Authentication and recovery of images using multiple watermarks
暂无分享,去创建一个
[1] Franco Bartolini,et al. Self Recovery Authentication Of Images In The Dwt Domain , 2005, Int. J. Image Graph..
[2] Asifullah Khan,et al. Genetic perceptual shaping: Utilizing cover image and conceivable attack information during watermark embedding , 2007, Inf. Fusion.
[3] Deepa Kundur,et al. Digital watermarking for telltale tamper proofing and authentication , 1999, Proc. IEEE.
[4] Lakhmi C. Jain,et al. Multiuser-based shadow watermark extraction system , 2007, Inf. Sci..
[5] Asifullah Khan,et al. Wavelet Based Image Authentication and Recovery , 2007, Journal of Computer Science and Technology.
[6] Tung-Shou Chen,et al. Image tamper detection and recovery system based on discrete wavelet transformation , 2001, 2001 IEEE Pacific Rim Conference on Communications, Computers and Signal Processing (IEEE Cat. No.01CH37233).
[7] Nasir D. Memon,et al. Counterfeiting attacks on oblivious block-wise independent invisible watermarking schemes , 2000, IEEE Trans. Image Process..
[8] Tae-Sun Choi,et al. Machine learning based adaptive watermark decoding in view of anticipated attack , 2008, Pattern Recognit..
[9] Chang-Tsun Li. Digital Watermarking Schemes for Multimedia Authentication , 2008 .
[10] S.Y. Yang,et al. A novel semi-fragile watermarking technique for image authentication , 2004, Proceedings 7th International Conference on Signal Processing, 2004. Proceedings. ICSP '04. 2004..
[11] Martin Steinebach,et al. Semi-Fragile Watermarking for Image Authentication with High Tampering Localization Capability , 2006, 2006 Second International Conference on Automated Production of Cross Media Content for Multi-Channel Distribution (AXMEDIS'06).
[12] Malay Kumar Kundu,et al. Dual purpose FWT domain spread spectrum image watermarking in real time , 2009, Comput. Electr. Eng..
[13] Kôki Abe,et al. A Semi-Fragile Watermarking Scheme Using Weighted Vote with Sieve and Emphasis for Image Authentication , 2007, IEICE Trans. Fundam. Electron. Commun. Comput. Sci..
[14] Chang-Tsun Li,et al. Semi-fragile watermarking scheme for authentication of JPEG images , 2004, International Conference on Information Technology: Coding and Computing, 2004. Proceedings. ITCC 2004..
[15] Hongtao Lu,et al. Robust watermarking based on DWT and nonnegative matrix factorization , 2009, Comput. Electr. Eng..
[16] Deepa Kundur,et al. Analysis and design of secure watermark-based authentication systems , 2006, IEEE Transactions on Information Forensics and Security.