A Semi-Fragile Image Content Authentication Technique based on Secure Hash in Frequency Domain
暂无分享,去创建一个
[1] Jean-Luc Dugelay,et al. A Survey of Watermarking Algorithms for Image Authentication , 2002, EURASIP J. Adv. Signal Process..
[2] Ramarathnam Venkatesan,et al. Robust image hashing , 2000, Proceedings 2000 International Conference on Image Processing (Cat. No.00CH37101).
[3] Shih-Fu Chang,et al. A robust image authentication method distinguishing JPEG compression from malicious manipulation , 2001, IEEE Trans. Circuits Syst. Video Technol..
[4] Shengsheng Yu,et al. Content-based watermarking scheme for image authentication , 2004, ICARCV 2004 8th Control, Automation, Robotics and Vision Conference, 2004..
[5] Wen-Hsiang Tsai,et al. Security Protection of Software Programs by Information Sharing and Authentication Techniques Using Invisible ASCII Control Code , 2010, Int. J. Netw. Secur..
[6] Shih-Fu Chang,et al. A robust content based digital signature for image authentication , 1996, Proceedings of 3rd IEEE International Conference on Image Processing.
[7] Jiri Fridrich,et al. Robust hash functions for digital watermarking , 2000, Proceedings International Conference on Information Technology: Coding and Computing (Cat. No.PR00540).
[8] 염흥렬,et al. [서평]「Applied Cryptography」 , 1997 .
[9] P. D. Sheba,et al. Selective Combinational Encryption of Gray Scale Images using Orthogonal Polynomials based Transformation , 2008 .
[10] Chun-Shien Lu,et al. Geometric distortion-resilient image hashing scheme and its applications on copy detection and authentication , 2005, Multimedia Systems.
[11] Po-Wei Hsu,et al. A Fragile Associative Watermarking on 2D Barcode for Data Authentication , 2008, Int. J. Netw. Secur..
[12] Sushil K. Bhattacharjee,et al. Compression tolerant image authentication , 1998, Proceedings 1998 International Conference on Image Processing. ICIP98 (Cat. No.98CB36269).
[13] M. Aswatha Kumar,et al. Symmetric Key Image Encryption Scheme with Key Sequences Derived from Random Sequence of Cyclic Elliptic Curve Points. , 2011 .
[14] Ismail Amr Ismail,et al. A Digital Image Encryption Algorithm Based A Composition of Two Chaotic Logistic Maps , 2010, Int. J. Netw. Secur..
[15] F. Ahmed,et al. A Secure and Robust Hashing Scheme for Image Authentication , 2005, 2005 5th International Conference on Information Communications & Signal Processing.
[16] Qi Tian,et al. A robust and secure media signature scheme for JPEG images , 2002, 2002 IEEE Workshop on Multimedia Signal Processing..
[17] Mohan S. Kankanhalli,et al. Robust image authentication using content based compression , 2003, Multimedia Systems.
[18] Philip Ogunbona,et al. A secure and flexible authentication system for digital images , 2003, Multimedia Systems.
[19] Gonzalo R. Arce,et al. Approximate image message authentication codes , 2001, IEEE Trans. Multim..
[20] Shih-Fu Chang,et al. Generating Robust Digital Signature for Image/Video Authentication , 1998 .
[21] Min Wu,et al. Robust and secure image hashing , 2006, IEEE Transactions on Information Forensics and Security.
[22] Nasir Memon,et al. Secret and public key image watermarking schemes for image authentication and ownership verification , 2001, IEEE Trans. Image Process..
[23] R. Krishnamoorthi,et al. A new data compression scheme using orthogonal polynomials , 1997, Proceedings of ICICS, 1997 International Conference on Information, Communications and Signal Processing. Theme: Trends in Information Systems Engineering and Wireless Multimedia Communications (Cat..