A secure and robust digital signature scheme for JPEG2000 image authentication
暂无分享,去创建一个
[1] Ramarathnam Venkatesan,et al. Robust image hashing , 2000, Proceedings 2000 International Conference on Image Processing (Cat. No.00CH37101).
[2] Shu Lin,et al. Error control coding : fundamentals and applications , 1983 .
[3] Alfred Menezes,et al. The Elliptic Curve Digital Signature Algorithm (ECDSA) , 2001, International Journal of Information Security.
[4] David S. Taubman,et al. High performance scalable image compression with EBCOT , 1999, Proceedings 1999 International Conference on Image Processing (Cat. 99CH36348).
[5] Shu Lin,et al. Error Control Coding , 2004 .
[6] Shih-Fu Chang,et al. A robust content based digital signature for image authentication , 1996, Proceedings of 3rd IEEE International Conference on Image Processing.
[7] 염흥렬,et al. [서평]「Applied Cryptography」 , 1997 .
[8] Aaas News,et al. Book Reviews , 1893, Buffalo Medical and Surgical Journal.
[9] Chun-Shien Lu,et al. Structural digital signature for image authentication: an incidental distortion resistant scheme , 2003, IEEE Trans. Multim..
[10] Shih-Fu Chang,et al. A robust image authentication method distinguishing JPEG compression from malicious manipulation , 2001, IEEE Trans. Circuits Syst. Video Technol..
[11] C. Christopoulos,et al. Efficient methods for encoding regions of interest in the upcoming JPEG2000 still image coding standard , 2000, IEEE Signal Processing Letters.
[12] Yair Frankel,et al. On enabling secure applications through off-line biometric identification , 1998, Proceedings. 1998 IEEE Symposium on Security and Privacy (Cat. No.98CB36186).
[13] Min Wu,et al. Data hiding in digital binary image , 2000, 2000 IEEE International Conference on Multimedia and Expo. ICME2000. Proceedings. Latest Advances in the Fast Changing World of Multimedia (Cat. No.00TH8532).
[14] Gonzalo R. Arce,et al. Approximate image message authentication codes , 2001, IEEE Trans. Multim..
[15] Nasir Memon,et al. Secret and public key image watermarking schemes for image authentication and ownership verification , 2001, IEEE Trans. Image Process..
[16] Jiri Fridrich,et al. Robust hash functions for digital watermarking , 2000, Proceedings International Conference on Information Technology: Coding and Computing (Cat. No.PR00540).
[17] C.-C. Jay Kuo,et al. An Integrated Approach to Image Watermarking and JPEG-2000 Compression , 2001, J. VLSI Signal Process..