A block-based watermarking scheme for image tamper detection and self-recovery
暂无分享,去创建一个
[1] Jiri Fridrich,et al. Image watermarking for tamper detection , 1998, Proceedings 1998 International Conference on Image Processing. ICIP98 (Cat. No.98CB36269).
[2] Robert H. Deng,et al. Security of an ill-posed operator for image authentication , 2005, IEEE Transactions on Circuits and Systems for Video Technology.
[3] Chien-Chang Chen,et al. Robust image authentication method surviving JPEG lossy compression , 1997, Electronic Imaging.
[4] Po-Whei Huang,et al. A hierarchical digital watermarking method for image tamper detection and recovery , 2005, Pattern Recognit..
[5] Ralf Steinmetz,et al. Content-based digital signature for motion pictures authentication and content-fragile watermarking , 1999, Proceedings IEEE International Conference on Multimedia Computing and Systems.
[6] Chun-Shien Lu,et al. Multipurpose watermarking for image authentication and protection , 2001, IEEE Trans. Image Process..
[7] Ming-Shi Wang,et al. A majority-voting based watermarking scheme for color image tamper detection and recovery , 2007, Comput. Stand. Interfaces.
[8] Nasir D. Memon,et al. Counterfeiting attacks on oblivious block-wise independent invisible watermarking schemes , 2000, IEEE Trans. Image Process..
[9] Sheng-He Sun,et al. Multipurpose image watermarking algorithm based on multistage vector quantization , 2005, IEEE Transactions on Image Processing.
[10] Shih-Fu Chang,et al. New semi-fragile image authentication watermarking techniques using random bias and nonuniform quantization , 2006, IEEE Trans. Multim..
[11] Nasir Memon,et al. Secret and public key image watermarking schemes for image authentication and ownership verification , 2001, IEEE Trans. Image Process..
[12] Minerva M. Yeung,et al. An invisible watermarking technique for image verification , 1997, Proceedings of International Conference on Image Processing.
[13] Chun-Shien Lu,et al. Structural digital signature for image authentication: an incidental distortion resistant scheme , 2003, IEEE Trans. Multim..
[14] P. Bao,et al. Image adaptive watermarking using wavelet domain singular value decomposition , 2005 .
[15] Shih-Fu Chang,et al. A robust image authentication method distinguishing JPEG compression from malicious manipulation , 2001, IEEE Trans. Circuits Syst. Video Technol..
[16] Deepa Kundur,et al. Towards a telltale watermarking technique for tamper-proofing , 1998, Proceedings 1998 International Conference on Image Processing. ICIP98 (Cat. No.98CB36269).
[17] A. Murat Tekalp,et al. Hierarchical watermarking for secure image authentication with localization , 2002, IEEE Trans. Image Process..
[18] Shinfeng D. Lin,et al. Dual watermark for image tamper detection and recovery , 2008, Pattern Recognit..
[19] Chin-Chen Chang,et al. Four-scanning attack on hierarchical digital watermarking method for image tamper detection and recovery , 2008, Pattern Recognit..
[20] Shih-Fu Chang,et al. A robust content based digital signature for image authentication , 1996, Proceedings of 3rd IEEE International Conference on Image Processing.
[21] Phen-Lan Lin,et al. (Pattern Recoginition,38:2519-2529)A Hierarchical Digital Watermarking Method for Image Tamper Detection and Recovery , 2005 .
[22] A. Murat Tekalp,et al. Lossless watermarking for image authentication: a new framework and an implementation , 2006, IEEE Transactions on Image Processing.
[23] Susanto Rahardja,et al. Fast intermode decision in H.264/AVC video coding , 2005, IEEE Transactions on Circuits and Systems for Video Technology.
[24] Ping Wah Wong,et al. A public key watermark for image verification and authentication , 1998, Proceedings 1998 International Conference on Image Processing. ICIP98 (Cat. No.98CB36269).
[25] Wenkai Lu,et al. Localized 2-D filter-based linear coherent noise attenuation , 2001, IEEE Trans. Image Process..
[26] Xin Sun,et al. New semi-fragile authentication watermarking , 2002 .
[27] Chun-Wei Yang,et al. Recover the tampered image based on VQ indexing , 2010, Signal Process..
[28] Shan Suthaharan,et al. Fragile image watermarking using a gradient image for improved localization and security , 2004, Pattern Recognit. Lett..
[29] Chin-Chen Chang,et al. A watermarking-based image ownership and tampering authentication scheme , 2006, Pattern Recognit. Lett..
[30] R. H. Deng,et al. Security of an ill-posed operator for image authentication , 2005 .
[31] Ja-Ling Wu,et al. Hidden digital watermarks in images , 1999, IEEE Trans. Image Process..
[32] Karl M. Göschka,et al. Client and Legacy Integration in Object-Oriented Web Engineering , 2001, IEEE Multim..
[33] Gary Friedman,et al. The trustworthy digital camera: restoring credibility to the photographic image , 1993 .
[34] Chun-Shien Lu,et al. Structural digital signature for image authentication: an incidental distortion resistant scheme , 2000, MULTIMEDIA '00.
[35] Jiri Fridrich,et al. New fragile authentication watermark for images , 2000, Proceedings 2000 International Conference on Image Processing (Cat. No.00CH37101).
[36] Tiago Rosa Maria Paula Queluz. Content-based integrity protection of digital images , 1999, Electronic Imaging.