A Copy-Proof Scheme Based on the Spectral and Spatial Barcoding Channel Models
暂无分享,去创建一个
Jiwu Huang | Anselmo Ferreira | Changsheng Chen | Mulin Li | Rizhao Cai | Jiwu Huang | Changsheng Chen | Rizhao Cai | Mulin Li | Anselmo Ferreira
[1] Chih-Jen Lin,et al. LIBSVM: A library for support vector machines , 2011, TIST.
[2] Diana Adler,et al. Single Sensor Imaging Methods And Applications For Digital Cameras , 2016 .
[3] Wai Ho Mow,et al. Accurate Modeling and Efficient Estimation of the Print-Capture Channel With Application in Barcoding , 2019, IEEE Transactions on Image Processing.
[4] Rafael C. González,et al. Digital image processing, 3rd Edition , 2008 .
[5] Bill Triggs,et al. Histograms of oriented gradients for human detection , 2005, 2005 IEEE Computer Society Conference on Computer Vision and Pattern Recognition (CVPR'05).
[6] Iuliia Tkachenko,et al. Exploitation of redundancy for pattern estimation of copy-sensitive two level QR code , 2018, 2018 IEEE International Workshop on Information Forensics and Security (WIFS).
[7] Patrick Bas,et al. Document authentication using graphical codes: reliable performance analysis and channel optimization , 2014, EURASIP Journal on Information Security.
[8] Francesco Bianconi,et al. Dominant local binary patterns for texture classification: Labelled or unlabelled? , 2015, Pattern Recognit. Lett..
[9] Paolo Bestagini,et al. First Steps Toward Camera Model Identification With Convolutional Neural Networks , 2016, IEEE Signal Processing Letters.
[10] Tom Fawcett,et al. An introduction to ROC analysis , 2006, Pattern Recognit. Lett..
[11] William Puech,et al. Printed document authentication using two level or code , 2016, 2016 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).
[12] Xiangdong Liu,et al. Analysis and reduction of moire patterns in scanned halftone pictures , 1996 .
[13] Bo Chen,et al. MobileNets: Efficient Convolutional Neural Networks for Mobile Vision Applications , 2017, ArXiv.
[14] Patrick Bas,et al. Physical object authentication: Detection-theoretic comparison of natural and artificial randomness , 2016, 2016 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).
[15] Hui Kong,et al. A Generalized Laplacian of Gaussian Filter for Blob Detection and Its Applications , 2013, IEEE Transactions on Cybernetics.
[16] Yuqing Dong,et al. Three-dimensional quick response code based on inkjet printing of upconversion fluorescent nanoparticles for drug anti-counterfeiting. , 2016, Nanoscale.
[17] Marc Pic,et al. A watermarking technique to secure printed QR codes using a statistical test , 2017, 2017 IEEE Global Conference on Signal and Information Processing (GlobalSIP).
[18] Alex ChiChung Kot,et al. A two-stage quality measure for mobile phone captured 2D barcode images , 2013, Pattern Recognit..
[19] Masatoshi Okutomi,et al. Motion Blur Parameter Identification from a Linearly Blurred Image , 2007, 2007 Digest of Technical Papers International Conference on Consumer Electronics.
[20] Matti Pietikäinen,et al. Multiresolution Gray-Scale and Rotation Invariant Texture Classification with Local Binary Patterns , 2002, IEEE Trans. Pattern Anal. Mach. Intell..
[21] François Cayre,et al. Towards a realistic channel model for security analysis of authentication using graphical codes , 2013, 2013 IEEE International Workshop on Information Forensics and Security (WIFS).
[22] Olga Taran,et al. Clonability of Anti-counterfeiting Printable Graphical Codes: A Machine Learning Approach , 2019, ICASSP 2019 - 2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).
[23] Ngoc Thang Vu,et al. Densely Connected Convolutional Networks for Speech Recognition , 2018, ITG Symposium on Speech Communication.
[24] William Puech,et al. Two-Level QR Code for Private Message Sharing and Document Authentication , 2016, IEEE Transactions on Information Forensics and Security.
[25] Wai Ho Mow,et al. PiCode: A New Picture-Embedding 2D Barcode , 2016, IEEE Transactions on Image Processing.
[26] Thierry Pun,et al. Multilevel 2-D Bar Codes: Toward High-Capacity Storage Modules for Multimedia Security and Management , 2006, IEEE Trans. Inf. Forensics Secur..
[27] Wai Ho Mow,et al. RA Code: A Robust and Aesthetic Code for Resolution-Constrained Applications , 2018, IEEE Transactions on Circuits and Systems for Video Technology.
[28] Bao An Mai Hoang. Performance Analysis of an Authentication Method relying on Graphical Codes , 2014 .
[29] M. Lewis. China's Cosmopolitan Empire: The Tang Dynasty , 2009 .
[30] Hsi-Chun Wang,et al. Using Modified Digital Halftoning Technique to Design Invisible 2D Barcode by Infrared Detection , 2013 .
[31] Fernando Pérez-González,et al. A Novel Model for the Print-and-Capture Channel in 2D Bar Codes , 2006, MRCS.
[32] Anderson Rocha,et al. Laser printer attribution: exploring new features and beyond. , 2015, Forensic science international.
[33] Justin Picard. Digital authentication with copy-detection patterns , 2004, IS&T/SPIE Electronic Imaging.
[34] Fabio Roli,et al. Security Evaluation of Pattern Classifiers under Attack , 2014, IEEE Transactions on Knowledge and Data Engineering.
[35] Jian Sun,et al. Deep Residual Learning for Image Recognition , 2015, 2016 IEEE Conference on Computer Vision and Pattern Recognition (CVPR).
[36] Sun-Yuan Kung,et al. Biometric Authentication: A Machine Learning Approach , 2004 .
[37] Min Wu,et al. Counterfeit Detection Based on Unclonable Feature of Paper Using Mobile Camera , 2017, IEEE Transactions on Information Forensics and Security.
[38] 프레데릭 그레마우드,et al. Identification and authentication using liquid crystal material markings , 2009 .
[39] J. Fridrich,et al. Digital image forensics , 2009, IEEE Signal Processing Magazine.
[40] Shunzhi Zhu,et al. Anti-counterfeiting digital watermarking algorithm for printed QR barcode , 2015, Neurocomputing.