A hierarchical signature scheme for robust video authentication using secret sharing
暂无分享,去创建一个
[1] Shih-Fu Chang,et al. Issues and solutions for authenticating MPEG video , 1999, Electronic Imaging.
[2] Bijan G. Mobasseri,et al. Content authentication and tamper detection in digital video , 2000, Proceedings 2000 International Conference on Image Processing (Cat. No.00CH37101).
[3] Jiri Fridrich,et al. Lossless authentication of MPEG-2 video , 2002, Proceedings. International Conference on Image Processing.
[4] Douglas R. Stinson,et al. Cryptography: Theory and Practice , 1995 .
[5] Adi Shamir,et al. How to share a secret , 1979, CACM.
[6] A. Murat Tekalp,et al. Video authentication with self-recovery , 2002, IS&T/SPIE Electronic Imaging.
[7] Wei-Ying Ma,et al. An indexing and browsing system for home video , 2000, 2000 10th European Signal Processing Conference.
[8] Wen-Hsiang Tsai,et al. A new technique for authentication of image/video for multimedia applications , 2001, MM&Sec '01.
[9] Bijan G. Mobasseri,et al. Watermarking for self-authentication of compressed video , 2002, Proceedings. International Conference on Image Processing.
[10] Hong Heather Yu,et al. A semi-fragile watermarking system for MPEG video authentication , 2002, 2002 IEEE International Conference on Acoustics, Speech, and Signal Processing.
[11] Qi Tian,et al. A semi-fragile object based video authentication system , 2003, Proceedings of the 2003 International Symposium on Circuits and Systems, 2003. ISCAS '03..
[12] Fabien A. P. Petitcolas,et al. Authentication of MPEG-4 data: risks and solutions , 2003, IS&T/SPIE Electronic Imaging.
[13] Regunathan Radhakrishnan,et al. Security of visual hash function , 2003, IS&T/SPIE Electronic Imaging.
[14] Ahmet M. Eskicioglu. A Prepositioned Secret Sharing Scheme for Message Authentication in Broadcast Networks , 2001 .
[15] Marc Joye,et al. Authentication of Sequences with the SL2 Hash Function: Application to Video Sequences , 1997, J. Comput. Secur..
[16] Mohan S. Kankanhalli,et al. Motion trajectory based video authentication , 2003, Proceedings of the 2003 International Symposium on Circuits and Systems, 2003. ISCAS '03..