Authentication of digital images and video: Generic models and a new contribution
暂无分享,去创建一个
[1] Tiago Rosa Maria Paula Queluz. Content-based integrity protection of digital images , 1999, Electronic Imaging.
[2] Tiago Rosa Maria Paula Queluz. Towards robust, content based techniques for image authentication , 1998, 1998 IEEE Second Workshop on Multimedia Signal Processing (Cat. No.98EX175).
[3] Jiri Fridrich,et al. Image watermarking for tamper detection , 1998, Proceedings 1998 International Conference on Image Processing. ICIP98 (Cat. No.98CB36269).
[4] Min Wu,et al. Watermarking for image authentication , 1998, Proceedings 1998 International Conference on Image Processing. ICIP98 (Cat. No.98CB36269).
[5] Deepa Kundur,et al. Towards a telltale watermarking technique for tamper-proofing , 1998, Proceedings 1998 International Conference on Image Processing. ICIP98 (Cat. No.98CB36269).
[6] Gonzalo R. Arce,et al. Joint wavelet compression and authentication watermarking , 1998, Proceedings 1998 International Conference on Image Processing. ICIP98 (Cat. No.98CB36269).
[7] Ping Wah Wong,et al. A public key watermark for image verification and authentication , 1998, Proceedings 1998 International Conference on Image Processing. ICIP98 (Cat. No.98CB36269).
[8] Gonzalo R. Arce,et al. A blind wavelet based digital signature for image authentication , 1998, 9th European Signal Processing Conference (EUSIPCO 1998).
[9] Ahmed H. Tewfik,et al. Multimedia data-embedding and watermarking technologies , 1998, Proc. IEEE.
[10] Chien-Chang Chen,et al. Robust image authentication method surviving JPEG lossy compression , 1997, Electronic Imaging.
[11] Minerva M. Yeung,et al. An invisible watermarking technique for image verification , 1997, Proceedings of International Conference on Image Processing.
[12] Shih-Fu Chang,et al. A robust content based digital signature for image authentication , 1996, Proceedings of 3rd IEEE International Conference on Image Processing.
[13] Jean-Jacques Quisquater,et al. Cryptology for digital TV broadcasting , 1995, Proc. IEEE.
[14] Gary Friedman,et al. The trustworthy digital camera: restoring credibility to the photographic image , 1993 .
[15] Whitfield Diffie,et al. New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.
[16] C. Lambrecht. Perceptual models and architectures for video coding applications , 1996 .
[17] N. Otsu. A Threshold Selection Method from Gray-Level Histograms , 1979, IEEE Trans. Syst. Man Cybern..