Secure and Incidental Distortion Tolerant Digital Signature for Image Authentication
暂无分享,去创建一个
[1] Ramarathnam Venkatesan,et al. New Iterative Geometric Methods for Robust Perceptual Image Hashing , 2001, Digital Rights Management Workshop.
[2] Fabien A. P. Petitcolas,et al. Watermarking schemes evaluation , 2000, IEEE Signal Process. Mag..
[3] J. E. Jackson. A User's Guide to Principal Components , 1991 .
[4] Ingemar J. Cox,et al. Digital Watermarking , 2003, Lecture Notes in Computer Science.
[5] Shih-Fu Chang,et al. A robust image authentication method distinguishing JPEG compression from malicious manipulation , 2001, IEEE Trans. Circuits Syst. Video Technol..
[6] Mitchell D. Swanson,et al. Multimedia Authentication and Watermarking , 2003 .
[7] Shih-Fu Chang,et al. A robust content based digital signature for image authentication , 1996, Proceedings of 3rd IEEE International Conference on Image Processing.
[8] Sheng Tang,et al. Compact and Robust Image Hashing , 2005, ICCSA.
[9] Ton Kalker,et al. A robust image fingerprinting system using the Radon transform , 2004, Signal Process. Image Commun..
[10] Vishal Monga,et al. Robust perceptual image hashing using feature points , 2004, 2004 International Conference on Image Processing, 2004. ICIP '04..
[11] Jiaoying Shi,et al. Digital watermarking systems with chaotic sequences , 1999, Electronic Imaging.
[12] A.H. Tewfik,et al. When seeing isn't believing [multimedia authentication technologies] , 2004, IEEE Signal Processing Magazine.
[13] Shree K. Nayar,et al. Clustered blockwise PCA for representing visual data , 2005, IEEE Transactions on Pattern Analysis and Machine Intelligence.
[14] Sushil K. Bhattacharjee,et al. Compression tolerant image authentication , 1998, Proceedings 1998 International Conference on Image Processing. ICIP98 (Cat. No.98CB36269).
[15] Chun-Shien Lu,et al. Structural digital signature for image authentication: an incidental distortion resistant scheme , 2003, IEEE Trans. Multim..
[16] Gary Friedman,et al. The trustworthy digital camera: restoring credibility to the photographic image , 1993 .
[17] J. Edward Jackson,et al. A User's Guide to Principal Components: Jackson/User's Guide to Principal Components , 2004 .
[18] Shih-Fu Chang,et al. Robust digital signature for multimedia authentication , 2003 .
[19] Vishal Monga,et al. Perceptual Image Hashing Via Feature Points: Performance Evaluation and Tradeoffs , 2006, IEEE Transactions on Image Processing.
[20] Der-Chyuan Lou,et al. Fault resilient and compression tolerant digital signature for image authentication , 2000, IEEE Trans. Consumer Electron..