Semi-fragile watermarking for image authentication based on compressive sensing
暂无分享,去创建一个
Wei Zhang | Na Liu | Xinpeng Zhang | Xiaochun Cao | Jianguo Wei | Ling Du
[1] Changsheng Xu,et al. Street-to-shop: Cross-scenario clothing retrieval via parts alignment and auxiliary set , 2012, 2012 IEEE Conference on Computer Vision and Pattern Recognition.
[2] Stefano Tubaro,et al. A compressive-sensing based watermarking scheme for sparse image tampering identification , 2009, 2009 16th IEEE International Conference on Image Processing (ICIP).
[3] Zhenxing Qian,et al. Watermarking With Flexible Self-Recovery Quality Based on Compressive Sensing and Compositive Reconstruction , 2011, IEEE Transactions on Information Forensics and Security.
[4] Lintao Lv,et al. A SEMI-FRAGILE WATERMARKING SCHEME FOR IMAGE TAMPER LOCALIZATION AND RECOVERY , 2012 .
[5] Yuhang Li,et al. Semi-fragile watermarking for image tamper localization and self-recovery , 2014, Proceedings 2014 IEEE International Conference on Security, Pattern Analysis, and Cybernetics (SPAC).
[6] Shih-Fu Chang,et al. Semifragile watermarking for authenticating JPEG visual content , 2000, Electronic Imaging.
[7] Asifullah Khan,et al. Wavelet Based Image Authentication and Recovery , 2007, Journal of Computer Science and Technology.
[8] Franco Bartolini,et al. Self Recovery Authentication Of Images In The Dwt Domain , 2005, Int. J. Image Graph..
[9] Sam Kwong,et al. Efficient Motion and Disparity Estimation Optimization for Low Complexity Multiview Video Coding , 2015, IEEE Transactions on Broadcasting.
[10] Stefano Tubaro,et al. Hash-Based Identification of Sparse Image Tampering , 2009, IEEE Transactions on Image Processing.
[11] Guangming Shi,et al. A high quality image reconstruction method based on nonconvex decoding , 2013, Science China Information Sciences.
[12] Jian Shen,et al. Efficient data integrity auditing for storage security in mobile health cloud , 2015, Peer-to-Peer Networking and Applications.
[13] Xingming Sun,et al. Segmentation-Based Image Copy-Move Forgery Detection Scheme , 2015, IEEE Transactions on Information Forensics and Security.
[14] Naixue Xiong,et al. Steganalysis of LSB matching using differences between nonadjacent pixels , 2016, Multimedia Tools and Applications.