A New Watermarking System Based on Discrete Cosine Transform (DCT) in Color Biometric Images
暂无分享,去创建一个
Engin Avci | Arif Gulten | Türker Tuncer | Sengül Dogan | E. Avci | T. Tuncer | S. Dogan | Arif Gülten
[1] Oscar C. Au,et al. Data hiding for halftone images , 2000, Electronic Imaging.
[2] Lamri Laouamer,et al. New Images Watermarking Scheme Based on Singular Value Decomposition , 2013, J. Inf. Hiding Multim. Signal Process..
[3] Ja-Ling Wu,et al. Hidden signatures in images , 1996, Proceedings of 3rd IEEE International Conference on Image Processing.
[4] Chun-Shien Lu,et al. Multimedia Security: Steganography and Digital Watermarking Techniques for Protection of Intellectual Property , 2004 .
[5] Xinyang Huang,et al. A Image Digital Watermarking based on DWT in Invariant Wavelet Domain , 2007, Fourth International Conference on Image and Graphics (ICIG 2007).
[6] Shi-Jinn Horng,et al. A wavelet-tree-based watermarking method using distance vector of binary cluster , 2009, Expert Syst. Appl..
[7] Jeng-Shyang Pan,et al. Genetic watermarking based on transform-domain techniques , 2004, Pattern Recognit..
[8] Jian Zhao,et al. Embedding Robust Labels into Images for Copyright Protection , 1995, KnowRight.
[9] Gerhard C. Langelaar,et al. Copy Protection for Multimedia Data based on Labeling Techniques , 1998 .
[10] Richa Singh,et al. Feature based RDWT watermarking for multimodal biometric system , 2009, Image Vis. Comput..
[11] Ioannis Pitas,et al. Applications of toral automorphisms in image watermarking , 1996, Proceedings of 3rd IEEE International Conference on Image Processing.
[12] Richard P. Wildes,et al. Iris recognition: an emerging biometric technology , 1997, Proc. IEEE.
[13] Russ Ryan. The importance of biometric standards , 2009 .
[14] Ioannis Pitas,et al. Copyright protection of images using robust digital signatures , 1996, 1996 IEEE International Conference on Acoustics, Speech, and Signal Processing Conference Proceedings.
[15] Stephen M. Matyas,et al. A Biometric Standard for Information Management and Security , 2000, Comput. Secur..
[16] N. Ahmed,et al. Discrete Cosine Transform , 1996 .
[17] Bo Tao,et al. Adaptive watermarking in the DCT domain , 1997, 1997 IEEE International Conference on Acoustics, Speech, and Signal Processing.
[18] Ahmet M. Eskicioglu,et al. AN OPTIMAL WATERMARKING SCHEME BASED ON SINGULAR VALUE DECOMPOSITION , 2003 .
[19] Mauro Barni,et al. A DCT-domain system for robust image watermarking , 1998, Signal Process..
[20] Dong-Sik Jang,et al. Expert system for low frequency adaptive image watermarking: Using psychological experiments on human image perception , 2007, Expert Syst. Appl..
[21] Arun Ross,et al. Information fusion in biometrics , 2003, Pattern Recognit. Lett..
[22] Korris Fu-Lai Chung,et al. Robust digital image watermarking based on subsampling , 2006, Appl. Math. Comput..
[23] Won-gyum Kim,et al. Multimodal biometric image watermarking using two-stage integrity verification , 2009, Signal Process..
[24] Ingemar J. Cox,et al. Secure spread spectrum watermarking for images, audio and video , 1996, Proceedings of 3rd IEEE International Conference on Image Processing.
[25] A. Ben Hamza,et al. Image watermarking scheme using nonnegative matrix factorization and wavelet transform , 2009, Expert Syst. Appl..
[26] Sharath Pankanti,et al. An identity-authentication system using fingerprints , 1997, Proc. IEEE.
[27] C. F. Osborne,et al. A digital watermark , 1994, Proceedings of 1st International Conference on Image Processing.
[28] Ahmed H. Tewfik,et al. Transparent robust image watermarking , 1996, Proceedings of 3rd IEEE International Conference on Image Processing.
[29] Yin Yong,et al. Real-time Shadow Rendering in Scene System of Marine Simulator , 2007, Fourth International Conference on Image and Graphics (ICIG 2007).
[30] Murat Hüsnü Sazli,et al. Speech recognition with artificial neural networks , 2010, Digit. Signal Process..
[31] Richard Walters. Managing risk through the integration of physical and logical security , 2010 .