The multimedia blockchain: A distributed and tamper-proof media transaction framework
暂无分享,去创建一个
[1] G. Charith K. Abhayaratne,et al. Visual Attention-Based Image Watermarking , 2016, IEEE Access.
[2] Alessandro Piva,et al. Secure Watermarking for Multimedia Content Protection: A Review of its Benefits and Open Issues , 2013, IEEE Signal Processing Magazine.
[3] Stefano Tubaro,et al. A compressive-sensing based watermarking scheme for sparse image tampering identification , 2009, 2009 16th IEEE International Conference on Image Processing (ICIP).
[4] Chau-Jern Cheng,et al. Digital Hologram Authentication Using a Hadamard-Based Reversible Fragile Watermarking Algorithm , 2015, Journal of Display Technology.
[5] David L. Donoho,et al. WaveLab and Reproducible Research , 1995 .
[6] Elaine Shi,et al. Hawk: The Blockchain Model of Cryptography and Privacy-Preserving Smart Contracts , 2016, 2016 IEEE Symposium on Security and Privacy (SP).
[7] Jiying Zhao,et al. An Image Quality Evaluation Method Based on Digital Watermarking , 2007, IEEE Transactions on Circuits and Systems for Video Technology.
[8] Jie Ding,et al. Normalized Correlation-Based Quantization Modulation for Robust Watermarking , 2014, IEEE Transactions on Multimedia.
[9] L. Rudin,et al. Nonlinear total variation based noise removal algorithms , 1992 .
[10] Ingemar J. Cox,et al. Watermarking applications and their properties , 2000, Proceedings International Conference on Information Technology: Coding and Computing (Cat. No.PR00540).
[11] Hiroki Watanabe,et al. BRIGHT: A concept for a decentralized rights management system based on blockchain , 2015, 2015 IEEE 5th International Conference on Consumer Electronics - Berlin (ICCE-Berlin).
[12] E. Candes,et al. 11-magic : Recovery of sparse signals via convex programming , 2005 .
[13] Mehdi Semsarzadeh,et al. Tampering Detection in Compressed Digital Video Using Watermarking , 2014, IEEE Transactions on Instrumentation and Measurement.
[14] Jin Young Lee,et al. MMT: An Emerging MPEG Standard for Multimedia Delivery over the Internet , 2013, IEEE MultiMedia.
[15] G. Charith K. Abhayaratne,et al. Quality Scalability Aware Watermarking for Visual Content , 2016, IEEE Transactions on Image Processing.
[16] Christian Riess,et al. Ieee Transactions on Information Forensics and Security an Evaluation of Popular Copy-move Forgery Detection Approaches , 2022 .
[17] Takaaki Yamada,et al. Video watermark application for embedding recipient ID in real-time-encoding VoD server , 2013, Journal of Real-Time Image Processing.
[18] Mohsen Guizani,et al. Joint physical-application layer security for wireless multimedia delivery , 2014, IEEE Communications Magazine.
[19] Yang Wang,et al. Practical Resource Provisioning and Caching with Dynamic Resilience for Cloud-Based Content Distribution Networks , 2014, IEEE Transactions on Parallel and Distributed Systems.
[20] Yue Zhang,et al. Affine Legendre Moment Invariants for Image Watermarking Robust to Geometric Distortions , 2011, IEEE Transactions on Image Processing.
[21] Prasant Mohapatra,et al. Securing Multimedia Content Using Joint Compression and Encryption , 2013, IEEE MultiMedia.
[22] J. Romberg,et al. Imaging via Compressive Sampling , 2008, IEEE Signal Processing Magazine.
[23] Sooyong Park,et al. Where Is Current Research on Blockchain Technology?—A Systematic Review , 2016, PloS one.
[24] Sanjay Kumar Singh,et al. Effective self-embedding watermarking scheme for image tampered detection and localization with recovery capability , 2016, J. Vis. Commun. Image Represent..