. Simoncelli,et al. A filter design technique for steerable pyramid image transforms , 1996, 1996 IEEE International Conference on Acoustics, Speech, and Signal Processing Conference Proceedings.
[91] Claude E. Shannon,et al. Channels with Side Information at the Transmitter , 1958, IBM J. Res. Dev..
[92] Mauro Barni,et al. Capacity of the watermark channel: how many bits can be hidden within a digital image? , 1999, Electronic Imaging.
[93] Jeffrey A. Bloom,et al. Computing the Probability of False Watermark Detection , 1999, Information Hiding.
[94] Chien-Chang Chen,et al. Robust image authentication method surviving JPEG lossy compression , 1997, Electronic Imaging.
[95] Wei Ding,et al. Rate control of MPEG video coding and recording by rate-quantization modeling , 1996, IEEE Trans. Circuits Syst. Video Technol..
[96] D. Casasent,et al. New optical transforms for pattern recognition , 1977, Proceedings of the IEEE.
[97] Ingemar J. Cox,et al. Informed embedding: exploiting image and detector information during watermark insertion , 2000, Proceedings 2000 International Conference on Image Processing (Cat. No.00CH37101).
[98] David Bearman,et al. Authenticity of Digital Resources: Towards a Statement of Requirements in the Research Process , 1998, D Lib Mag..
[99] John D. Villasenor,et al. Visibility of wavelet quantization noise , 1997, IEEE Transactions on Image Processing.
[100] G. G. Stokes. "J." , 1890, The New Yale Book of Quotations.
[101] Radia J. Perlman,et al. Network security - private communication in a public world , 2002, Prentice Hall series in computer networking and distributed systems.
[102] Andrew B. Watson,et al. DCT quantization matrices visually optimized for individual images , 1993, Electronic Imaging.