Issues and solutions for authenticating MPEG video
暂无分享,去创建一个
[1] Whitfield Diffie,et al. New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.
[2] Cesar A. Gonzales,et al. Video compression algorithm with adaptive bit allocation and quantization , 1991, Other Conferences.
[3] Gary Friedman,et al. The trustworthy digital camera: restoring credibility to the photographic image , 1993 .
[4] Alexandros Eleftheriadis,et al. Constrained and general dynamic rate shaping of compressed digital video , 1995, Proceedings., International Conference on Image Processing.
[5] Wei Ding,et al. Rate control of MPEG video coding and recording by rate-quantization modeling , 1996, IEEE Trans. Circuits Syst. Video Technol..
[6] Arun N. Netravali,et al. Digital Video: An introduction to MPEG-2 , 1996 .
[7] Shih-Fu Chang,et al. A robust content based digital signature for image authentication , 1996, Proceedings of 3rd IEEE International Conference on Image Processing.
[8] B. Zhu,et al. Transparent robust authentication and distortion measurement technique for images , 1996, 1996 IEEE Digital Signal Processing Workshop Proceedings.
[9] Edward J. Delp,et al. A watermark for digital images , 1996, Proceedings of 3rd IEEE International Conference on Image Processing.
[10] Chien-Chang Chen,et al. Robust image authentication method surviving JPEG lossy compression , 1997, Electronic Imaging.
[11] Minerva M. Yeung,et al. An invisible watermarking technique for image verification , 1997, Proceedings of International Conference on Image Processing.
[12] P. N. Tudor,et al. Real-time transcoding of MPEG-2 video bit streams , 1997 .
[13] P. J. Brightwell,et al. Flexible switching and editing of MPEG-2 video bitstreams , 1997 .
[14] Oliver Werner,et al. Generic Quantiser for Transcoding of Hybrid Video , 1997 .
[15] Shih-Fu Chang,et al. CVEPS - a compressed video editing and parsing system , 1997, MULTIMEDIA '96.
[16] Rosario Gennaro,et al. How to Sign Digital Streams , 1997, CRYPTO.
[17] Ralf Steinmetz,et al. Multimedia and Security Workshop at ACM Multimedia , 1998 .
[18] David Bearman,et al. Authenticity of Digital Resources: Towards a Statement of Requirements in the Research Process , 1998, D Lib Mag..
[19] Shih-Fu Chang,et al. Generating Robust Digital Signature for Image/Video Authentication , 1998 .
[20] Stephen Jacobs,et al. Straming Video using Dynamic Rate Shaping and TCP Flow Control , 1998 .
[21] Shih-Fu Chang,et al. A robust image authentication method distinguishing JPEG compression from malicious manipulation , 2001, IEEE Trans. Circuits Syst. Video Technol..