Information-theoretic analysis of electronic and printed document authentication
暂无分享,去创建一个
Thierry Pun | Sviatoslav Voloshynovskiy | Oleksiy J. Koval | Frédéric Deguillaume | Renato Villán | Emre Topak | Yuriy B. Rytsar | José-Emilio Vila-Forcén
[1] Fernando Pérez-González,et al. Fundamentals of Data Hiding Security and Their Application to Spread-Spectrum Analysis , 2005, Information Hiding.
[2] Thierry Pun,et al. Multilevel 2-D Bar Codes: Toward High-Capacity Storage Modules for Multimedia Security and Management , 2006, IEEE Trans. Inf. Forensics Secur..
[3] Jessica J. Fridrich. Visual hash for oblivious watermarking , 2000, Electronic Imaging.
[4] Thierry Pun,et al. Protocols for data-hiding based text document security and automatic processing , 2005, 2005 IEEE International Conference on Multimedia and Expo.
[5] Thierry Pun,et al. A Theoretical Framework for Data-Hiding in Digital and Printed Text Documents , 2005, Communications and Multimedia Security.
[6] Giorgio Bonmassar,et al. Space-Variant Fourier Analysis: The Exponential Chirp Transform , 1997, IEEE Trans. Pattern Anal. Mach. Intell..
[7] Min Wu,et al. Watermarking for image authentication , 1998, Proceedings 1998 International Conference on Image Processing. ICIP98 (Cat. No.98CB36269).
[8] Min Wu,et al. Security of feature extraction in image hashing , 2005, Proceedings. (ICASSP '05). IEEE International Conference on Acoustics, Speech, and Signal Processing, 2005..
[9] Thomas M. Cover,et al. Elements of Information Theory , 2005 .
[10] Thierry Pun,et al. Multilevel 2-D Bar Codes: Toward High-Capacity Storage Modules for Multimedia Security and Management , 2005, IEEE Transactions on Information Forensics and Security.
[11] Sushil K. Bhattacharjee,et al. Compression tolerant image authentication , 1998, Proceedings 1998 International Conference on Image Processing. ICIP98 (Cat. No.98CB36269).
[12] Ueli Maurer. A Unified and Generalized Treatment of Authentification Theory , 1996, STACS.
[13] Ying Wang,et al. Steganalysis of block-structured stegotext , 2004, IS&T/SPIE Electronic Imaging.
[14] Thierry Pun,et al. Secure hybrid robust watermarking resistant against tampering and copy attack , 2003, Signal Process..
[15] C. Fontaine,et al. Watermarking security: theory and practice , 2005, IEEE Transactions on Signal Processing.
[16] Toby Berger,et al. Rate distortion theory : a mathematical basis for data compression , 1971 .
[17] Bernd Girod,et al. Blind watermarking applied to image authentication , 2001, 2001 IEEE International Conference on Acoustics, Speech, and Signal Processing. Proceedings (Cat. No.01CH37221).
[18] Sviatoslav Voloshynovskiy,et al. Watermark copy attack , 2000, Electronic Imaging.
[19] Thierry Pun,et al. On Reversibility of Random Binning Techniques: Multimedia Perspectives , 2005, Communications and Multimedia Security.
[20] Min Wu,et al. Image hashing resilient to geometric and filtering operations , 2004, IEEE 6th Workshop on Multimedia Signal Processing, 2004..
[21] James H. Burrows,et al. Secure Hash Standard , 1995 .
[22] Fernando Pérez-González,et al. Information-Theoretic Analysis of Security in Side-Informed Data Hiding , 2005, Information Hiding.
[23] Deepa Kundur,et al. Analysis and design of authentication watermarking , 2004, IS&T/SPIE Electronic Imaging.
[24] Dirk Fox,et al. Advanced Encryption Standard (AES) , 1999, Datenschutz und Datensicherheit.
[25] U. Maurer. A Uniied and Generalized Treatment of Authentication Theory , 1996 .
[26] Ronald L. Rivest,et al. The MD5 Message-Digest Algorithm , 1992, RFC.
[27] Joseph A. O'Sullivan,et al. Information-theoretic analysis of information hiding , 2003, IEEE Trans. Inf. Theory.
[28] Xuejia Lai,et al. A Proposal for a New Block Encryption Standard , 1991, EUROCRYPT.
[29] Christian Cachin,et al. An information-theoretic model for steganography , 1998, Inf. Comput..