QIM data hiding for tamper detection and correction in digital images using wavelet transform
暂无分享,去创建一个
[1] Zhou Wang,et al. Image Quality Assessment: From Error Measurement to Structural Similarity , 2004 .
[2] Asifullah Khan,et al. A Secure Semi-Fragile Watermarking Scheme for Authentication and Recovery of Images based on Wavelet Transform , 2008 .
[3] Shinfeng D. Lin,et al. Hierarchical Fragile Watermarking Scheme For Image Authentication , 2011, Intell. Autom. Soft Comput..
[4] Eero P. Simoncelli,et al. Image quality assessment: from error visibility to structural similarity , 2004, IEEE Transactions on Image Processing.
[5] Shih-Fu Chang,et al. A robust image authentication method distinguishing JPEG compression from malicious manipulation , 2001, IEEE Trans. Circuits Syst. Video Technol..
[6] De-Zhi Han,et al. Using two semi-fragile watermark for image authentication , 2005, 2005 International Conference on Machine Learning and Cybernetics.
[7] Amit Phadikar,et al. ROI Based Quality Access Control of Compressed Color Image using DWT via Lifting , 2009 .
[8] Sheng-Bing Che,et al. Image Self-Embedding Technology Research Based on Singular Value Decomposition , 2008, 2008 4th International Conference on Wireless Communications, Networking and Mobile Computing.
[9] Tiago Rosa Maria Paula Queluz. Spatial watermark for image content authentication , 2002, J. Electronic Imaging.
[10] Dezhi Chen,et al. Research of digital semi-fragile watermarking of remote sensing image based on wavelet analysis , 2004, IGARSS 2004. 2004 IEEE International Geoscience and Remote Sensing Symposium.
[11] Zhang Hongbin,et al. Tamper Detection and Self-Recovery of Image Based on Self-Embedding , 2009, 2009 Asia-Pacific Conference on Information Processing.
[12] Gregory W. Wornell,et al. Quantization index modulation: A class of provably good methods for digital watermarking and information embedding , 2001, IEEE Trans. Inf. Theory.