A Watermark Algorithm of Content Authentication for Network Transmission Image Correcting Errors in Terms of Pixels
暂无分享,去创建一个
Qiang Wu | Yong Yang | Renjun Zhan | Yixiao Sun | Qiang Wu | Yixiao Sun | Renjun Zhan | Yong Yang
[1] Hao Wang,et al. Rational secret sharing with semi-rational players , 2012, Int. J. Grid Util. Comput..
[2] Pla Information,et al. An Image Authentication Scheme Separating Tamper Detection from Tamper Location , 2007 .
[3] Deng Xiao-hen. Image encryption algorithms based on chaos through dual scrambling of pixel position and bit , 2014 .
[4] Jessica J. Fridrich,et al. Security of fragile authentication watermarks with localization , 2002, IS&T/SPIE Electronic Imaging.
[5] Doan B. Hoang,et al. Multi-layer security analysis and experimentation of high speed protocol data transfer for GRID , 2012, Int. J. Grid Util. Comput..
[6] W.T. Penzhorn,et al. Digital watermarking for copyright protection , 2004, 2004 IEEE Africon. 7th Africon Conference in Africa (IEEE Cat. No.04CH37590).
[7] Nasir D. Memon,et al. Counterfeiting attacks on oblivious block-wise independent invisible watermarking schemes , 2000, IEEE Trans. Image Process..
[8] Liu Bi. A New Scheme on Perturbing Digital Chaotic Systems , 2005 .
[9] A.H. Tewfik,et al. When seeing isn't believing [multimedia authentication technologies] , 2004, IEEE Signal Processing Magazine.
[10] Fatos Xhafa,et al. A next generation emerging technologies roadmap for enabling collective computational intelligence in disaster management , 2011, Int. J. Space Based Situated Comput..
[11] Liu Fen-lin. An Image Encryption Algorithm Based on Four-value Chaotic Array , 2006 .
[12] Ping Wah Wong,et al. A public key watermark for image verification and authentication , 1998, Proceedings 1998 International Conference on Image Processing. ICIP98 (Cat. No.98CB36269).
[13] Chen Xiu-hong,et al. Digital Image Watermarking Algorithm Based on Chaos Encryption and SVD , 2012 .
[14] Abdelkader H. Ouda,et al. Localization and security enhancement of block-based image authentication , 2005, IEEE International Conference on Image Processing 2005.
[15] Yang Yong-tian. Image Authentication Scheme Research Based on Fragile Watermarking , 2007 .