Content-Based Watermarking for Image Authentication Using Independent Component Analysis
暂无分享,去创建一个
[1] James V. Stone. Independent component analysis: an introduction , 2002, Trends in Cognitive Sciences.
[2] Bogdan Matei,et al. A Review of Independent Component Analysis Techniques , 2022 .
[3] R. M. Everson,et al. Independent Component Analysis: Introduction , 2001 .
[4] Chai Wah Wu. Limitations and requirements of content-based multimedia authentication systems , 2001, IS&T/SPIE Electronic Imaging.
[5] Qiuqi Ruan,et al. Secure semi-blind watermarking based on iteration mapping and image features , 2005, Pattern Recognit..
[6] Marco Ferretti,et al. A taxonomy for image authentication techniques and its application to the current state of the art , 2001, Proceedings 11th International Conference on Image Analysis and Processing.
[7] Juan José Murillo-Fuentes,et al. Independent component analysis applied to digital image watermarking , 2001, 2001 IEEE International Conference on Acoustics, Speech, and Signal Processing. Proceedings (Cat. No.01CH37221).
[8] Franco Bartolini,et al. Standard metadata embedding in a digital image , 2003, 14th International Workshop on Database and Expert Systems Applications, 2003. Proceedings..
[9] Nasir D. Memon,et al. Distortion-bounded authentication techniques , 2000, Electronic Imaging.
[10] David Saad,et al. ICA for Watermarking Digital Images , 2003, J. Mach. Learn. Res..
[11] Yen-Wei Chen,et al. Robust multi-logo watermarking by RDWT and ICA , 2006, Signal Process..
[12] Ingemar J. Cox,et al. Digital Watermarking , 2003, Lecture Notes in Computer Science.
[13] Edward J. Delp,et al. Detection of image alterations using semifragile watermarks , 2000, Electronic Imaging.
[14] Ju Liu,et al. A DIGITAL WATERMARKING SCHEME BASED ON ICA DETECTION , 2003 .
[15] Arto Kaarna,et al. Watermarking Spectral Images Through the PCA Transform , 2003, PICS.
[16] Won-Hyung Lee,et al. A Robust Image Watermarking Technique for JPEG Images Using QuadTrees , 2004, PCM.
[17] Kai-Kuang Ma,et al. Watermark Detection and Extraction Using Independent Component Analysis Method , 2002, EURASIP J. Adv. Signal Process..
[18] Chang-Tsun Li,et al. Image authentication and integrity verification via content-based watermarks and a public key cryptosystem , 2000, Proceedings 2000 International Conference on Image Processing (Cat. No.00CH37101).
[19] Alex ChiChung Kot,et al. Binary Image Authentication With Tampering Localization by Embedding Cryptographic Signature and Block Identifier , 2006, IEEE Signal Processing Letters.
[20] Po-Whei Huang,et al. A fragile watermarking scheme for image authentication with localization and recovery , 2004, IEEE Sixth International Symposium on Multimedia Software Engineering.
[21] Liu Ju. A Digital Watermarking Scheme Based on ICA , 2003 .
[22] Chai Wah Wu,et al. On the design of content-based multimedia authentication systems , 2002, IEEE Trans. Multim..
[23] Shih-Fu Chang,et al. A robust content based digital signature for image authentication , 1996, Proceedings of 3rd IEEE International Conference on Image Processing.
[24] Minfen Shen,et al. A METHOD FOR DIGITAL IMAGE WATERMARKING USING ICA , 2003 .
[25] Aapo Hyvärinen,et al. Survey on Independent Component Analysis , 1999 .
[26] Jagdish Chandra Patra,et al. Digital Image Watermarking Using Independent Component Analysis , 2004, PCM.