Block-Chain Based Fragile Watermarking Scheme with Superior Localization
暂无分享,去创建一个
[1] P. Barreto,et al. Toward secure public-key blockwise fragile authentication watermarking , 2002 .
[2] A. Murat Tekalp,et al. Hierarchical watermarking for secure image authentication with localization , 2002, IEEE Trans. Image Process..
[3] Nasir Memon,et al. Secret and public key image watermarking schemes for image authentication and ownership verification , 2001, IEEE Trans. Image Process..
[4] Po-Whei Huang,et al. A hierarchical digital watermarking method for image tamper detection and recovery , 2005, Pattern Recognit..
[5] Nasir D. Memon,et al. Cryptanalysis of the Yeung - Mintzer fragile watermarking technique , 2002, J. Electronic Imaging.
[6] Ingemar J. Cox,et al. Digital Watermarking , 2003, Lecture Notes in Computer Science.
[7] Xiao-Ping Zhang,et al. Multiscale Fragile Watermarking Based on the Gaussian Mixture Model , 2006, IEEE Transactions on Image Processing.
[8] Jiri Fridrich,et al. Images with self-correcting capabilities , 1999, Proceedings 1999 International Conference on Image Processing (Cat. 99CH36348).
[9] Shan Suthaharan,et al. Fragile image watermarking using a gradient image for improved localization and security , 2004, Pattern Recognit. Lett..
[10] Xinpeng Zhang,et al. Statistical Fragile Watermarking Capable of Locating Individual Tampered Pixels , 2007, IEEE Signal Processing Letters.
[11] Thierry Pun,et al. Secure hybrid robust watermarking resistant against tampering and copy attack , 2003, Signal Process..
[12] Jessica J. Fridrich,et al. Security of fragile authentication watermarks with localization , 2002, IS&T/SPIE Electronic Imaging.
[13] Nasir D. Memon,et al. Counterfeiting attacks on oblivious block-wise independent invisible watermarking schemes , 2000, IEEE Trans. Image Process..
[14] Heng-Ming Tai,et al. A Wavelet-Based Fragile Watermarking Scheme for Secure Image Authentication , 2006, IWDW.
[15] Ping Wah Wong,et al. A public key watermark for image verification and authentication , 1998, Proceedings 1998 International Conference on Image Processing. ICIP98 (Cat. No.98CB36269).
[16] Hongxia Wang,et al. Synchronous Counterfeiting Attacks on self-embedding Watermarking Schemes , 2006 .
[17] R. H. Deng,et al. Security of an ill-posed operator for image authentication , 2005 .
[18] Ton Kalker,et al. Reversible Image Watermarking Based on Integer-to-Integer Wavelet Transform , 2007, IEEE Transactions on Information Forensics and Security.