Tampering with a watermarking-based image authentication scheme
暂无分享,去创建一个
[1] Qiuqi Ruan,et al. Secure semi-blind watermarking based on iteration mapping and image features , 2005, Pattern Recognit..
[2] Shyi-Chyi Cheng,et al. Fusion of color edge detection and color quantization for color image watermarking using principal axes analysis , 2007, Pattern Recognit..
[3] H. Y. Kim,et al. Toward a secure public-key blockwise fragile authentication watermarking , 2001, Proceedings 2001 International Conference on Image Processing (Cat. No.01CH37205).
[4] Yi-Ta Wu,et al. Digital watermarking based on chaotic map and reference register , 2007, Pattern Recognit..
[5] Chen He,et al. Erratum to: Quickly tracing detection for spread spectrum watermark based on effect estimation of the affine transformation [Pattern Recognition 38 (12) 2530] , 2006, Pattern Recognit..
[6] Guorui Feng,et al. Quickly tracing detection for spread spectrum watermark based on effect estimation of the affine transform , 2005, Pattern Recognit..
[7] Chang Dong Yoo,et al. Localized image watermarking based on feature points of scale-space representation , 2004, Pattern Recognit..
[8] Anthony Tung Shuen Ho,et al. A new semi-fragile image watermarking with robust tampering restoration using irregular sampling , 2007, Signal Process. Image Commun..
[9] Chin-Chen Chang,et al. Four-scanning attack on hierarchical digital watermarking method for image tamper detection and recovery , 2008, Pattern Recognit..
[10] Frank Y. Shih,et al. An adjusted-purpose digital watermarking technique , 2004, Pattern Recognit..
[11] Braham Barkat,et al. Multiresolution fragile watermarking using complex chirp signals for content authentication , 2006, Pattern Recognit..
[12] Nikolaos G. Bourbakis,et al. Lossless compression and information hiding in images , 2004, Pattern Recognit..
[13] Chaur-Heh Hsieh,et al. A novel image watermarking scheme based on amplitude attack , 2007, Pattern Recognit..
[14] Chin-Hsing Chen,et al. A robust watermarking scheme using phase shift keying with the combination of amplitude boost and low amplitude block selection , 2005, Pattern Recognit..
[15] Chin-Chen Chang,et al. A watermarking-based image ownership and tampering authentication scheme , 2006, Pattern Recognit. Lett..
[16] Shuenn-Shyang Wang,et al. Automatic image authentication and recovery using fractal code embedding and image inpainting , 2008, Pattern Recognit..
[17] Po-Wei Hsu,et al. A robust associative watermarking technique based on similarity diagrams , 2007, Pattern Recognit..
[18] Miroslaw Pawlak,et al. Circularly orthogonal moments for geometrically robust image watermarking , 2007, Pattern Recognit..
[19] Gernot Kubin,et al. Speaker identification security improvement by means of speech watermarking , 2007, Pattern Recognit..
[20] Chin-Ming Hsu,et al. A data-hiding technique with authentication, integration, and confidentiality for electronic patient records , 2002, IEEE Transactions on Information Technology in Biomedicine.
[21] Qijun Zhao,et al. A PCA-based watermarking scheme for tamper-proof of web pages , 2005, Pattern Recognit..
[22] A. Murat Tekalp,et al. Hierarchical watermarking for secure image authentication with localization , 2002, IEEE Trans. Image Process..
[23] Qijun Zhao,et al. PCA-based web page watermarking , 2007, Pattern Recognit..
[24] Mauro Barni,et al. Joint near-lossless compression and watermarking of still images for authentication and tamper localization , 2006, Signal Process. Image Commun..