Authentication and recovery of an image by sharing and lattice-embedding
暂无分享,去创建一个
[1] F. Preparata. Holographic dispersal and recovery of information , 1989, IEEE Trans. Inf. Theory.
[2] James L. Massey,et al. Shift-register synthesis and BCH decoding , 1969, IEEE Trans. Inf. Theory.
[3] V. Fotopoulos,et al. Self-authentication of natural color images in Pascal Transform domain , 2009, 2009 16th International Conference on Digital Signal Processing.
[4] Nasir D. Memon,et al. Counterfeiting attacks on oblivious block-wise independent invisible watermarking schemes , 2000, IEEE Trans. Image Process..
[5] Adnan M. Alattar,et al. > REPLACE THIS LINE WITH YOUR PAPER IDENTIFICATION NUMBER (DOUBLE-CLICK HERE TO EDIT) < Reversible Watermark Using the Difference Expansion of A Generalized Integer Transform , 2022 .
[6] Po-Whei Huang,et al. A hierarchical digital watermarking method for image tamper detection and recovery , 2005, Pattern Recognit..
[7] I. S. Hsu,et al. Simplified procedure for correcting both errors and erasures of Reed-Solomon code using Euclidean algorithm , 1987 .
[8] Chin-Chen Chang,et al. Using set partitioning in hierarchical trees to authenticate digital images , 2003, Signal Process. Image Commun..
[9] Shih-Fu Chang,et al. A robust image authentication method distinguishing JPEG compression from malicious manipulation , 2001, IEEE Trans. Circuits Syst. Video Technol..
[10] Ronald L. Rivest,et al. The MD5 Message-Digest Algorithm , 1992, RFC.
[11] Chang-Tsun Li,et al. Semi-fragile watermarking scheme for authentication of JPEG images , 2004, International Conference on Information Technology: Coding and Computing, 2004. Proceedings. ITCC 2004..
[12] Nasir Memon,et al. Secret and public key image watermarking schemes for image authentication and ownership verification , 2001, IEEE Trans. Image Process..
[13] A. Murat Tekalp,et al. Hierarchical watermarking for secure image authentication with localization , 2002, IEEE Trans. Image Process..
[14] Quan Liu,et al. Semi-fragile watermarking algorithm for image tampers localization and recovery , 2008 .
[15] Ja-Chen Lin,et al. Authentication and cross-recovery for multiple images , 2008, J. Electronic Imaging.
[16] Xinpeng Zhang,et al. Fragile Watermarking With Error-Free Restoration Capability , 2008, IEEE Transactions on Multimedia.
[17] P. Barreto,et al. Toward secure public-key blockwise fragile authentication watermarking , 2002 .
[18] Ja-Chen Lin,et al. Secret image sharing , 2002, Comput. Graph..
[19] Min-Jen Tsai,et al. A wavelet-based semi-fragile watermarking with recovery mechanism , 2008, 2008 IEEE International Symposium on Circuits and Systems.
[20] Shih-Fu Chang,et al. Semifragile watermarking for authenticating JPEG visual content , 2000, Electronic Imaging.
[21] Chin-Chen Chang,et al. An efficient image authentication method based on Hamming code , 2007, Pattern Recognit..
[22] Nasir D. Memon,et al. Further attacks on Yeung-Mintzer fragile watermarking scheme , 2000, Electronic Imaging.
[23] Pierre Moulin,et al. Data-Hiding Codes , 2005, Proceedings of the IEEE.
[24] Chin-Chen Chang,et al. A watermarking-based image ownership and tampering authentication scheme , 2006, Pattern Recognit. Lett..
[25] Shang-Lin Hsieh,et al. A Recoverable Semi-fragile Watermarking Scheme Using Cosine Transform and Adaptive Median Filter , 2008, ATC.
[26] Min-Jen Tsai,et al. Authentication and recovery for wavelet-based semifragile watermarking , 2008 .