暂无分享,去创建一个
Guillermo Morales-Luna | Valery I. Korzhik | Aleksey Zhuvikin | G. Morales-Luna | V. Korzhik | A. Zhuvikin
[1] David Eberly,et al. Derivative Approximation by Finite Differences , 2016 .
[2] Yun Q. Shi,et al. Reversible Data Hiding , 2003, IWDW.
[3] Shahram Shirani,et al. Subjective and Objective Quality Assessment of Image: A Survey , 2014, ArXiv.
[4] G. H. Raisoni,et al. A Semi Fragile Watermarking Algorithm Based on SVD-IWT for Image Authentication , 2012 .
[5] Ajaz Hussain Mir,et al. Digital Image Forgeries and Passive Image Authentication Techniques: A Survey , 2014 .
[6] Guillermo Morales-Luna,et al. Selective image authentication tolerant to JPEG compression , 2015, 2015 6th International Conference on Information, Intelligence, Systems and Applications (IISA).
[7] Venkatesan Guruswami. Iterative Decoding of Low-Density Parity Check Codes , 2006, Bull. EATCS.
[8] Ralf Steinmetz,et al. Content-based digital signature for motion pictures authentication and content-fragile watermarking , 1999, Proceedings IEEE International Conference on Multimedia Computing and Systems.
[9] Mohammed Ghanbari,et al. Scope of validity of PSNR in image/video quality assessment , 2008 .
[10] Mauro Barni,et al. Watermarking Systems Engineering: Enabling Digital Assets Security and Other Applications , 2007 .
[11] Robert G. Gallager,et al. Low-density parity-check codes , 1962, IRE Trans. Inf. Theory.
[12] Mohammed Yakoob Siyal,et al. A Robust and Secure Signature Scheme for Video Authentication , 2007, 2007 IEEE International Conference on Multimedia and Expo.
[13] Jiwu Huang,et al. Semi-Fragile Zernike Moment-Based Image Watermarking for Authentication , 2010, EURASIP J. Adv. Signal Process..
[14] Piotr Porwik,et al. The Haar – Wavelet Transform in Digital Image Processing : Its Status and Achievements , 2004 .
[15] Guillermo Morales-Luna,et al. Image Authentication Based on Modular Embedding , 2006, IEICE Trans. Inf. Syst..
[16] Rui Du,et al. Invertible authentication watermark for JPEG images , 2001, Proceedings International Conference on Information Technology: Coding and Computing.
[17] Jessica J. Fridrich,et al. Distortion-Free Data Embedding for Images , 2001, Information Hiding.
[18] Rita Noumeir,et al. Methods for image authentication: a survey , 2008, Multimedia Tools and Applications.
[19] Shuihua Han,et al. Content-based image authentication: current status, issues, and challenges , 2009, International Journal of Information Security.