Multiresolution fragile watermarking using complex chirp signals for content authentication
暂无分享,去创建一个
[1] Jiri Fridrich,et al. Robust Digital Watermarking Based on Key-Dependent Basis Functions , 1998, Information Hiding.
[2] Gonzalo R. Arce,et al. Joint wavelet compression and authentication watermarking , 1998, Proceedings 1998 International Conference on Image Processing. ICIP98 (Cat. No.98CB36269).
[3] Tiago Rosa Maria Paula Queluz. Content-based integrity protection of digital images , 1999, Electronic Imaging.
[4] Min Wu,et al. Watermarking for image authentication , 1998, Proceedings 1998 International Conference on Image Processing. ICIP98 (Cat. No.98CB36269).
[5] Alessandro Neri,et al. Blind quality assessment system for multimedia communications using tracing watermarking , 2003, IEEE Trans. Signal Process..
[6] Bülent Sankur,et al. Comparative evaluation of semifragile watermarking algorithms , 2004, J. Electronic Imaging.
[7] Ping Wah Wong,et al. A Watermark for Image Integrity and Ownership Verification , 1998, PICS.
[8] John G. Proakis,et al. Introduction to Digital Signal Processing , 1988 .
[9] Edward J. Delp,et al. A watermark for digital images , 1996, Proceedings of 3rd IEEE International Conference on Image Processing.
[10] Steve McLaughlin,et al. Comparative study of textural analysis techniques to characterise tissue from intravascular ultrasound , 1996, Proceedings of 3rd IEEE International Conference on Image Processing.
[11] Edward J. Delp,et al. Detection of image alterations using semifragile watermarks , 2000, Electronic Imaging.
[12] Deepa Kundur,et al. Digital watermarking for telltale tamper proofing and authentication , 1999, Proc. IEEE.
[13] Shih-Fu Chang,et al. A robust image authentication method distinguishing JPEG compression from malicious manipulation , 2001, IEEE Trans. Circuits Syst. Video Technol..
[14] Nasir Memon,et al. Authentication techniques for multimedia content , 1999, Other Conferences.
[15] A. S. Kayhan. Representation and analysis of complex chirp signals , 1998, Signal Process..
[16] Yo-Sung Ho,et al. Analysis of quantization watermarking in the wavelet transform domain , 2003, Seventh International Symposium on Signal Processing and Its Applications, 2003. Proceedings..
[17] C. F. Osborne,et al. A digital watermark , 1994, Proceedings of 1st International Conference on Image Processing.
[18] Deepa Kundur,et al. Towards a telltale watermarking technique for tamper-proofing , 1998, Proceedings 1998 International Conference on Image Processing. ICIP98 (Cat. No.98CB36269).
[19] Rodger E. Ziemer,et al. Introduction to digital communication , 1992 .
[20] Martin S. Roden. Analog and Digital Communication Systems , 1979 .
[21] Lisa M. Marvel,et al. Spread spectrum image steganography , 1999, IEEE Trans. Image Process..
[22] B. Girod,et al. A blind watermarking scheme based on structured codebooks , 2000 .
[23] Edward J. Delp,et al. A Review of Fragile Image Watermarks , 2007 .
[24] Lisa M. Marvel,et al. Compression-compatible fragile and semifragile tamper detection , 2000, Electronic Imaging.
[25] Alfred Mertins,et al. Signal Analysis: Wavelets, Filter Banks, Time-Frequency Transforms and Applications , 1999 .
[26] Minerva M. Yeung,et al. Invisible watermarking for image verification , 1998, J. Electronic Imaging.
[27] Russell M. Mersereau,et al. Video Error Correction Using Steganography , 2002, EURASIP J. Adv. Signal Process..
[28] Ahmed H. Tewfik,et al. Fraud detection and self embedding , 1999, MULTIMEDIA '99.