An Adaptive Data Hiding Technique for Digital Image Authentication
暂无分享,去创建一个
[1] Borka Jerman-Blazic. Security in value added networks—security requirements for EDI , 1991 .
[2] Nasir Memon,et al. Secret and public key image watermarking schemes for image authentication and ownership verification , 2001, IEEE Trans. Image Process..
[3] I-Chang Jou,et al. A Gray Level Watermarking Algorithm Using Double Layer Hidden Approach , 2002, IEICE Trans. Fundam. Electron. Commun. Comput. Sci..
[4] Bernard P. Zajac. Applied cryptography: Protocols, algorithms, and source code in C , 1994 .
[5] Peter Wayner,et al. Disappearing Cryptography: Information Hiding: Steganography and Watermarking (2nd Edition) , 2002 .
[6] Peter Wayner,et al. Disappearing Cryptography: Information Hiding: Steganography and Watermarking , 2008 .
[7] Borka Dzonova-jerman-blazic. Security in value added networks - security requirements for EDI , 1991 .
[8] K. Tanaka,et al. Embedding secret information into a dithered multi-level image , 1990, IEEE Conference on Military Communications.
[9] Minerva M. Yeung,et al. Invisible watermarking for image verification , 1998, J. Electronic Imaging.
[10] Frank Hartung,et al. Multimedia watermarking techniques , 1999, Proc. IEEE.
[11] William Stallings,et al. Cryptography and Network Security: Principles and Practice , 1998 .
[12] P. Barreto,et al. Toward secure public-key blockwise fragile authentication watermarking , 2002 .
[13] Chin-Chen Chang,et al. A watermarking technique based on one-way hash functions , 1999, IEEE Trans. Consumer Electron..
[14] Ingemar J. Cox,et al. Secure spread spectrum watermarking for multimedia , 1997, IEEE Trans. Image Process..