A secure fragile watermarking scheme based on chaos-and-hamming code
暂无分享,去创建一个
Chin-Chen Chang | Chin-Feng Lee | Li-Jen Liu | Kuo-Nan Chen | Chinchen Chang | Chin-Feng Lee | Kuo-Nan Chen | Li-Jen Liu
[1] Shih-Fu Chang,et al. Issues and solutions for authenticating MPEG video , 1999, Electronic Imaging.
[2] Ioannis Pitas,et al. A Comparative Study of Chaotic and White Noise Signals in Digital Watermarking , 2008 .
[3] Minerva M. Yeung,et al. An invisible watermarking technique for image verification , 1997, Proceedings of International Conference on Image Processing.
[4] Rabab Kreidieh Ward,et al. Wavelet packets-based digital watermarking for image verification and authentication , 2003, Signal Process..
[5] Po-Whei Huang,et al. A hierarchical digital watermarking method for image tamper detection and recovery , 2005, Pattern Recognit..
[6] Shih-Fu Chang,et al. A robust image authentication method distinguishing JPEG compression from malicious manipulation , 2001, IEEE Trans. Circuits Syst. Video Technol..
[7] Korris Fu-Lai Chung,et al. Robust digital image watermarking based on subsampling , 2006, Appl. Math. Comput..
[8] Richard W. Hamming,et al. Error detecting and error correcting codes , 1950 .
[9] Nasir D. Memon,et al. Secret and public key authentication watermarking schemes that resist vector quantization attack , 2000, Electronic Imaging.
[10] Jessica J. Fridrich,et al. Security of fragile authentication watermarks with localization , 2002, IS&T/SPIE Electronic Imaging.
[11] Michael G. Strintzis,et al. Robust image watermarking based on generalized Radon transformations , 2003, IEEE Trans. Circuits Syst. Video Technol..
[12] Thierry Pun,et al. Attack modelling: towards a second generation watermarking benchmark , 2001, Signal Process..
[13] Robert M. Gray,et al. An Algorithm for Vector Quantizer Design , 1980, IEEE Trans. Commun..
[14] Shu-Fen Tu,et al. Probability-based tampering detection scheme for digital images , 2010 .
[15] Li Wenbo,et al. A chaos-based robust wavelet-domain watermarking algorithm , 2004 .
[16] John G. Keating,et al. Generation and detection of watermarks derived from chaotic functions , 2005, SPIE OPTO-Ireland.
[17] A. Murat Tekalp,et al. Hierarchical watermarking for secure image authentication with localization , 2002, IEEE Trans. Image Process..
[18] Wen Gao,et al. An image fragile watermark scheme based on chaotic image pattern and pixel-pairs , 2007, Appl. Math. Comput..
[19] Mohan S. Kankanhalli,et al. Robust image authentication using content based compression , 2003, Multimedia Systems.
[20] Chin-Chen Chang,et al. An efficient image authentication method based on Hamming code , 2007, Pattern Recognit..
[21] Jiri Fridrich,et al. New fragile authentication watermark for images , 2000, Proceedings 2000 International Conference on Image Processing (Cat. No.00CH37101).
[22] Wenbo Liu,et al. Color image authentication based on spatiotemporal chaos and SVD , 2008 .
[23] Robert L. Devaney,et al. A First Course In Chaotic Dynamical Systems: Theory And Experiment , 1993 .
[24] Hsueh-Ming Hang,et al. A feature-based robust digital image watermarking scheme , 2003, IEEE Trans. Signal Process..