Watermarking-based tamper detection and recovery algorithms for official documents
暂无分享,去创建一个
[1] Wim Sweldens,et al. The lifting scheme: a construction of second generation wavelets , 1998 .
[2] M. Mese,et al. Recent Advances in Digital Halftoning and Inverse Halftoning Methods , 2002 .
[3] Asifullah Khan,et al. Authentication and recovery of images using multiple watermarks , 2010, Comput. Electr. Eng..
[4] Ioannis Pitas,et al. Embedding robust watermarks by chaotic mixing , 1997, Proceedings of 13th International Conference on Digital Signal Processing.
[5] N. Ahmed,et al. Discrete Cosine Transform , 1996 .
[6] Franco Bartolini,et al. Self Recovery Authentication Of Images In The Dwt Domain , 2005, Int. J. Image Graph..
[7] Shih-Fu Chang,et al. New semi-fragile image authentication watermarking techniques using random bias and nonuniform quantization , 2006, IEEE Transactions on Multimedia.
[8] Helen Treharne,et al. A Novel Semi-Fragile Image Watermarking, Authentication and Self-Restoration Technique Using the Slant Transform , 2007, Third International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2007).
[9] Xiang Zhou,et al. A semifragile watermark scheme for image authentication , 2004, 10th International Multimedia Modelling Conference, 2004. Proceedings..
[10] Deepa Kundur,et al. Digital watermarking for telltale tamper proofing and authentication , 1999, Proc. IEEE.
[11] Kôki Abe,et al. A Semi-Fragile Watermarking Scheme Using Weighted Vote with Sieve and Emphasis for Image Authentication , 2007, IEICE Trans. Fundam. Electron. Commun. Comput. Sci..
[12] Ke Ding,et al. Wavelet-Based Semi-Fragile Watermarking with Tamper Detection , 2005, IEICE Trans. Fundam. Electron. Commun. Comput. Sci..