Review on Semi-Fragile Watermarking Algorithms for Content Authentication of Digital Images
暂无分享,去创建一个
[1] Alfredo De Santis,et al. Cloud-based adaptive compression and secure management services for 3D healthcare data , 2015, Future Gener. Comput. Syst..
[2] Chun-Shien Lu,et al. Multipurpose watermarking for image authentication and protection , 2001, IEEE Trans. Image Process..
[3] Liao Jian-ming. A Novel Semi-fragile Digital Watermarking Algorithm for Image Content Authentication,Localization and Recovery , 2010 .
[4] Chang-Tsun Li,et al. Semi-fragile watermarking scheme for authentication of JPEG images , 2004, International Conference on Information Technology: Coding and Computing, 2004. Proceedings. ITCC 2004..
[5] Shih-Fu Chang,et al. Semifragile watermarking for authenticating JPEG visual content , 2000, Electronic Imaging.
[6] S. Shefali,et al. Information Security through Semi-Fragile Watermarking , 2007, International Conference on Computational Intelligence and Multimedia Applications (ICCIMA 2007).
[7] Ying Wang,et al. A Semi-fragile Watermarking Tolerant of Laplacian Sharpening , 2008, 2008 International Conference on Computer Science and Software Engineering.
[8] Li Chun,et al. A Semi-Fragile Image Watermarking Resisting to JPEG , 2006 .
[9] Nasir D. Memon,et al. Secret and public key authentication watermarking schemes that resist vector quantization attack , 2000, Electronic Imaging.
[10] Yong Liang Guan,et al. Image Content Authentication Using Pinned Sine Transform , 2004, EURASIP J. Adv. Signal Process..
[11] Zhoufeng Liu,et al. Semi-fragile self-recoverable watermarking algorithm based on wavelet group quantization and double authentication , 2014, Multimedia Tools and Applications.
[12] Xing Xin,et al. A singular-value-based semi-fragile watermarking scheme for image content authentication with tamper localization , 2015, J. Vis. Commun. Image Represent..
[13] Fan Chen,et al. Self-embedding watermarking scheme against JPEG compression with superior imperceptibility , 2017, Multimedia Tools and Applications.
[14] Radu Ovidiu Preda,et al. Semi-fragile watermarking for image authentication with sensitive tamper localization in the wavelet domain , 2013 .
[15] Safya Belghith,et al. Tamper detection and self-recovery scheme by DWT watermarking , 2015 .
[16] Manisha Sharma,et al. Watermarking based image authentication and tamper detection algorithm using vector quantization approach , 2017 .
[17] Amit Phadikar,et al. Novel wavelet-based QIM data hiding technique for tamper detection and correction of digital images , 2012, J. Vis. Commun. Image Represent..
[18] Xingming Sun,et al. A Semi-Fragile Watermarking Algorithm using Adaptive Least Significant Bit Substitution , 2010 .
[19] Ingemar J. Cox,et al. Secure spread spectrum watermarking for multimedia , 1997, IEEE Trans. Image Process..
[20] Mohammed E. Al-Mualla. Content-Adaptive Semi-Fragile Watermarking for Image Authentication , 2007, 2007 14th IEEE International Conference on Electronics, Circuits and Systems.
[21] Min-Jen Tsai,et al. A wavelet-based semi-fragile watermarking with recovery mechanism , 2008, 2008 IEEE International Symposium on Circuits and Systems.
[22] Nasir D. Memon,et al. Further attacks on Yeung-Mintzer fragile watermarking scheme , 2000, Electronic Imaging.
[23] Edward J. Delp,et al. Detection of image alterations using semifragile watermarks , 2000, Electronic Imaging.
[24] Edward J. Delp,et al. Digital watermarking: algorithms and applications , 2001, IEEE Signal Process. Mag..
[25] Rafi Ullah,et al. Intelligent Watermarking Scheme for image Authentication and Recovery , 2017 .
[26] Torsten Palfner,et al. Quantization-based semi-fragile public-key watermarking for secure image authentication , 2005, SPIE Optics + Photonics.
[27] Hazem Al-Otum,et al. Semi-fragile watermarking for grayscale image authentication and tamper detection based on an adjusted expanded-bit multiscale quantization-based technique , 2014, J. Vis. Commun. Image Represent..
[28] Xiang Zhou,et al. A semifragile watermark scheme for image authentication , 2004, 10th International Multimedia Modelling Conference, 2004. Proceedings..
[29] Radu Ovidiu PREDA,et al. IMAGE AUTHENTICATION AND RECOVERY USING WAVELET-BASED DUAL WATERMARKING , 2015 .
[30] C. Fontaine,et al. Watermarking security: theory and practice , 2005, IEEE Transactions on Signal Processing.
[31] D. N. Vizireanu,et al. Watermarking-based image authentication robust to JPEG compression , 2015 .