Hash-Based Authentication of Digital Images in Noisy Channels
暂无分享,去创建一个
[1] Regunathan Radhakrishnan,et al. On the security of the digest function in the SARI image authentication system , 2002, IEEE Trans. Circuits Syst. Video Technol..
[2] Chun-Shien Lu,et al. Geometric distortion-resilient image hashing scheme and its applications on copy detection and authentication , 2005, Multimedia Systems.
[3] Reihaneh Safavi-Naini,et al. On (In)security of "A Robust Image Authentication Method" , 2002, IEEE Pacific Rim Conference on Multimedia.
[4] Vishal Monga,et al. Robust Image Hashing Via Non-Negative Matrix Factorizations , 2006, 2006 IEEE International Conference on Acoustics Speech and Signal Processing Proceedings.
[5] Min Wu,et al. Image hashing resilient to geometric and filtering operations , 2004, IEEE 6th Workshop on Multimedia Signal Processing, 2004..
[6] Yanqiang Lei,et al. Robust image hash in Radon transform domain for authentication , 2011, Signal Process. Image Commun..
[7] Chin-Chen Chang,et al. An efficient image authentication method based on Hamming code , 2007, Pattern Recognit..
[8] Regunathan Radhakrishnan,et al. Security of visual hash function , 2003, IS&T/SPIE Electronic Imaging.
[9] Nasir Memon,et al. Secret and public key image watermarking schemes for image authentication and ownership verification , 2001, IEEE Trans. Image Process..
[10] Shih-Fu Chang,et al. A Robust and Secure Media Signature Scheme for JPEG Images , 2005, J. VLSI Signal Process..
[11] Z. Jane Wang,et al. Fast Johnson-Lindenstrauss Transform for robust and secure image hashing , 2008, 2008 IEEE 10th Workshop on Multimedia Signal Processing.
[12] Zhenjun Tang,et al. Robust image hashing using ring-based entropies , 2013, Signal Process..
[13] Wenjun Zeng,et al. Multimedia Security Technologies for Digital Rights Management , 2006 .
[14] Xuelong Li,et al. Geometrically invariant watermarking using affine covariant regions , 2008, 2008 15th IEEE International Conference on Image Processing.
[15] William Stallings,et al. Cryptography and Network Security: Principles and Practice , 1998 .
[16] Chun-Shien Lu,et al. Structural digital signature for image authentication: an incidental distortion resistant scheme , 2003, IEEE Trans. Multim..
[17] Gary Friedman,et al. The trustworthy digital camera: restoring credibility to the photographic image , 1993 .
[18] Nenghai Yu,et al. Passive detection of doctored JPEG image via block artifact grid extraction , 2009, Signal Process..
[19] Chi-Shiang Chan. An image authentication method by applying Hamming code on rearranged bits , 2011, Pattern Recognit. Lett..
[20] Chun-Shien Lu,et al. Media hash-dependent image watermarking resilient against both geometric attacks and estimation attacks based on false positive-oriented detection , 2006, IEEE Transactions on Multimedia.
[21] N. Memon,et al. Confusion/Diffusion Capabilities of Some Robust Hash Functions , 2006, 2006 40th Annual Conference on Information Sciences and Systems.
[22] Ingemar J. Cox,et al. Digital Watermarking , 2003, Lecture Notes in Computer Science.
[23] Gonzalo R. Arce,et al. Approximate image message authentication codes , 2001, IEEE Trans. Multim..
[24] Mohammed Yakoob Siyal,et al. A Robust and Secure Signature Scheme for Video Authentication , 2007, 2007 IEEE International Conference on Multimedia and Expo.
[25] Zhenjun Tang,et al. Perceptual Hashing for Color Images Using Invariant Moments , 2012 .
[26] Der-Chyuan Lou,et al. Fault resilient and compression tolerant digital signature for image authentication , 2000, IEEE Trans. Consumer Electron..
[27] Shih-Fu Chang,et al. A robust image authentication method distinguishing JPEG compression from malicious manipulation , 2001, IEEE Trans. Circuits Syst. Video Technol..
[28] Shih-Fu Chang,et al. A robust content based digital signature for image authentication , 1996, Proceedings of 3rd IEEE International Conference on Image Processing.
[29] Mohammed Yakoob Siyal,et al. A secure and robust hash-based scheme for image authentication , 2010, Signal Process..
[30] Vishal Monga,et al. Perceptual Image Hashing Via Feature Points: Performance Evaluation and Tradeoffs , 2006, IEEE Transactions on Image Processing.
[31] Ingemar J. Cox,et al. 8 – Robust Watermarking , 2002 .