A watermarking-based image ownership and tampering authentication scheme
暂无分享,去创建一个
[1] Shih-Fu Chang,et al. A robust image authentication method distinguishing JPEG compression from malicious manipulation , 2001, IEEE Trans. Circuits Syst. Video Technol..
[2] Chai Wah Wu,et al. On the design of content-based multimedia authentication systems , 2002, IEEE Trans. Multim..
[3] Chin-Ming Hsu,et al. A data-hiding technique with authentication, integration, and confidentiality for electronic patient records , 2002, IEEE Transactions on Information Technology in Biomedicine.
[4] C. F. Osborne,et al. A digital watermark , 1994, Proceedings of 1st International Conference on Image Processing.
[5] Bernd Girod,et al. Blind watermarking applied to image authentication , 2001, 2001 IEEE International Conference on Acoustics, Speech, and Signal Processing. Proceedings (Cat. No.01CH37221).
[6] P. Barreto,et al. Toward secure public-key blockwise fragile authentication watermarking , 2002 .
[7] Tiago Rosa Maria Paula Queluz. Authentication of digital images and video: Generic models and a new contribution , 2001, Signal processing. Image communication.
[8] Ronald L. Rivest,et al. The MD5 Message-Digest Algorithm , 1992, RFC.
[9] Edward J. Delp,et al. A watermark for digital images , 1996, Proceedings of 3rd IEEE International Conference on Image Processing.
[10] A. Murat Tekalp,et al. Hierarchical watermarking for secure image authentication with localization , 2002, IEEE Trans. Image Process..
[11] Nikolaos G. Bourbakis,et al. Lossless compression and information hiding in images , 2004, Pattern Recognit..
[12] Chih-Hung Lin,et al. Applying projection and B-spline to image authentication and remedy , 2003, IEEE Trans. Consumer Electron..
[13] Chun-Shien Lu,et al. Structural digital signature for image authentication: an incidental distortion resistant scheme , 2003, IEEE Trans. Multim..
[14] Nasir Memon,et al. Secret and public key image watermarking schemes for image authentication and ownership verification , 2001, IEEE Trans. Image Process..
[15] Ping Wah Wong,et al. A public key watermark for image verification and authentication , 1998, Proceedings 1998 International Conference on Image Processing. ICIP98 (Cat. No.98CB36269).
[16] Chin-Chen Chang,et al. Using set partitioning in hierarchical trees to authenticate digital images , 2003, Signal Process. Image Commun..