The Application of Fragile Watermark in E-Governance
暂无分享,去创建一个
[1] Lawrence O'Gorman,et al. The Document Spectrum for Page Layout Analysis , 1993, IEEE Trans. Pattern Anal. Mach. Intell..
[2] Steven H. Low,et al. Performance comparison of two text marking methods , 1998, IEEE J. Sel. Areas Commun..
[3] Steven H. Low,et al. Document identification for copyright protection using centroid detection , 1998, IEEE Trans. Commun..
[4] Deepa Kundur,et al. Analysis and design of secure watermark-based authentication systems , 2006, IEEE Transactions on Information Forensics and Security.
[5] Steven H. Low,et al. Copyright protection for the electronic distribution of text documents , 1999, Proc. IEEE.
[6] Lisa M. Marvel,et al. Compression-compatible fragile and semifragile tamper detection , 2000, Electronic Imaging.
[7] Ernest F. Brickell,et al. Trustee-based tracing extensions to anonymous cash and the making of anonymous change , 1995, SODA '95.
[8] Sebastiaan H. von Solms,et al. Refereed paper: Electronic commerce with secure intelligent trade agents , 1998 .
[9] Jacobus E. van der Merwe,et al. Electronic commerce with secure intelligent trade agent , 1997, ICICS.
[10] Edward J. Delp,et al. Detection of image alterations using semifragile watermarks , 2000, Electronic Imaging.