A Novel Probabilistic Image Authentication Methodbased on Universal Hash Function for Rgb Images
暂无分享,去创建一个
[1] Suk Hwan Lee,et al. DWT based coding DNA watermarking for DNA copyright protection , 2014, Inf. Sci..
[2] Ching-Nung Yang,et al. Improvements of image sharing with steganography and authentication , 2007, J. Syst. Softw..
[3] Lin Teng,et al. Cryptanalysis and improvement of a chaotic system based fragile watermarking scheme , 2013 .
[4] D. Vaishnavi,et al. Robust and Invisible Image Watermarking in RGB Color Space Using SVD , 2015 .
[5] Jiying Zhao,et al. A new video watermarking algorithm based on 1D DFT and Radon transform , 2010, Signal Process..
[6] Teddy Furon,et al. A Survey of Watermarking Security , 2005, IWDW.
[7] A. Murat Tekalp,et al. Lossless generalized-LSB data embedding , 2005, IEEE Transactions on Image Processing.
[8] Indranil Sengupta,et al. An adaptive audio watermarking based on the singular value decomposition in the wavelet domain , 2010, Digit. Signal Process..
[9] Ziba Eslami,et al. Secret image sharing based on cellular automata and steganography , 2010, Pattern Recognit..
[10] Vincent Rijmen,et al. The Design of Rijndael: AES - The Advanced Encryption Standard , 2002 .
[11] Hazem Al-Otum,et al. Semi-fragile watermarking for grayscale image authentication and tamper detection based on an adjusted expanded-bit multiscale quantization-based technique , 2014, J. Vis. Commun. Image Represent..
[12] Brian Chen. Digital watermarking, information embedding, and data hiding systems , 2000 .
[13] Chi-Shiang Chan,et al. Secret Image Sharing with Steganography and Authentication Using Dynamic Programming Strategy , 2010, 2010 First International Conference on Pervasive Computing, Signal Processing and Applications.
[14] Cheng-Hsing Yang,et al. Fractal curves to improve the reversible data embedding for VQ-indexes based on locally adaptive coding , 2010, J. Vis. Commun. Image Represent..
[15] Chin-Chen Chang,et al. Sharing secrets in stego images with authentication , 2008, Pattern Recognit..
[16] Yih-Kai Lin,et al. A data hiding scheme based upon DCT coefficient modification , 2014, Comput. Stand. Interfaces.
[17] Jordan Shropshire,et al. Personality, attitudes, and intentions: Predicting initial adoption of information security behavior , 2015, Comput. Secur..
[18] William A. Pearlman,et al. A new, fast, and efficient image codec based on set partitioning in hierarchical trees , 1996, IEEE Trans. Circuits Syst. Video Technol..
[19] Marco Botta,et al. A successful attack and revision of a chaotic system based fragile watermarking scheme for image tamper detection , 2015 .
[20] Xiaoxiao Ma,et al. Reversible data hiding scheme for VQ indices based on modified locally adaptive coding and double-layer embedding strategy , 2015, J. Vis. Commun. Image Represent..
[21] Jessica Fridrich,et al. Steganography in Digital Media: References , 2009 .
[22] Wen-Chuan Wu,et al. SVD-based self-embedding image authentication scheme using quick response code features , 2016, J. Vis. Commun. Image Represent..
[23] Ching-Nung Yang,et al. Steganography and authentication in image sharing without parity bits , 2012 .
[24] Mei Yu,et al. New fragile watermarking method for stereo image authentication with localization and recovery , 2015 .