An Adaptive Curvelet Based Semi-Fragile Watermarking Scheme for Effective and Intelligent Tampering Classification and Recovery of Digital Images
暂无分享,去创建一个
[1] E. Candès,et al. New tight frames of curvelets and optimal representations of objects with piecewise C2 singularities , 2004 .
[2] Nilanjan Dey,et al. Tamper detection of electrocardiographic signal using watermarked bio–hash code in wireless cardiology , 2015 .
[3] Nilanjan Dey,et al. High Payload Watermarking using Residue Number System , 2015 .
[4] Prabhishek Singh,et al. A Survey of Digital Watermarking Techniques, Applications and Attacks , 2013 .
[5] Robyn A. Owens,et al. Feature detection from local energy , 1987, Pattern Recognit. Lett..
[6] Yoshinao Aoki,et al. Watermarking technique using computer‐generated holograms , 2001 .
[7] Jana Dittmann,et al. Hologram watermarks for document authentications , 2001, Proceedings International Conference on Information Technology: Coding and Computing.
[8] Ajith Abraham,et al. Computational Intelligence in Digital Forensics , 2014, Computational Intelligence in Digital Forensics.
[9] Yun-Qing Shi,et al. Secure Semi-Fragile Watermarking for Image Authentication Based on Parameterized Integer Wavelet , 2006 .
[10] Xiangyang Wang,et al. A feature-based robust digital image watermarking scheme using bandelet transform , 2011 .
[11] Mohamed-Jalal Fadili,et al. Numerical Issues When Using Wavelets , 2009, Encyclopedia of Complexity and Systems Science.
[12] David Zhang,et al. FSIM: A Feature Similarity Index for Image Quality Assessment , 2011, IEEE Transactions on Image Processing.
[13] Shing-Chi Cheung,et al. The Use of Digital Watermarking for Intelligence Multimedia Document Distribution , 2008, J. Theor. Appl. Electron. Commer. Res..
[14] Vishal Shrivastava,et al. A Novel Digital Watermarking Technique based on Feature Attribute Selection using Integer Wavelet Transform Function and ID3 Algorithm , 2014 .
[15] Giuseppe Schirripa Spagnolo,et al. Fragile digital watermarking by synthetic holograms , 2004, SPIE Security + Defence.
[16] Riyad Alshammari,et al. Using Neuro-Fuzzy Approach to Reduce False Positive Alerts , 2007, Fifth Annual Conference on Communication Networks and Services Research (CNSR '07).
[17] Jiwu Huang,et al. Reversible Semi-fragile Image Authentication Using Zernike Moments and Integer Wavelet Transform , 2005, DRMTICS.
[18] Shih-Fu Chang,et al. New semi-fragile image authentication watermarking techniques using random bias and nonuniform quantization , 2006, IEEE Trans. Multim..
[19] Nilanjan Dey,et al. Feature analysis for the blind-watermarked electroencephalogram signal in wireless telemonitoring using Alattar's method , 2012, SIN '12.
[20] D. Burr,et al. Mach bands are phase dependent , 1986, Nature.
[21] Lakhmi C. Jain,et al. Intelligent Watermarking Techniques: (With CD-ROM) , 2004 .
[22] Pao-Ta Yu,et al. Digital watermarking based on neural networks for color images , 2001, Signal Process..
[23] Nidhi Chandrakar,et al. Study and comparison of various image edge detection techniques , 2012 .
[24] Long-Wen Chang,et al. Semi-fragile watermarking for image authentication, localization, and recovery using Tchebichef moments , 2010, 2010 10th International Symposium on Communications and Information Technologies.
[25] S. Nirmala,et al. A New Curvelet Based Blind Semi-fragile Watermarking Scheme for Authentication and Tamper Detection of Digital Images , 2016 .
[26] V. Groza,et al. A dynamic fuzzy logic approach to adaptive HVS-based watermarking , 2005, IEEE International Workshop on Haptic Audio Visual Environments and their Applications.
[27] Jaejin Lee,et al. A watermarking sequence using parities of error control coding for image authentication and correction , 2000, IEEE Trans. Consumer Electron..
[28] Luc Van Gool,et al. Speeded-Up Robust Features (SURF) , 2008, Comput. Vis. Image Underst..
[29] N. Dey,et al. Feature analysis for the reversible watermarked electrooculography signal using Low distortion Prediction-error Expansion , 2012, 2012 International Conference on Communications, Devices and Intelligent Systems (CODIS).
[30] Nilanjan Dey,et al. Reversible Color Image Watermarking Using Trigonometric Functions , 2014, 2014 International Conference on Electronic Systems, Signal Processing and Computing Technologies.
[31] D. Burr,et al. Feature detection in human vision: a phase-dependent energy model , 1988, Proceedings of the Royal Society of London. Series B. Biological Sciences.
[32] Xingyuan Wang,et al. A novel image recovery method based on discrete cosine transform and matched blocks , 2013 .
[33] Sheli Sinha Chaudhuri,et al. Lifting Wavelet Transformation based blind watermarking technique of Photoplethysmographic signals in wireless telecardiology , 2012, 2012 World Congress on Information and Communication Technologies.
[34] Nilanjan Dey,et al. Particle Swarm Optimization based parameter optimization technique in medical information hiding , 2013, 2013 IEEE International Conference on Computational Intelligence and Computing Research.
[35] Ingemar J. Cox,et al. Watermarking applications and their properties , 2000, Proceedings International Conference on Information Technology: Coding and Computing (Cat. No.PR00540).
[36] Chang-Tsun Li. Multimedia Forensics and Security , 2008 .
[37] Desmond C. McLernon,et al. Using Curvelet transform for watermarking based on amplitude modulation , 2013, Signal, Image and Video Processing.
[38] Yun Q. Shi,et al. A Semi-Fragile Lossless Digital Watermarking Scheme Based on Integer Wavelet Transform , 2006, IEEE Transactions on Circuits and Systems for Video Technology.
[39] Lianping Chen,et al. Effects of different Gabor filters parameters on image retrieval by texture , 2004, 10th International Multimedia Modelling Conference, 2004. Proceedings..
[40] Jeng-Shyang Pan,et al. Genetic watermarking based on transform-domain techniques , 2004, Pattern Recognit..
[41] N. Dey,et al. DWT-DCT-SVD based intravascular ultrasound video watermarking , 2012, 2012 World Congress on Information and Communication Technologies.
[42] Edward K. Wong,et al. Recent developments in document image watermarking and data hiding , 2001, SPIE ITCom.
[43] Laurent Demanet,et al. Fast Discrete Curvelet Transforms , 2006, Multiscale Model. Simul..
[44] Chun-Shien Lu,et al. Multimedia Security: Steganography and Digital Watermarking Techniques for Protection of Intellectual Property , 2004 .
[45] Ming-Shi Wang,et al. A fuzzy c-means clustering-based fragile watermarking scheme for image authentication , 2009, Expert Syst. Appl..