Fragile watermarking based on robust hidden information
暂无分享,去创建一个
[1] Frank Hartung,et al. Multimedia watermarking techniques , 1999, Proc. IEEE.
[2] Ronald L. Rivest,et al. The MD5 Message-Digest Algorithm , 1992, RFC.
[3] Wenjun Zeng,et al. A statistical watermark detection technique without using original images for resolving rightful ownerships of digital images , 1999, IEEE Trans. Image Process..
[4] Nasir D. Memon,et al. Counterfeiting attacks on oblivious block-wise independent invisible watermarking schemes , 2000, IEEE Trans. Image Process..
[5] Gregory W. Wornell,et al. Quantization index modulation: A class of provably good methods for digital watermarking and information embedding , 2001, IEEE Trans. Inf. Theory.
[6] Markus G. Kuhn,et al. Information hiding-a survey , 1999, Proc. IEEE.
[7] Nasir Memon,et al. Secret and public key image watermarking schemes for image authentication and ownership verification , 2001, IEEE Trans. Image Process..
[8] Jun Tian. Wavelet-based image compression and content authentication , 2001, International Symposium on Multispectral Image Processing and Pattern Recognition.