Self-embedding fragile watermarking based on DCT and fast fractal coding
暂无分享,去创建一个
[1] Zhenxing Qian,et al. Watermarking With Flexible Self-Recovery Quality Based on Compressive Sensing and Compositive Reconstruction , 2011, IEEE Transactions on Information Forensics and Security.
[2] Zhenxing Qian,et al. Inpainting Assisted Self Recovery With Decreased Embedding Data , 2010, IEEE Signal Processing Letters.
[3] Nasir Memon,et al. Secret and public key image watermarking schemes for image authentication and ownership verification , 2001, IEEE Trans. Image Process..
[4] Chin-Chen Chang,et al. Self-embedding fragile watermarking with restoration capability based on adaptive bit allocation mechanism , 2012, Signal Process..
[5] A. Murat Tekalp,et al. A hierarchical image authentication watermark with improved localization and security , 2001, Proceedings 2001 International Conference on Image Processing (Cat. No.01CH37205).
[6] Heng-Ming Tai,et al. A neighborhood-characteristic-based detection model for statistical fragile watermarking with localization , 2010, Multimedia Tools and Applications.
[7] Zhenxing Qian,et al. Self-embedding watermark with flexible restoration quality , 2011, Multimedia Tools and Applications.
[8] Arnaud E. Jacquin,et al. Image coding based on a fractal theory of iterated contractive image transformations , 1992, IEEE Trans. Image Process..
[9] Shaocheng Tong,et al. Adaptive Fuzzy Control via Observer Design for Uncertain Nonlinear Systems With Unmodeled Dynamics , 2013, IEEE Transactions on Fuzzy Systems.
[10] Minerva M. Yeung,et al. Fragile imperceptible digital watermark with privacy control , 1999, Electronic Imaging.
[11] Pawel Korus,et al. Efficient Method for Content Reconstruction With Self-Embedding , 2013, IEEE Transactions on Image Processing.
[12] Zhenxing Qian,et al. Reference Sharing Mechanism for Watermark Self-Embedding , 2011, IEEE Transactions on Image Processing.
[13] Gaurav Bhatnagar,et al. A new aspect in robust digital watermarking , 2011, Multimedia Tools and Applications.
[14] Liu Yang,et al. Segmentation-based Image Authentication and Recovery Scheme Using Reference Sharing Mechanism , 2012, 2012 International Conference on Industrial Control and Electronics Engineering.
[15] Shaocheng Tong,et al. Robust Adaptive Tracking Control for Nonlinear Systems Based on Bounds of Fuzzy Approximation Parameters , 2010, IEEE Transactions on Systems, Man, and Cybernetics - Part A: Systems and Humans.
[16] Nasir D. Memon,et al. Counterfeiting attacks on oblivious block-wise independent invisible watermarking schemes , 2000, IEEE Trans. Image Process..
[17] Shinfeng D. Lin,et al. An Image Watermarking Scheme with Tamper Detection and Recovery , 2006, First International Conference on Innovative Computing, Information and Control - Volume I (ICICIC'06).
[18] Heng-Ming Tai,et al. Chaos-based self-embedding fragile watermarking with flexible watermark payload , 2012, Multimedia Tools and Applications.
[19] A. Murat Tekalp,et al. Hierarchical watermarking for secure image authentication with localization , 2002, IEEE Trans. Image Process..
[20] Claudia Feregrino Uribe,et al. Watermarking using similarities based on fractal codification , 2012, Digit. Signal Process..
[21] Shinfeng D. Lin,et al. Dual watermark for image tamper detection and recovery , 2008, Pattern Recognit..
[22] Ping Wah Wong,et al. A public key watermark for image verification and authentication , 1998, Proceedings 1998 International Conference on Image Processing. ICIP98 (Cat. No.98CB36269).
[23] Shih-Fu Chang,et al. A robust image authentication method distinguishing JPEG compression from malicious manipulation , 2001, IEEE Trans. Circuits Syst. Video Technol..
[24] Nasir D. Memon,et al. Cryptanalysis of the Yeung - Mintzer fragile watermarking technique , 2002, J. Electronic Imaging.
[25] Yan-Jun Liu,et al. Adaptive fuzzy control for a class of uncertain nonaffine nonlinear systems , 2007, Inf. Sci..
[26] Safya Belghith,et al. A novel method for tamper detection and recovery resistant to Vector Quantization attack , 2009, 2009 6th International Multi-Conference on Systems, Signals and Devices.
[27] Mohsen Ebrahimi Moghaddam,et al. A multi-purpose digital image watermarking using fractal block coding , 2011, J. Syst. Softw..
[28] Jiashu Zhang,et al. Adjacent-block based statistical detection method for self-embedding watermarking techniques , 2009, Signal Process..
[29] Hyoungshick Kim,et al. An image encryption scheme with a pseudorandom permutation based on chaotic maps , 2010 .
[30] Michael F. Barnsley,et al. Fractals everywhere , 1988 .
[31] Po-Whei Huang,et al. A hierarchical digital watermarking method for image tamper detection and recovery , 2005, Pattern Recognit..
[32] Helen Treharne,et al. A Novel Semi-Fragile Image Watermarking, Authentication and Self-Restoration Technique Using the Slant Transform , 2007, Third International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2007).
[33] Lili Liu,et al. An Image Authentication Scheme with Localization and Recovery , 2008, 2008 Congress on Image and Signal Processing.
[34] Zhenxing Qian,et al. Image self-embedding with high-quality restoration capability , 2011, Digit. Signal Process..
[35] Xingyuan Wang,et al. A novel image recovery method based on discrete cosine transform and matched blocks , 2013 .