AN APPROXIMATION APPROACH FOR DIGITAL IMAGE OWNER IDENTIFICATION USING HISTOGRAM INTERSECTION TECHNIQUE
暂无分享,去创建一个
[1] Ghazali Sulong,et al. A novel multiple semi-blind enhanced ISB watermarking algorithm using watermark bit-pattern histogram for copyright protection , 2012 .
[2] Aydin Akan,et al. A Robust Image Watermarking in the Joint Time-Frequency Domain , 2010, EURASIP J. Adv. Signal Process..
[3] Jihane Bennour,et al. Watermarking attack: BOWS contest , 2007, Electronic Imaging.
[4] Mingyan Li,et al. Tracing Medical Images Using Multi-Band Watermarks , 2004, The 26th Annual International Conference of the IEEE Engineering in Medicine and Biology Society.
[5] Michael J. Swain,et al. Color indexing , 1991, International Journal of Computer Vision.
[6] Kefa Rabah,et al. Steganography-The Art of Hiding Data , 2004 .
[7] Julie Delon,et al. A Nonparametric Approach for Histogram Segmentation , 2007, IEEE Transactions on Image Processing.
[8] Min-Shiang Hwang,et al. Data Hiding: Current Status and Key Issues , 2007, Int. J. Netw. Secur..
[9] Lee-Ming Cheng,et al. Hiding data in images by simple LSB substitution , 2004, Pattern Recognit..
[10] C. F. Osborne,et al. A digital watermark , 1994, Proceedings of 1st International Conference on Image Processing.
[11] Bernd Girod,et al. Robustness of a blind image watermarking scheme , 2000, Proceedings 2000 International Conference on Image Processing (Cat. No.00CH37101).
[12] Hazem Al-Otum,et al. A robust blind color image watermarking based on wavelet-tree bit host difference selection , 2010, Signal Process..
[13] Dong-Chul Park,et al. Medical Image Authentication Using Hash Function and Integer Wavelet Transform , 2008, 2008 Congress on Image and Signal Processing.
[14] Elliot M. Cramer,et al. Statistics in Psychology , 2004 .
[15] S.Maruthu Perumal,et al. A Wavelet based Digital Watermarking Method using Thresholds on Intermediate Bit Values , 2011 .
[16] M. G. Martini,et al. Subjective and objective quality assessment in wireless teleultrasonography imaging , 2008, 2008 30th Annual International Conference of the IEEE Engineering in Medicine and Biology Society.
[17] Eugene P. Genov. Digital watermarking of bitmap images , 2007, CompSysTech '07.
[18] Ahmet M. Eskicioglu,et al. A robust multiple watermarking scheme in the discrete wavelet transform domain , 2004, SPIE Optics East.
[19] Mehemed Bashir Aliwa,et al. Robust Digital Watermarking Based Falling-off-Boundary in Corners Board-MSB-6 Gray Scale Images , 2009 .
[20] Cláudio T. Silva,et al. Revisiting Histograms and Isosurface Statistics , 2008, IEEE Transactions on Visualization and Computer Graphics.
[21] Malay Kumar Kundu,et al. Robust and Blind Spatial Watermarking In Digital Image , 2002, ICVGIP.
[22] Walter Bender,et al. Techniques for Data Hiding , 1996, IBM Syst. J..
[23] Jeng-Shyang Pan,et al. Genetic Watermarking for Copyright Protection , 2009 .
[24] Der-Chyuan Lou,et al. A semi-blind digital watermarking scheme based on singular value decomposition , 2006, Comput. Stand. Interfaces.
[25] Cheng-Hsing Yang,et al. Inverted pattern approach to improve image quality of information hiding by LSB substitution , 2008, Pattern Recognit..
[26] Dan Wang,et al. A Novel Geometrical Robust Image Data Hiding Scheme , 2007, Eighth International Workshop on Image Analysis for Multimedia Interactive Services (WIAMIS '07).
[27] Amirhossein Taherinia,et al. A New Watermarking Attack Using Long-Range Correlation Image Restoration , 2009, 2009 International Conference on Availability, Reliability and Security.
[28] D. Levicky,et al. Log-polar Mapping in Robust Digital Image Watermarking , 2007, 2007 17th International Conference Radioelektronika.
[29] Akram M. Zeki,et al. ISB watermarking embedding: A block based model , 2011 .
[30] Huijie Xin,et al. Blind Digital Image Watermarking Technique Based On Intermediate Significant Bit and Discrete Wavelet Transform , 2009, 2009 International Conference on Computational Intelligence and Software Engineering.
[31] Akram M. Zeki,et al. A Novel Digital Watermarking Technique Basedon ISB (Intermediate Significant Bit) , 2009 .
[32] Chin-Chen Chang,et al. AN SVD ORIENTED WATERMARK EMBEDDING SCHEME WITH HIGH QUALITIES FOR THE RESTORED IMAGES , 2007 .
[33] Yongdong Wu. Nonlinear collusion attack on a watermarking scheme for buyer authentication , 2006, IEEE Trans. Multim..
[34] Jasni Mohamad Zain,et al. A New Performance Trade-Off Measurement Technique for Evaluating Image Watermarking Schemes , 2011, ICSECS.