An SVD-based fragile watermarking scheme with grouped blocks
暂无分享,去创建一个
Ke Li | Hu Chen | Qingbo Kang | Hu Chen | Qingbo Kang | Ke Li
[1] Chun-Chi Lo,et al. Probability-based Tamper Detection Scheme for BTC-compressed Images Based on Quantization Levels Modification , 2013 .
[2] Gary Friedman,et al. The trustworthy digital camera: restoring credibility to the photographic image , 1993 .
[3] Tieniu Tan,et al. An SVD-based watermarking scheme for protecting rightful ownership , 2002, IEEE Trans. Multim..
[4] Balasubramanian Raman,et al. A chaotic system based fragile watermarking scheme for image tamper detection , 2011 .
[5] Xinpeng Zhang,et al. Statistical Fragile Watermarking Capable of Locating Individual Tampered Pixels , 2007, IEEE Signal Processing Letters.
[6] Nasir Memon,et al. Secret and public key image watermarking schemes for image authentication and ownership verification , 2001, IEEE Trans. Image Process..
[7] Shan Suthaharan,et al. Fragile image watermarking using a gradient image for improved localization and security , 2004, Pattern Recognit. Lett..
[8] John G. Keating,et al. Performance analysis of chaotic and white watermarks in the presence of common watermark attacks , 2009 .
[9] Rita Noumeir,et al. Methods for image authentication: a survey , 2008, Multimedia Tools and Applications.
[10] Kaoru Kurosawa,et al. On Parallel Hash Functions Based on Block-Ciphers , 2003, IEICE Trans. Fundam. Electron. Commun. Comput. Sci..
[11] Rui Sun,et al. A SVD- and quantization based semi-fragile watermarking technique for image authentication , 2002, 6th International Conference on Signal Processing, 2002..
[12] Wen Gao,et al. An image fragile watermark scheme based on chaotic image pattern and pixel-pairs , 2007, Appl. Math. Comput..
[13] Yongjun Ren,et al. Designated-Verifier Provable Data Possession in Public Cloud Storage , 2013 .
[14] Minerva M. Yeung,et al. An invisible watermarking technique for image verification , 1997, Proceedings of International Conference on Image Processing.
[15] Chun-Shien Lu,et al. Structural digital signature for image authentication: an incidental distortion resistant scheme , 2003, IEEE Trans. Multim..
[16] Chih-Chin Lai,et al. A digital watermarking scheme based on singular value decomposition and tiny genetic algorithm , 2011, Digit. Signal Process..
[17] Ninghui Li,et al. Oblivious signature-based envelope , 2003, PODC.
[18] Nasir D. Memon,et al. Counterfeiting attacks on oblivious block-wise independent invisible watermarking schemes , 2000, IEEE Trans. Image Process..
[19] Chun-Shien Lu,et al. Structural digital signature for image authentication: an incidental distortion resistant scheme , 2000, MULTIMEDIA '00.
[20] Weisi Lin. Multimedia Analysis, Processing and Communications , 2011 .