A Fragile Watermarking Scheme for Image Authentication with Tamper Detection and Localization
暂无分享,去创建一个
[1] Y. Hasan,et al. Fragile blockwise image authentication thwarting vector quantization attack , 2004, Proceedings of the Fourth IEEE International Symposium on Signal Processing and Information Technology, 2004..
[2] Minerva M. Yeung,et al. An invisible watermarking technique for image verification , 1997, Proceedings of International Conference on Image Processing.
[3] Deepa Kundur,et al. Digital watermarking for telltale tamper proofing and authentication , 1999, Proc. IEEE.
[4] P.K. Rajan,et al. TIAMAT: a new fragile watermarking technique for image authentication , 2006, 2006 Proceeding of the Thirty-Eighth Southeastern Symposium on System Theory.
[5] R. A. Fisher,et al. Statistical Tables for Biological, Agricultural and Medical Research , 1956 .
[6] Adi Shamir,et al. A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.
[7] L. Tippett. Statistical Tables: For Biological, Agricultural and Medical Research , 1954 .
[8] Yiwei Wang,et al. A wavelet-based watermarking algorithm for ownership verification of digital images , 2002, IEEE Trans. Image Process..
[9] Nasir D. Memon,et al. Counterfeiting attacks on oblivious block-wise independent invisible watermarking schemes , 2000, IEEE Trans. Image Process..
[10] Ping Wah Wong,et al. A Watermark for Image Integrity and Ownership Verification , 1998, PICS.
[11] Ping Wah Wong,et al. A public key watermark for image verification and authentication , 1998, Proceedings 1998 International Conference on Image Processing. ICIP98 (Cat. No.98CB36269).