A crypto signature scheme for image authentication over wireless channel
暂无分享,去创建一个
Shih-Fu Chang | Ching-Yung Lin | Qibin Sun | Shuiming Ye | Shih-Fu Chang | Ching-Yung Lin | Qibin Sun | S. Ye
[1] Yao Wang,et al. Error control and concealment for video communication: a review , 1998, Proc. IEEE.
[2] Chien-Chang Chen,et al. Robust image authentication method surviving JPEG lossy compression , 1997, Electronic Imaging.
[3] Deepa Kundur,et al. Digital watermarking for telltale tamper proofing and authentication , 1999, Proc. IEEE.
[4] Hong Heather Yu,et al. Error concealment using data hiding , 2001, 2001 IEEE International Conference on Acoustics, Speech, and Signal Processing. Proceedings (Cat. No.01CH37221).
[5] Philippe Golle,et al. Authenticating Streamed Data in the Presence of Random Packet Loss , 2001, NDSS.
[6] Shih-Fu Chang,et al. Using self-authentication and recovery images for error concealment in wireless environments , 2001, SPIE ITCom.
[7] Gonzalo R. Arce,et al. Approximate image message authentication codes , 2001, IEEE Trans. Multim..
[8] Chun-Shien Lu,et al. Multipurpose watermarking for image authentication and protection , 2001, IEEE Trans. Image Process..
[9] Shih-Fu Chang,et al. A new semi-fragile image authentication framework combining ECC and PKI infrastructures , 2002, 2002 IEEE International Symposium on Circuits and Systems. Proceedings (Cat. No.02CH37353).
[10] Chai Wah Wu,et al. On the design of content-based multimedia authentication systems , 2002, IEEE Trans. Multim..
[11] Xinggang Lin,et al. Content based error detection and concealment for image transmission over wireless channel , 2003, Proceedings of the 2003 International Symposium on Circuits and Systems, 2003. ISCAS '03..