A High-Quality Reversible Image Authentication Scheme Based on Adaptive PEE for Digital Images
暂无分享,去创建一个
[1] Min Wu,et al. Robust and secure image hashing , 2006, IEEE Transactions on Information Forensics and Security.
[2] Yun Q. Shi,et al. Reversible Data Hiding , 2003, IWDW.
[3] Chin-Chen Chang,et al. Self-embedding fragile watermarking with restoration capability based on adaptive bit allocation mechanism , 2012, Signal Process..
[4] Chin-Chen Chang,et al. Reversible Image Hiding for High Image Quality Based on Histogram Shifting and Local Complexity , 2014, Int. J. Netw. Secur..
[5] Yu-Chen Hu,et al. A novel reversible image authentication scheme for digital images , 2014, Signal Process..
[6] Di Wu,et al. A novel image hash algorithm resistant to print-scan , 2009, Signal Process..
[7] Wu-Lin Chen,et al. A novel tamper detection scheme for BTC-compressed images , 2013 .
[8] Chin-Chen Chang,et al. Adaptive self-recovery for tampered images based on VQ indexing and inpainting , 2013, Signal Process..
[9] Hany Farid,et al. Exposing Digital Forgeries From JPEG Ghosts , 2009, IEEE Transactions on Information Forensics and Security.
[10] Jiashu Zhang,et al. Adjacent-block based statistical detection method for self-embedding watermarking techniques , 2009, Signal Process..
[11] Yu-Chen Hu,et al. An adaptive image authentication scheme for vector quantization compressed image , 2011, J. Vis. Commun. Image Represent..
[12] Nasir Memon,et al. Secret and public key image watermarking schemes for image authentication and ownership verification , 2001, IEEE Trans. Image Process..
[13] Chin-Chen Chang,et al. A Tamper-Detection Scheme for BTC-Compressed Images with High-Quality Images , 2014, KSII Trans. Internet Inf. Syst..
[14] Shinfeng D. Lin,et al. Dual watermark for image tamper detection and recovery , 2008, Pattern Recognit..
[15] Chun-Shien Lu,et al. Mean-quantization-based fragile watermarking for image authentication , 2001 .
[16] Motoi Iwata,et al. Digital Steganography Utilizing Features of JPEG Images , 2004 .
[17] Xinpeng Zhang,et al. Statistical Fragile Watermarking Capable of Locating Individual Tampered Pixels , 2007, IEEE Signal Processing Letters.
[18] Jeffrey J. Rodríguez,et al. Expansion Embedding Techniques for Reversible Watermarking , 2007, IEEE Transactions on Image Processing.
[19] Shiuh-Jeng Wang,et al. VQ Applications in Steganographic Data Hiding Upon Multimedia Images , 2011, IEEE Systems Journal.
[20] Chang-Tsun Li,et al. Wavelet-based fragile watermarking scheme for image authentication , 2007, J. Electronic Imaging.
[21] Jeho Nam,et al. Reversible Watermarking Algorithm Using Sorting and Prediction , 2009, IEEE Transactions on Circuits and Systems for Video Technology.
[22] J. Mielikainen. LSB matching revisited , 2006, IEEE Signal Processing Letters.
[23] V. Monga. Robust and Secure Image Hashing via , 2007 .
[24] Hsiang-Cheh Huang,et al. Reversible data hiding using histogram-based difference expansion , 2009, 2009 IEEE International Symposium on Circuits and Systems.
[25] F. Chung,et al. Fragile watermarking scheme for image authentication , 2003 .
[26] Min Wu,et al. Digital image forensics via intrinsic fingerprints , 2008, IEEE Transactions on Information Forensics and Security.
[27] Chi-Shiang Chan. An image authentication method by applying Hamming code on rearranged bits , 2011, Pattern Recognit. Lett..