Comparative evaluation of semifragile watermarking algorithms
暂无分享,去创建一个
Bülent Sankur | Özgür Ekici | Baris Coskun | Umut Naci | Mahmut Akcay | B. Sankur | B. Coskun | Ö. Ekici | M. Akcay | U. Naci | Baris Coskun
[1] Shih-Fu Chang,et al. Semifragile watermarking for authenticating JPEG visual content , 2000, Electronic Imaging.
[2] Tiago Rosa Maria Paula Queluz. Spatial watermark for image content authentication , 2002, J. Electronic Imaging.
[3] Gonzalo R. Arce,et al. Approximate image message authentication codes , 2001, IEEE Trans. Multim..
[4] Minerva M. Yeung,et al. Invisible watermarking for image verification , 1998, J. Electronic Imaging.
[5] Edward J. Delp,et al. Detection of image alterations using semifragile watermarks , 2000, Electronic Imaging.
[6] Alok Aggarwal,et al. Compression tolerant watermarking for image verification , 2000, Proceedings 2000 International Conference on Image Processing (Cat. No.00CH37101).
[7] Jang-Ping Sheu,et al. Mean quantization blind watermarking for image authentication , 2000, Proceedings 2000 International Conference on Image Processing (Cat. No.00CH37101).
[8] Lisa M. Marvel,et al. Spread spectrum image steganography , 1999, IEEE Trans. Image Process..
[9] Chin-Chen Chang,et al. Secure discrete-cosine-transform-based technique for recoverable tamper proofing , 2001 .
[10] Deepa Kundur,et al. Digital watermarking for telltale tamper proofing and authentication , 1999, Proc. IEEE.
[11] Jessica J. Fridrich,et al. Security of fragile authentication watermarks with localization , 2002, IS&T/SPIE Electronic Imaging.
[12] Umut Naci,et al. Comparative assessment of semifragile watermarking techniques , 2001, SPIE ITCom.
[13] Fabien A. P. Petitcolas,et al. Watermarking schemes evaluation , 2000, IEEE Signal Process. Mag..
[14] Ahmed H. Tewfik,et al. Fraud detection and self embedding , 1999, MULTIMEDIA '99.
[15] Deepa Kundur,et al. Towards a telltale watermarking technique for tamper-proofing , 1998, Proceedings 1998 International Conference on Image Processing. ICIP98 (Cat. No.98CB36269).
[16] Lisa M. Marvel,et al. Compression-compatible fragile and semifragile tamper detection , 2000, Electronic Imaging.
[17] Chien-Chang Chen,et al. Robust image authentication method surviving JPEG lossy compression , 1997, Electronic Imaging.
[18] Jiri Fridrich,et al. Robust Digital Watermarking Based on Key-Dependent Basis Functions , 1998, Information Hiding.
[19] Jessica Fridrich. Combining low-frequency and spread-spectrum watermarking , 1998, Optics & Photonics.
[20] Chun-Shien Lu,et al. Mean-quantization-based fragile watermarking for image authentication , 2001 .
[21] Giovanni Di Crescenzo,et al. Approximate Message Authentication Codes for$N$-ary Alphabets , 2006, IEEE Transactions on Information Forensics and Security.
[22] Tiago Rosa Maria Paula Queluz. Content-based integrity protection of digital images , 1999, Electronic Imaging.
[23] Russell M. Mersereau,et al. Video Error Correction Using Steganography , 2002, EURASIP J. Adv. Signal Process..
[24] Bülent Sankur,et al. Strict integrity control of biomedical images , 2001, IS&T/SPIE Electronic Imaging.
[25] Mohamed F. Mansour,et al. Robust high capacity data embedding , 2000, Proceedings 2000 International Conference on Image Processing (Cat. No.00CH37101).
[26] Tiago Rosa Maria Paula Queluz,et al. Spatial watermark for image verification , 2000, Electronic Imaging.
[27] Fabien A. P. Petitcolas,et al. Fair evaluation methods for image watermarking systems , 2000, J. Electronic Imaging.
[28] Shih-Fu Chang,et al. A robust image authentication method distinguishing JPEG compression from malicious manipulation , 2001, IEEE Trans. Circuits Syst. Video Technol..
[29] Jiri Fridrich. A hybrid watermark for tamper detection in digital images , 1999, ISSPA '99. Proceedings of the Fifth International Symposium on Signal Processing and its Applications (IEEE Cat. No.99EX359).
[30] Tiago Rosa Maria Paula Queluz. Authentication of digital images and video: Generic models and a new contribution , 2001, Signal processing. Image communication.
[31] Bernd Girod,et al. Blind watermarking applied to image authentication , 2001, 2001 IEEE International Conference on Acoustics, Speech, and Signal Processing. Proceedings (Cat. No.01CH37221).
[32] B. Girod,et al. A blind watermarking scheme based on structured codebooks , 2000 .