Digital fingerprinting for color images based on the quaternion encryption scheme
暂无分享,去创建一个
Mariusz Dzwonkowski | Bartosz Czaplewski | Roman Rykaczewski | M. Dzwonkowski | B. Czaplewski | R. Rykaczewski
[1] Ahmad-Reza Sadeghi,et al. Fingercasting-Joint Fingerprinting and Decryption of Broadcast Messages , 2006, ACISP.
[2] Heung-Kyu Lee,et al. Perceptually tuned robust watermarking scheme for digital images , 2000, Pattern Recognit. Lett..
[3] Ron Goldman,et al. Understanding quaternions , 2011, Graph. Model..
[4] Deepak Kedia. Comparative Analysis of Peak Correlation Characteristics of Non-Orthogonal Spreading Codes for Wireless Systems , 2012, ArXiv.
[5] Renu Dhir,et al. Joint watermarking and fingerprinting approach for colored digital images in double DCT domain , 2013, 2013 IEEE International Conference on Signal Processing, Computing and Control (ISPCC).
[6] Malay Kumar Kundu,et al. Robust SS watermarking with improved capacity , 2007, Pattern Recognit. Lett..
[7] Chin-Chen Chang,et al. A watermarking-based image ownership and tampering authentication scheme , 2006, Pattern Recognit. Lett..
[8] N. Ahmed,et al. Discrete Cosine Transform , 1996 .
[9] Roland Parviainen,et al. Large Scale distributed watermarking of multicast media through encryption , 2001, Communications and Multimedia Security.
[10] Ingemar J. Cox,et al. Secure spread spectrum watermarking for multimedia , 1997, IEEE Trans. Image Process..
[11] Min Wu,et al. Forensic analysis of nonlinear collusion attacks for multimedia fingerprinting , 2005, IEEE Transactions on Image Processing.
[12] Min Wu,et al. Joint coding and embedding techniques for MultimediaFingerprinting , 2006, IEEE Transactions on Information Forensics and Security.
[13] Stefan Katzenbeisser,et al. Combining Tardos Fingerprinting Codes and Fingercasting , 2007, Information Hiding.
[14] R. Koide,et al. A new quadripartite public-key cryptosystem , 2004, IEEE International Symposium on Communications and Information Technology, 2004. ISCIT 2004..
[15] K. J. Ray Liu,et al. Bandwidth efficient fingerprint multicast for video streaming , 2004, 2004 IEEE International Conference on Acoustics, Speech, and Signal Processing.
[16] Girija Chetty,et al. A novel image watermarking scheme using Extreme Learning Machine , 2012, The 2012 International Joint Conference on Neural Networks (IJCNN).
[17] Dan Boneh,et al. Collusion-Secure Fingerprinting for Digital Data , 1998, IEEE Trans. Inf. Theory.
[18] Tomoyuki Nagase,et al. Secure signals transmission based on quaternion encryption scheme , 2004, 18th International Conference on Advanced Information Networking and Applications, 2004. AINA 2004..
[19] Girija Chetty,et al. Blind Video Tamper Detection Based on Fusion of Source Features , 2011, 2011 International Conference on Digital Image Computing: Techniques and Applications.
[20] S. Welstead. Fractal and Wavelet Image Compression Techniques , 1999 .
[21] Deepa Kundur,et al. Video fingerprinting and encryption principles for digital rights management , 2004, Proceedings of the IEEE.
[22] Yulin Wang,et al. Blind image data hiding based on self reference , 2004, Pattern Recognit. Lett..
[23] K. J. Ray Liu,et al. Multimedia Fingerprinting Forensics for Traitor Tracing , 2005 .
[24] Mostafa H. Ammar,et al. WHIM: watermarking multicast video with a hierarchy of intermediaries , 2002, Comput. Networks.
[25] Charalampos Manifavas,et al. Chameleon - A New Kind of Stream Cipher , 1997, FSE.
[26] Vidhyacharan Bhaskar,et al. Real-Time Symmetric Cryptography using Quaternion Julia Set , 2009 .
[27] Min Wu,et al. Collusion-resistant fingerprinting for multimedia , 2004 .
[28] William Kahan,et al. Lecture Notes on the Status of IEEE Standard 754 for Binary Floating-Point Arithmetic , 1996 .
[29] Ron Goldman,et al. An Integrated Introduction to Computer Graphics and Geometric Modeling , 2009 .