Information theoretic approach to the authentication of multimedia
暂无分享,去创建一个
[1] Ahmed H. Tewfik,et al. Multimedia data-embedding and watermarking technologies , 1998, Proc. IEEE.
[2] Min Wu,et al. Watermarking for image authentication , 1998, Proceedings 1998 International Conference on Image Processing. ICIP98 (Cat. No.98CB36269).
[3] Gregory W. Wornell,et al. Digital watermarking and information embedding using dither modulation , 1998, 1998 IEEE Second Workshop on Multimedia Signal Processing (Cat. No.98EX175).
[4] Ping Wah Wong,et al. A public key watermark for image verification and authentication , 1998, Proceedings 1998 International Conference on Image Processing. ICIP98 (Cat. No.98CB36269).
[5] Tiago Rosa Maria Paula Queluz. Towards robust, content based techniques for image authentication , 1998, 1998 IEEE Second Workshop on Multimedia Signal Processing (Cat. No.98EX175).
[6] Shih-Fu Chang,et al. A robust content based digital signature for image authentication , 1996, Proceedings of 3rd IEEE International Conference on Image Processing.
[7] Sushil K. Bhattacharjee,et al. Compression tolerant image authentication , 1998, Proceedings 1998 International Conference on Image Processing. ICIP98 (Cat. No.98CB36269).
[8] Gary Friedman,et al. The trustworthy digital camera: restoring credibility to the photographic image , 1993 .
[9] G. Ungerboeck,et al. Trellis-coded modulation with redundant signal sets Part II: State of the art , 1987, IEEE Communications Magazine.
[10] Michael W. Marcellin,et al. Trellis coded quantization of memoryless and Gauss-Markov sources , 1990, IEEE Trans. Commun..
[11] Deepa Kundur,et al. Digital watermarking for telltale tamper proofing and authentication , 1999, Proc. IEEE.
[12] Emin Martinian,et al. Authenticating multimedia in the presence of noise , 2000 .