A Novel Approach for Securing Forensic Documents Using Rectangular Region-of-Interest (RROI)
暂无分享,去创建一个
[1] Ira S. Moskowitz,et al. Composite signature based watermarking for fingerprint authentication , 2005, MM&Sec '05.
[2] Shikha Tripathi,et al. Novel DCT and DWT based Watermarking Techniques for Digital Images , 2006, 18th International Conference on Pattern Recognition (ICPR'06).
[3] Ingemar J. Cox,et al. Secure spread spectrum watermarking for multimedia , 1997, IEEE Trans. Image Process..
[4] Kang Hui,et al. Study on Implementation of a Fingerprint Watermark , 2008, 2008 International Conference on Computer Science and Software Engineering.
[5] Jeng-Shyang Pan,et al. Multipurpose Image Watermarking Method Based on Mean-removed Vector Quantization , 2006 .
[6] Young-Chang Hou,et al. Copyright protection scheme for digital images using visual cryptography and sampling methods , 2005 .
[7] Ioannis Pitas,et al. Region-based image watermarking , 2001, IEEE Trans. Image Process..
[8] Bernd Girod,et al. Spread spectrum watermarking: malicious attacks and counterattacks , 1999, Electronic Imaging.
[9] Yuan-Pei Lin,et al. Wavelet tree quantization for copyright protection watermarking , 2004, IEEE Transactions on Image Processing.
[10] Wen-Liang Hwang,et al. An asymmetric subspace watermarking method for copyright protection , 2005, IEEE Trans. Signal Process..
[11] Ching-Yung Lin. Watermarking and Digital Signature Techniques for Multimedia Authentication and Copyright Protection , 2000 .