A recoverable AMBTC authentication scheme using similarity embedding strategy
暂无分享,去创建一个
Der-Chyuan Lou | Wien Hong | Xiaoyu Zhou | D. Lou | Wien Hong | Xiaoyu Zhou
[1] Xinpeng Zhang,et al. Fragile image watermarking with pixel-wise recovery based on overlapping embedding strategy , 2017, Signal Process..
[2] Xingming Sun,et al. A novel image hashing scheme with perceptual robustness using block truncation coding , 2016, Inf. Sci..
[3] Chia-Chen Lin,et al. A novel hybrid image authentication scheme based on absolute moment block truncation coding , 2015, Multimedia Tools and Applications.
[4] Tung-Shou Chen,et al. Reversible data hiding using Delaunay triangulation and selective embedment , 2015, Inf. Sci..
[5] Tzung-Her Chen,et al. On the security of a BTC-based-compression image authentication scheme , 2017, Multimedia Tools and Applications.
[6] Wen-Chuan Wu. Quantization-based image authentication scheme using QR error correction , 2017, EURASIP J. Image Video Process..
[7] Aamir Saeed Malik,et al. Dual-purpose semi-fragile watermark: Authentication and recovery of digital images , 2013, Comput. Electr. Eng..
[8] Pawel Korus,et al. Towards Practical Self-Embedding for JPEG-Compressed Digital Images , 2015, IEEE Transactions on Multimedia.
[9] Chin-Chen Chang,et al. A Hierarchical Fragile Watermarking with VQ Index Recovery , 2011, J. Multim..
[10] Kim-Kwang Raymond Choo,et al. Tamper detection and image recovery for BTC-compressed images , 2016, Multimedia Tools and Applications.
[11] Der-Chyuan Lou,et al. Fault resilient and compression tolerant digital signature for image authentication , 2000, IEEE Trans. Consumer Electron..
[12] Doaa Mohammed. Image Compression Using Block Truncation Coding , 2011 .
[13] Chin-Chen Chang,et al. A Novel Fragile Watermark-Based Image Authentication Scheme for AMBTC-Compressed Images , 2016, J. Inf. Hiding Multim. Signal Process..
[14] Tung-Shou Chen,et al. High-Fidelity Reversible Data Hiding Using Directionally Enclosed Prediction , 2017, IEEE Signal Processing Letters.
[15] L. Rabiner,et al. The acoustics, speech, and signal processing society - A historical perspective , 1984, IEEE ASSP Magazine.
[16] Shu-Fen Tu,et al. Image tamper detection and recovery using adaptive embedding rules , 2016 .
[17] Yu-Chen Hu,et al. A novel reversible image authentication scheme for digital images , 2014, Signal Process..
[18] Chia-Chen Lin,et al. A High-Quality Image Authentication Scheme for AMBTC-compressed Images , 2014, KSII Trans. Internet Inf. Syst..
[19] Chin-Chen Chang,et al. A Tamper-Detection Scheme for BTC-Compressed Images with High-Quality Images , 2014, KSII Trans. Internet Inf. Syst..
[20] Dan Hu,et al. A novel search method based on artificial bee colony algorithm for block motion estimation , 2017, EURASIP Journal on Image and Video Processing.
[21] Tung-Shou Chen,et al. Reversible data hiding with contrast enhancement using adaptive histogram shifting and pixel value ordering , 2016, Signal Process. Image Commun..
[22] Wei Li,et al. Novel image authentication scheme with fine image quality for BTC-based compressed images , 2015, Multimedia Tools and Applications.
[23] Shu-Fen Tu,et al. Probability-based tampering detection scheme for digital images , 2010 .
[24] R. Gray,et al. Vector quantization , 1984, IEEE ASSP Magazine.
[25] Der-Chyuan Lou,et al. Detectability Improved Tamper Detection Scheme for Absolute Moment Block Truncation Coding Compressed Images , 2018, Symmetry.
[26] K.-C. Liu. Colour image watermarking for tamper proofing and pattern-based recovery , 2012 .
[27] J. Mielikainen. LSB matching revisited , 2006, IEEE Signal Processing Letters.
[28] Tung-Shou Chen,et al. An efficient reversible image authentication method using improved PVO and LSB substitution techniques , 2017, Signal Process. Image Commun..
[29] Shaowei Weng,et al. Reversible data hiding based on an adaptive pixel-embedding strategy and two-layer embedding , 2016, Inf. Sci..