Digital watermarking scheme exploiting nondeterministic dependence for image authentication
暂无分享,去创建一个
[1] I Pitas,et al. Image watermarking using block site selection and DCT domain constraints. , 1998, Optics express.
[2] Nasir D. Memon,et al. Secret and public key authentication watermarking schemes that resist vector quantization attack , 2000, Electronic Imaging.
[3] Jessica J. Fridrich,et al. Security of fragile authentication watermarks with localization , 2002, IS&T/SPIE Electronic Imaging.
[4] Nasir D. Memon,et al. Counterfeiting attacks on oblivious block-wise independent invisible watermarking schemes , 2000, IEEE Trans. Image Process..
[5] William Stallings,et al. Cryptography and Network Security: Principles and Practice , 1998 .
[6] P. Barreto,et al. Toward secure public-key blockwise fragile authentication watermarking , 2002 .
[7] Nasir Memon,et al. Secret and public key image watermarking schemes for image authentication and ownership verification , 2001, IEEE Trans. Image Process..
[8] Deepa Kundur,et al. Spatially localized image-dependent watermarking for statistical invisibility and collusion resistance , 2005, IEEE Transactions on Multimedia.
[9] Chang-Tsun Li. Digital fragile watermarking scheme for authentication of JPEG images , 2004 .
[10] Minerva M. Yeung,et al. Invisible watermarking for image verification , 1998, J. Electronic Imaging.
[11] Chang-Tsun Li,et al. One-dimensional neighborhood forming strategy for fragile watermarking , 2003, J. Electronic Imaging.
[12] Abdelkader H. Ouda,et al. Localization and security enhancement of block-based image authentication , 2005, IEEE International Conference on Image Processing 2005.
[13] Jiri Fridrich,et al. New fragile authentication watermark for images , 2000, Proceedings 2000 International Conference on Image Processing (Cat. No.00CH37101).
[14] Nasir D. Memon,et al. Cryptanalysis of the Yeung - Mintzer fragile watermarking technique , 2002, J. Electronic Imaging.
[15] Chang-Tsun Li,et al. Image authentication and integrity verification via content-based watermarks and a public key cryptosystem , 2000, Proceedings 2000 International Conference on Image Processing (Cat. No.00CH37101).
[16] Der-Chyuan Lou,et al. Highly robust watermarking scheme based on surrounding mean value relationship , 2005 .
[17] Der-Chyuan Lou,et al. Copyright protection scheme based on chaos and secret sharing techniques , 2005 .