Secure hybrid robust watermarking resistant against tampering and copy attack
暂无分享,去创建一个
Thierry Pun | Sviatoslav Voloshynovskiy | Frédéric Deguillaume | T. Pun | S. Voloshynovskiy | F. Deguillaume
[1] Ronald L. Rivest,et al. The MD5 Message-Digest Algorithm , 1992, RFC.
[2] Gregory W. Wornell,et al. Quantization index modulation: A class of provably good methods for digital watermarking and information embedding , 2001, IEEE Trans. Inf. Theory.
[3] Gregory W. Wornell,et al. Digital watermarking and information embedding using dither modulation , 1998, 1998 IEEE Second Workshop on Multimedia Signal Processing (Cat. No.98EX175).
[4] Thierry Pun,et al. Rotation, scale and translation invariant spread spectrum digital image watermarking , 1998, Signal Process..
[5] P. Barreto,et al. Toward secure public-key blockwise fragile authentication watermarking , 2002 .
[6] Edward J. Delp,et al. Communications approach to image steganography , 2002, IS&T/SPIE Electronic Imaging.
[7] Ian F. Blake,et al. Elliptic curves in cryptography , 1999 .
[8] B. Girod,et al. A blind watermarking scheme based on structured codebooks , 2000 .
[9] Gary Friedman,et al. The trustworthy digital camera: restoring credibility to the photographic image , 1993 .
[10] Edward J. Delp,et al. Fragile watermarking using the VW2D watermark , 1999, Electronic Imaging.
[11] Minerva M. Yeung,et al. An invisible watermarking technique for image verification , 1997, Proceedings of International Conference on Image Processing.
[12] Jiri Fridrich. A hybrid watermark for tamper detection in digital images , 1999, ISSPA '99. Proceedings of the Fifth International Symposium on Signal Processing and its Applications (IEEE Cat. No.99EX359).
[13] Thierry Pun,et al. Content adaptive watermarking based on a stochastic multiresolution image modeling , 2000, 2000 10th European Signal Processing Conference.
[14] Shih-Fu Chang,et al. Semifragile watermarking for authenticating JPEG visual content , 2000, Electronic Imaging.
[15] Nasir D. Memon,et al. Cryptanalysis of the Yeung - Mintzer fragile watermarking technique , 2002, J. Electronic Imaging.
[16] Shih-Fu Chang,et al. A robust content based digital signature for image authentication , 1996, Proceedings of 3rd IEEE International Conference on Image Processing.
[17] N. Koblitz. Elliptic curve cryptosystems , 1987 .
[18] 尚弘 島影. National Institute of Standards and Technologyにおける超伝導研究及び生活 , 2001 .
[19] PunThierry,et al. Rotation, scale and translation invariant spread spectrum digital image watermarking , 1998 .
[20] Andrew C. Singer,et al. Turbo equalization: principles and new results , 2002, IEEE Trans. Commun..
[21] Thierry Pun,et al. Capacity-security analysis of data hiding technologies , 2002, Proceedings. IEEE International Conference on Multimedia and Expo.
[22] Adi Shamir,et al. A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.
[23] Ramarathnam Venkatesan,et al. Robust image hashing , 2000, Proceedings 2000 International Conference on Image Processing (Cat. No.00CH37101).
[24] Minerva M. Yeung,et al. Fragile imperceptible digital watermark with privacy control , 1999, Electronic Imaging.
[25] Thierry Pun,et al. Robust digital watermarking with channel state estimation: Part II Applied robust watermarking , 2003 .
[26] Gonzalo R. Arce,et al. Joint wavelet compression and authentication watermarking , 1998, Proceedings 1998 International Conference on Image Processing. ICIP98 (Cat. No.98CB36269).
[27] Ping Wah Wong,et al. A public key watermark for image verification and authentication , 1998, Proceedings 1998 International Conference on Image Processing. ICIP98 (Cat. No.98CB36269).
[28] Deepa Kundur,et al. Digital watermarking for telltale tamper proofing and authentication , 1999, Proc. IEEE.
[29] Thierry Pun,et al. A Stochastic Approach to Content Adaptive Digital Image Watermarking , 1999, Information Hiding.
[30] Thierry Pun,et al. Rotation, scale and translation invariant digital image watermarking , 1997, Proceedings of International Conference on Image Processing.
[31] Thierry Pun,et al. Multibit digital watermarking robust against local nonlinear geometrical distortions , 2001, Proceedings 2001 International Conference on Image Processing (Cat. No.01CH37205).
[32] Xuejia Lai,et al. A Proposal for a New Block Encryption Standard , 1991, EUROCRYPT.
