Tamper proofing mechanisms for motion capture data
暂无分享,去创建一个
[1] Colin Perkins,et al. A survey of packet loss recovery techniques for streaming audio , 1998 .
[2] Ingemar J. Cox,et al. Digital Watermarking , 2003, Lecture Notes in Computer Science.
[3] Boon-Lock Yeo,et al. Fragile watermarking of three-dimensional objects , 1998, Proceedings 1998 International Conference on Image Processing. ICIP98 (Cat. No.98CB36269).
[4] Deepa Kundur,et al. Digital watermarking for telltale tamper proofing and authentication , 1999, Proc. IEEE.
[5] Zixiang Xiong,et al. Error concealment of MPEG-2 AAC audio using modulo watermarks , 2002, 2002 IEEE International Symposium on Circuits and Systems. Proceedings (Cat. No.02CH37353).
[6] Hao-Tian Wu,et al. A fragile watermarking scheme for 3D meshes , 2005, MM&Sec '05.
[7] Christian S. Collberg,et al. Watermarking, Tamper-Proofing, and Obfuscation-Tools for Software Protection , 2002, IEEE Trans. Software Eng..
[8] Bruce S. Davie,et al. Computer Networks: A Systems Approach , 1996 .
[9] Jaejin Lee,et al. A watermarking sequence using parities of error control coding for image authentication and correction , 2000, IEEE Trans. Consumer Electron..
[10] C.-C.J. Kuo,et al. Fragile speech watermarking for content integrity verification , 2002, 2002 IEEE International Symposium on Circuits and Systems. Proceedings (Cat. No.02CH37353).
[11] Parag Agarwal,et al. SVD-based tamper proofing of multi-attribute motion data , 2006 .
[12] Sushil Jajodia,et al. Fingerprinting relational databases: schemes and specialties , 2005, IEEE Transactions on Dependable and Secure Computing.
[13] A. Aydin Alatan,et al. Error concealment of video sequences by data hiding , 2003, Proceedings 2003 International Conference on Image Processing (Cat. No.03CH37429).
[14] V. Hardman,et al. A survey of packet loss recovery techniques for streaming audio , 1998, IEEE Network.
[15] J. Bibb Cain,et al. Error-Correction Coding for Digital Communications , 1981 .
[16] Philip Ogunbona,et al. Fragile Watermark on Critical Points , 2002 .
[17] Edward J. Delp,et al. A Review of Fragile Image Watermarks , 2007 .
[18] Chun-Shien Lu. Wireless multimedia error resilience via a data hiding technique , 2002, 2002 IEEE Workshop on Multimedia Signal Processing..
[19] Bruce S. Davie,et al. Computer Networks: A Systems Approach, 3rd Edition , 2003 .
[20] Gregory W. Wornell,et al. Quantization index modulation: A class of provably good methods for digital watermarking and information embedding , 2001, IEEE Trans. Inf. Theory.
[21] B. Prabhakaran,et al. Tamper Proofing 3D Motion Data Streams , 2007, MMM.
[22] Hitoshi Kiya,et al. Error Concealment Using a Digital Watermarking Technique for Interframe Video Coding , 2002 .
[23] Henri Maitre,et al. Watermarking 3D triangle meshes for authentication and integrity , 2004 .
[24] Jiri Fridrich,et al. New fragile authentication watermark for images , 2000, Proceedings 2000 International Conference on Image Processing (Cat. No.00CH37101).