Digital Watermarking for Image Tamper Detection using Block-Wise Technique
暂无分享,去创建一个
[1] A. Murat Tekalp,et al. Localized lossless authentication watermark (LAW) , 2003, IS&T/SPIE Electronic Imaging.
[2] S. Singh,et al. Face Tampering Detection from Single Face Image using Gradient Method , 2013 .
[3] Azizah Abdul Manaf,et al. Efficient Digital Image Authentication and Tamper Localization Technique Using 3Lsb Watermarking , 2012 .
[4] Po-Whei Huang,et al. A hierarchical digital watermarking method for image tamper detection and recovery , 2005, Pattern Recognit..
[5] Jihah Nah,et al. Digital Watermarking Robust to Geometric Distortions , 2012 .
[6] Nasir D. Memon,et al. Secret and public key authentication watermarking schemes that resist vector quantization attack , 2000, Electronic Imaging.
[7] Chien-Chang Chen,et al. A wavelet-based public key image authentication watermarking , 2003, IEEE 37th Annual 2003 International Carnahan Conference onSecurity Technology, 2003. Proceedings..
[8] Ping Wah Wong,et al. A public key watermark for image verification and authentication , 1998, Proceedings 1998 International Conference on Image Processing. ICIP98 (Cat. No.98CB36269).
[9] Nasir D. Memon,et al. Counterfeiting attacks on oblivious block-wise independent invisible watermarking schemes , 2000, IEEE Trans. Image Process..
[10] Mehdi Hussain,et al. Information Hiding Using Edge Boundaries of Objects , 2011 .
[11] O. Roeva,et al. Information Hiding: Techniques for Steganography and Digital Watermarking , 2000 .
[12] A. A. Manaf,et al. Efficient Two Level Image Tamper Detection Using Three LSB Watermarking , 2012, 2012 Fourth International Conference on Computational Intelligence and Communication Networks.
[13] Jean-Paul M. G. Linnartz,et al. Public watermarks and resistance to tampering , 1997, Proceedings of International Conference on Image Processing.
[14] Wei-Kuan Shih,et al. Watermarking for Multi-resolution Image Authentication , 2012 .