[33] Gabriela Csurka,et al. A Bayesian approach to spread spectrum watermark detection and secure copyright protection for digital image libraries , 1999, Proceedings. 1999 IEEE Computer Society Conference on Computer Vision and Pattern Recognition (Cat. No PR00149).
[34] Feng Lin,et al. Representations that uniquely characterize images modulo translation, rotation, and scaling , 1996, Pattern Recognit. Lett..
[35] Edward J. Delp,et al. Detection of image alterations using semifragile watermarks , 2000, Electronic Imaging.
[36] Alfred Menezes,et al. Handbook of Applied Cryptography , 2018 .
[37] Victor S. Miller,et al. Use of Elliptic Curves in Cryptography , 1985, CRYPTO.
[38] Alain Glavieux,et al. Reflections on the Prize Paper : "Near optimum error-correcting coding and decoding: turbo codes" , 1998 .
[39] Fernando Pérez-González,et al. The impact of channel coding on the performance of spatial watermarking for copyright protection , 1998, Proceedings of the 1998 IEEE International Conference on Acoustics, Speech and Signal Processing, ICASSP '98 (Cat. No.98CH36181).
[40] A. Murat Tekalp,et al. A hierarchical image authentication watermark with improved localization and security , 2001, Proceedings 2001 International Conference on Image Processing (Cat. No.01CH37205).
[41] Ton Kalker,et al. Video watermarking system for broadcast monitoring , 1999, Electronic Imaging.
[42] Sushil K. Bhattacharjee,et al. Compression tolerant image authentication , 1998, Proceedings 1998 International Conference on Image Processing. ICIP98 (Cat. No.98CB36269).
[43] Dirk Fox,et al. Advanced Encryption Standard (AES) , 1999, Datenschutz und Datensicherheit.
[44] Alfred Menezes,et al. The Elliptic Curve Digital Signature Algorithm (ECDSA) , 2001, International Journal of Information Security.
[45] Jiri Fridrich,et al. New fragile authentication watermark for images , 2000, Proceedings 2000 International Conference on Image Processing (Cat. No.00CH37101).
[46] Yacov Hel-Or,et al. Geometric hashing techniques for watermarking , 2001, Proceedings 2001 International Conference on Image Processing (Cat. No.01CH37205).
[47] R. Koetter,et al. Turbo equalization , 2004, IEEE Signal Processing Magazine.
[48] Robert G. Gallager,et al. Low-density parity-check codes , 1962, IRE Trans. Inf. Theory.
[49] I.J. Cox,et al. Watermarking in the real world: an application to DVD , 1999, Conference Record of the Thirty-Third Asilomar Conference on Signals, Systems, and Computers (Cat. No.CH37020).
[50] Nasir D. Memon,et al. Secret and public key authentication watermarking schemes that resist vector quantization attack , 2000, Electronic Imaging.
[51] Jessica J. Fridrich,et al. Security of fragile authentication watermarks with localization , 2002, IS&T/SPIE Electronic Imaging.
[52] Nasir D. Memon,et al. Counterfeiting attacks on oblivious block-wise independent invisible watermarking schemes , 2000, IEEE Trans. Image Process..
[53] Min Wu,et al. Watermarking for image authentication , 1998, Proceedings 1998 International Conference on Image Processing. ICIP98 (Cat. No.98CB36269).
[54] Alex Biryukov,et al. Data Encryption Standard (DES) , 2005, Encyclopedia of Cryptography and Security.
[55] Gabriela Csurka,et al. Template based recovery of Fourier-based watermarks using log-polar and log-log maps , 1999, Proceedings IEEE International Conference on Multimedia Computing and Systems.
[56] James H. Burrows,et al. Secure Hash Standard , 1995 .
[57] M. Tomlinson. New automatic equaliser employing modulo arithmetic , 1971 .
[58] Sviatoslav Voloshynovskiy,et al. Watermark copy attack , 2000, Electronic Imaging.
[59] Adnan M. Alattar. Smart Images using Digimarc's watermarking technology , 2000, Electronic Imaging.
[60] H. Miyakawa,et al. Matched-Transmission Technique for Channels With Intersymbol Interference , 1972, IEEE Trans. Commun..
[61] H. Y. Kim,et al. Toward a secure public-key blockwise fragile authentication watermarking , 2001, Proceedings 2001 International Conference on Image Processing (Cat. No.01CH37205).
[62] Nasir D. Memon,et al. Further attacks on Yeung-Mintzer fragile watermarking scheme , 2000, Electronic Imaging.
[63] Jessica J. Fridrich. Visual hash for oblivious watermarking , 2000, Electronic Imaging.
[64] J. O'Ruanaidh,et al. Rotation, Translation and Scale Invariant Digital Image Watermarking , 1997 .