SVD-based self-embedding image authentication scheme using quick response code features
暂无分享,去创建一个
[1] Afaf Tareef,et al. A highly secure oblivious sparse coding-based watermarking system for ownership verification , 2015, Expert Syst. Appl..
[2] Aboul Ella Hassanien,et al. An effective SVD-based image tampering detection and self-recovery using active watermarking , 2014, Signal Process. Image Commun..
[3] Yi-Pei Hsieh,et al. Quantization- and Prediction-Based Image Authentication and Recovery , 2011, 2011 Fifth International Conference on Genetic and Evolutionary Computing.
[4] Ming-Shi Wang,et al. A fuzzy c-means clustering-based fragile watermarking scheme for image authentication , 2009, Expert Syst. Appl..
[5] Chin-Hsing Chen,et al. Identification recovery scheme using quick response (QR) code and watermarking technique , 2014 .
[6] Héctor M. Pérez Meana,et al. Image Authentication Scheme Based on Self-embedding Watermarking , 2009, CIARP.
[7] Chin-Chen Chang,et al. Reversible data hiding with oriented and minimized distortions using cascading trellis coding , 2015, Inf. Sci..
[8] Chen Hu,et al. Grayscale Image Tamper Detection and Recovery Based on Vector Quantization , 2013 .
[9] Hazem Al-Otum,et al. Semi-fragile watermarking for grayscale image authentication and tamper detection based on an adjusted expanded-bit multiscale quantization-based technique , 2014, J. Vis. Commun. Image Represent..
[10] Sheng-Cheng Yeh,et al. An IMU-Based Positioning System Using QR-Code Assisting for Indoor Navigation , 2012 .
[11] Eli Biham,et al. An improvement of Davies’ attack on DES , 1994, Journal of Cryptology.
[12] Chin-Hsing Chen,et al. Image Tamper Detection Scheme Using QR Code and DCT Transform Techniques , 2012 .
[13] Amit Phadikar,et al. Novel wavelet-based QIM data hiding technique for tamper detection and correction of digital images , 2012, J. Vis. Commun. Image Represent..
[14] Nasir Memon,et al. Secret and public key image watermarking schemes for image authentication and ownership verification , 2001, IEEE Trans. Image Process..
[15] Chi-Shiang Chan. An image authentication method by applying Hamming code on rearranged bits , 2011, Pattern Recognit. Lett..
[16] Wen-Chuan Wu,et al. A New Approach to Image Authentication Using Chaotic Map and Sudoku Puzzle , 2009, 2009 Fifth International Conference on Intelligent Information Hiding and Multimedia Signal Processing.