Enhancing the Binary Watermark-Based Data Hiding Scheme Using an Interpolation-Based Approach for Optical Remote Sensing Images
暂无分享,去创建一个
[1] Ming Li,et al. Cryptanalysis and improvement of a binary watermark-based copyright protection scheme for remote sensing images , 2014 .
[2] Gwanggil Jeon,et al. A game theory-based block image compression method in encryption domain , 2015, The Journal of Supercomputing.
[3] Honggang Wang. Communication-resource-aware adaptive watermarking for multimedia authentication in wireless multimedia sensor networks , 2010, The Journal of Supercomputing.
[4] Mohammad Reza Khosravi,et al. A novel fake color scheme based on depth protection for MR passive/optical sensors , 2015, 2015 2nd International Conference on Knowledge-Based Engineering and Innovation (KBEI).
[5] Habib Rostami,et al. Pgu-Face: A dataset of partially covered facial images , 2016, Data in brief.
[6] Qing Chen,et al. A Digital Watermarking Algorithm Based on Characters of the Remote-Sensing Imagery , 2010, 2010 International Conference on Management and Service Science.
[7] Quan Zhou,et al. Robust Reversible Data Hiding for Multispectral Images , 2014, J. Networks.
[8] Habib Rostami,et al. An introduction to ENVI tools for Synthetic Aperture Radar (SAR) image despeckling and quantitative comparison of denoising filters , 2017, 2017 IEEE International Conference on Power, Control, Signals and Instrumentation Engineering (ICPCSI).
[9] A. S. Belward,et al. Who launched what, when and why; trends in global land-cover observation capacity from civilian earth observation satellites , 2015 .
[10] Xiao Zeng,et al. Reversible Image Watermarking Using Interpolation Technique , 2010, IEEE Transactions on Information Forensics and Security.
[11] Ki-Hyun Jung,et al. Data hiding method using image interpolation , 2009, Comput. Stand. Interfaces.
[12] Turker Ince,et al. Unsupervised classification of polarimetric SAR image with dynamic clustering: An image processing approach , 2010, Adv. Eng. Softw..
[13] Jian Cao,et al. Controllable Secure Watermarking Technique for Tradeoff Between Robustness and Security , 2012, IEEE Transactions on Information Forensics and Security.
[14] Hao Luo,et al. Blind image watermarking based on discrete fractional random transform and subsampling , 2011 .
[15] Habib Rostami,et al. Efficient routing for dense UWSNs with high-speed mobile nodes using spherical divisions , 2017, The Journal of Supercomputing.
[16] Habib Rostami,et al. Energy efficient spherical divisions for VBF-based routing in dense UWSNs , 2015, 2015 2nd International Conference on Knowledge-Based Engineering and Innovation (KBEI).
[17] Mohammad Reza Khosravi,et al. Determining the optimal range of angle tracking radars , 2017, 2017 IEEE International Conference on Power, Control, Signals and Instrumentation Engineering (ICPCSI).
[18] Mohammad Kazem Moghimi,et al. Theoretical Evaluation of Li et al.'s Approach for Improving a Binary Watermark-Based Scheme in Remote Sensing Data Communications , 2017, ArXiv.
[19] Jordi Serra-Ruiz,et al. DWT and TSVQ-based Semi-fragile Watermarking Scheme for Tampering Detection in Remote Sensing Images , 2010, 2010 Fourth Pacific-Rim Symposium on Image and Video Technology.
[20] Peng Zhu,et al. A copyright protection watermarking algorithm for remote sensing image based on binary image watermark , 2013 .
[21] Mohammad Reza Khosravi,et al. Statistical Image Fusion for HR Band Colorization in Landsat Sensors , 2015 .
[22] Zhengquan Xu,et al. A new comprehensive security protection for remote sensing image based on the integration of encryption and watermarking , 2013, 2013 IEEE International Geoscience and Remote Sensing Symposium - IGARSS.
[23] Aloka Sinha,et al. Digital image watermarking using gyrator transform and chaotic maps , 2010 .