A robust multimedia authentication and restoration scheme in digital photography
暂无分享,去创建一个
[1] Marian Cristian Mihaescu,et al. Two Spatial Watermarking Techniques for Digital Images , 2010 .
[2] Yu-Chee Tseng,et al. Secure and invisible data hiding in 2-color images , 2001, Proceedings IEEE INFOCOM 2001. Conference on Computer Communications. Twentieth Annual Joint Conference of the IEEE Computer and Communications Society (Cat. No.01CH37213).
[3] Azizah Abdul Manaf,et al. Efficient Digital Image Authentication and Tamper Localization Technique Using 3Lsb Watermarking , 2012 .
[4] Chin-Chen Chang,et al. Reversible Data Hiding Based on Histogram Modification of Pixel Differences , 2009, IEEE Transactions on Circuits and Systems for Video Technology.
[5] Dasu Vaman Ravi Prasad. An Improved Invisible Watermarking Technique for Image Authentication , 2013 .
[6] Sushil Jajodia,et al. Information Hiding: Steganography and Steganalysis , 2005 .
[7] Yu-Chee Tseng,et al. A secure data hiding scheme for two-color images , 2000, Proceedings ISCC 2000. Fifth IEEE Symposium on Computers and Communications.
[8] Chin-Chen Chang,et al. Self-embedding fragile watermarking with restoration capability based on adaptive bit allocation mechanism , 2012, Signal Process..
[9] M. L. Valarmathi,et al. A Study on Watermarking Schemes for Image Authentication , 2010 .
[10] Asifullah Khan,et al. Authentication and recovery of images using multiple watermarks , 2010, Comput. Electr. Eng..
[11] Xingming Sun,et al. Semi-Fragile Watermarking for Image Authentication and Tamper Detection Using HVS Model , 2007, 2007 International Conference on Multimedia and Ubiquitous Engineering (MUE'07).
[12] Leonidas J. Guibas,et al. The Earth Mover's Distance as a Metric for Image Retrieval , 2000, International Journal of Computer Vision.
[13] Matthew J. B. Robshaw,et al. The Cryptanalysis of the AES - A Brief Survey , 2004, AES Conference.
[14] Po-Whei Huang,et al. A hierarchical digital watermarking method for image tamper detection and recovery , 2005, Pattern Recognit..
[15] Weilin Huang,et al. Watermarking-based content authentication of motion-JPEG sequences , 2008 .
[16] Frank Y. Shih. Multimedia security : watermarking, steganography, and forensics , 2012 .
[17] Edward J. Delp,et al. Detection of image alterations using semifragile watermarks , 2000, Electronic Imaging.
[18] Christof Paar,et al. Introduction to Cryptography and Data Security , 2010 .
[19] Asifullah Khan,et al. Wavelet Based Image Authentication and Recovery , 2007, Journal of Computer Science and Technology.
[20] Mohamed Ali Hajjaji,et al. A Watermarking of Medical Image: Method Based "LSB" , 2011 .
[21] James Ze Wang,et al. Studying Aesthetics in Photographic Images Using a Computational Approach , 2006, ECCV.
[22] Alessandro Piva,et al. Cryptography and Data Hiding for Media Security , 2008 .
[23] Feng Bao,et al. Evaluating Ouda's Tamper-Localization Watermarking Scheme , 2007, 2007 IEEE International Conference on Multimedia and Expo.
[24] Darko Kirovski,et al. Protection of Multimedia Content in Distribution Networks , 2006 .
[25] Asifullah Khan,et al. A Secure Semi-Fragile Watermarking Scheme for Authentication and Recovery of Images based on Wavelet Transform , 2008 .
[26] Lakhmi C. Jain,et al. Multimedia Services in Intelligent Environments: Advanced Tools and Methodologies , 2008 .
[27] A. Randall. A Novel Semi-Fragile Watermarking Scheme with Iterative Restoration , 2009 .
[28] Ahmed Al-Jaber,et al. A Fragile Watermarking Algorithm for Content Authentication , 2005 .
[29] Jun Tian,et al. Wavelet-based reversible watermarking for authentication , 2002, IS&T/SPIE Electronic Imaging.
[30] Adam Finkelstein,et al. The PatchMatch randomized matching algorithm for image manipulation , 2011, Commun. ACM.
[31] Chang-Tsun Li,et al. Image integrity and authenticity verification via content-based watermarks and a public key cryptosystem , 2003 .
[32] Kun Ho Lee,et al. Aesthetic Score Assessment based on Generic Features in Digital Photography Sidra , 2012 .
[33] Xinpeng Zhang,et al. Fragile Watermarking With Error-Free Restoration Capability , 2008, IEEE Transactions on Multimedia.
[34] Ali N. Akansu,et al. CHAPTER 3 – Communication with Side Information and Data Hiding , 2004 .
[35] Shih-Fu Chang,et al. Semifragile watermarking for authenticating JPEG visual content , 2000, Electronic Imaging.
[36] D. Sathik,et al. An Improved Invisible Watermarking Technique for Image Authentication , 2010 .
[37] Kuo-Ming Hung,et al. Automatic image authentication and recovery using multiple watermarks , 2012, 2012 8th International Conference on Information Science and Digital Content Technology (ICIDT2012).