Spatial models for localization of image tampering using distributed source codes
暂无分享,去创建一个
[1] Bernd Girod,et al. Image Authentication Based on Distributed Source Coding , 2007, 2007 IEEE International Conference on Image Processing.
[2] Bernd Girod,et al. Rate-adaptive codes for distributed source coding , 2006, Signal Process..
[3] Bernd Girod,et al. Blind watermarking applied to image authentication , 2001, 2001 IEEE International Conference on Acoustics, Speech, and Signal Processing. Proceedings (Cat. No.01CH37221).
[4] L. Baum,et al. A Maximization Technique Occurring in the Statistical Analysis of Probabilistic Functions of Markov Chains , 1970 .
[5] Jack K. Wolf,et al. Noiseless coding of correlated information sources , 1973, IEEE Trans. Inf. Theory.
[6] Markus Flierl,et al. Distributed Grayscale Stereo Image Coding with Unsupervised Learning of Disparity , 2007, 2007 Data Compression Conference (DCC'07).
[7] Edward J. Delp,et al. A watermark for digital images , 1996, Proceedings of 3rd IEEE International Conference on Image Processing.
[8] Sergey Yekhanin,et al. Secure Biometrics Via Syndromes , 2005 .
[9] Whitfield Diffie,et al. New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.
[10] Bernd Girod,et al. Exploiting spatial correlation in pixel-domain distributed image compression , 2006 .
[11] Bernd Girod,et al. Image Authentication and Tampering Localization using Distributed Source Coding , 2007, 2007 IEEE 9th Workshop on Multimedia Signal Processing.
[12] Zixiang Xiong,et al. Compression of binary sources with side information at the decoder using LDPC codes , 2002, IEEE Communications Letters.
[13] Chun-Shien Lu,et al. Structural digital signature for image authentication: an incidental distortion resistant scheme , 2000, MULTIMEDIA '00.
[14] Kannan Ramchandran,et al. On Compression of Encrypted Images , 2006, 2006 International Conference on Image Processing.
[15] Brendan J. Frey,et al. Factor graphs and the sum-product algorithm , 2001, IEEE Trans. Inf. Theory.
[16] Shih-Fu Chang,et al. A robust image authentication method distinguishing JPEG compression from malicious manipulation , 2001, IEEE Trans. Circuits Syst. Video Technol..
[17] Stark C. Draper,et al. Using Distributed Source Coding to Secure Fingerprint Biometrics , 2007, 2007 IEEE International Conference on Acoustics, Speech and Signal Processing - ICASSP '07.
[18] Chun-Shien Lu,et al. Structural digital signature for image authentication: an incidental distortion resistant scheme , 2003, IEEE Trans. Multim..
[19] Shih-Fu Chang,et al. A new semi-fragile image authentication framework combining ECC and PKI infrastructures , 2002, 2002 IEEE International Symposium on Circuits and Systems. Proceedings (Cat. No.02CH37353).