Region-based tampering detection and recovery using homogeneity analysis in quality-sensitive imaging
暂无分享,去创建一个
[1] Ingemar J. Cox,et al. Digital Watermarking and Steganography , 2014 .
[2] U. Rajendra Acharya,et al. Compact storage of medical images with patient information , 2001, IEEE Transactions on Information Technology in Biomedicine.
[3] Jun Tian,et al. Reversible data embedding using a difference expansion , 2003, IEEE Trans. Circuits Syst. Video Technol..
[4] H. K. Huang,et al. Authenticity and integrity of digital mammography images , 2001, IEEE Transactions on Medical Imaging.
[5] A Secret Key Based Multiscale Fragile Watermark in the Wavelet Domain , 2006, 2006 IEEE International Conference on Multimedia and Expo.
[6] Tian-ge Zhuang,et al. A Region-Based Lossless Watermarking Scheme for Enhancing Security of Medical Data , 2009, Journal of Digital Imaging.
[7] Mehdi Fallahpour,et al. Reversible image data hiding based on gradient adjusted prediction , 2008, IEICE Electron. Express.
[8] Jeffrey J. Rodríguez,et al. Expansion Embedding Techniques for Reversible Watermarking , 2007, IEEE Transactions on Image Processing.
[9] Christophe De Vleeschouwer,et al. Circular interpretation of bijective transformations in lossless watermarking for media asset management , 2003, IEEE Trans. Multim..
[10] Chun-Shien Lu,et al. Mean-quantization-based fragile watermarking for image authentication , 2001 .
[11] Min Wu,et al. Multimedia Data Hiding , 2003, Springer New York.
[12] Alan C. Bovik,et al. Mean squared error: Love it or leave it? A new look at Signal Fidelity Measures , 2009, IEEE Signal Processing Magazine.
[13] Po-Whei Huang,et al. A hierarchical digital watermarking method for image tamper detection and recovery , 2005, Pattern Recognit..
[14] Ruey-Feng Chang,et al. Tamper Detection and Restoring System for Medical Images Using Wavelet-based Reversible Data Embedding , 2008, Journal of Digital Imaging.
[15] Wei Su,et al. Reversible data hiding , 2006, IEEE Transactions on Circuits and Systems for Video Technology.
[16] Shinfeng D. Lin,et al. Dual watermark for image tamper detection and recovery , 2008, Pattern Recognit..
[17] Chin-Chen Chang,et al. A watermarking-based image ownership and tampering authentication scheme , 2006, Pattern Recognit. Lett..