Data Hiding for Binary Documents Robust to Print-Scan, Photocopy and Geometric Distortions
暂无分享,去创建一个
[1] Nazim Fatès,et al. Public automated web-based evaluation service for watermarking schemes: StirMark benchmark , 2001, IS&T/SPIE Electronic Imaging.
[2] Nasir D. Memon,et al. Data hiding in binary text documents , 2001, IS&T/SPIE Electronic Imaging.
[3] Thierry Pun,et al. Multilevel 2-D Bar Codes: Toward High-Capacity Storage Modules for Multimedia Security and Management , 2006, IEEE Trans. Inf. Forensics Secur..
[4] Hae Yong Kim,et al. A secure authentication watermarking for halftone and binary images , 2004, Int. J. Imaging Syst. Technol..
[5] Oscar C. Au,et al. Data hiding by smart pair toggling for halftone images , 2000, 2000 IEEE International Conference on Acoustics, Speech, and Signal Processing. Proceedings (Cat. No.00CH37100).
[6] Gabriela Csurka,et al. Template based recovery of Fourier-based watermarks using log-polar and log-log maps , 1999, Proceedings IEEE International Conference on Multimedia Computing and Systems.
[7] Hae Yong Kim,et al. Alteration-Locating Authentication Watermarking for Binary Images , 2004, IWDW.
[8] Ching-Yung Lin. Public Watermarking Surviving General Scaling and Cropping: An Application for Print-and-Scan Process , 2000 .
[9] Steven H. Low,et al. Copyright protection for the electronic distribution of text documents , 1999, Proc. IEEE.
[10] M. Kutter. Watermaking resisting to translation, rotation, and scaling , 1998 .
[11] Steven H. Low,et al. Marking text documents , 1997, Proceedings of International Conference on Image Processing.
[12] Hong Yan,et al. Interword distance changes represented by sine waves for watermarking text images , 2001, IEEE Trans. Circuits Syst. Video Technol..
[13] B. S. Manjunath,et al. `Print and Scan' Resilient Data Hiding in Images , 2006, IEEE Transactions on Information Forensics and Security.
[14] Yu-Chee Tseng,et al. A secure data hiding scheme for binary images , 2002, IEEE Trans. Commun..
[15] Chin-Chen Chang,et al. Hiding Data in Binary Images , 2005, ISPEC.
[16] Min Wu,et al. Data hiding in binary image for authentication and annotation , 2004, IEEE Transactions on Multimedia.
[17] Paulo Vinicius Koerich Borges,et al. Text luminance modulation for hardcopy watermarking , 2007, Signal Process..
[18] Fabien A. P. Petitcolas,et al. Watermarking schemes evaluation , 2000, IEEE Signal Process. Mag..
[19] Chun-Shien Lu,et al. Geometric distortion-resilient image hashing scheme and its applications on copy detection and authentication , 2005, Multimedia Systems.
[20] Shih-Fu Chang,et al. A robust content based digital signature for image authentication , 1996, Proceedings of 3rd IEEE International Conference on Image Processing.
[21] Hae Yong Kim. A new public-key authentication watermarking for binary document images resistant to parity attacks , 2005, IEEE International Conference on Image Processing 2005.
[22] Ingemar J. Cox,et al. Rotation, scale, and translation resilient watermarking for images , 2001, IEEE Trans. Image Process..
[23] Fernando Pérez-González,et al. Visible encryption: using paper as a secure channel , 2003, IS&T/SPIE Electronic Imaging.