A Survey of Watermarking Algorithms for Image Authentication
暂无分享,去创建一个
[1] Edward J. Delp,et al. Fragile watermarking using the VW2D watermark , 1999, Electronic Imaging.
[2] Jean-Luc Dugelay,et al. Image watermaking for owner and content authentication , 2000, ACM Multimedia.
[3] Jessica J. Fridrich,et al. Invertible authentication , 2001, Security and Watermarking of Multimedia Contents.
[4] C. F. Osborne,et al. A digital watermark , 1994, Proceedings of 1st International Conference on Image Processing.
[5] Shih-Fu Chang,et al. Generating Robust Digital Signature for Image/Video Authentication , 1998 .
[6] Chien-Chang Chen,et al. Robust image authentication method surviving JPEG lossy compression , 1997, Electronic Imaging.
[7] Minerva M. Yeung,et al. An invisible watermarking technique for image verification , 1997, Proceedings of International Conference on Image Processing.
[8] Jiri Fridrich,et al. Image watermarking for tamper detection , 1998, Proceedings 1998 International Conference on Image Processing. ICIP98 (Cat. No.98CB36269).
[9] Edward J. Delp,et al. A watermark for digital images , 1996, Proceedings of 3rd IEEE International Conference on Image Processing.
[10] Stephan Katzenbeisser,et al. Information Hiding Techniques for Steganography and Digital Watermaking , 1999 .
[11] Min Wu,et al. Watermarking for image authentication , 1998, Proceedings 1998 International Conference on Image Processing. ICIP98 (Cat. No.98CB36269).
[12] Nasir D. Memon,et al. Further attacks on Yeung-Mintzer fragile watermarking scheme , 2000, Electronic Imaging.
[13] J. O'Ruanaidh,et al. Rotation, Translation and Scale Invariant Digital Image Watermarking , 1997 .
[14] Gregory W. Wornell,et al. Information theoretic approach to the authentication of multimedia , 2001, IS&T/SPIE Electronic Imaging.
[15] Jean-Luc Dugelay,et al. Blind detection of malicious alterations on still images using robust watermarks , 2000 .
[16] Regunathan Radhakrishnan,et al. On the security of the SARI image authentication system , 2001, Proceedings 2001 International Conference on Image Processing (Cat. No.01CH37205).
[17] Ping Wah Wong,et al. A Watermark for Image Integrity and Ownership Verification , 1998, PICS.
[18] Jean-Luc Dugelay,et al. Image watermaking for owner and content authentication , 2000, MM 2000.
[19] Shih-Fu Chang,et al. Semifragile watermarking for authenticating JPEG visual content , 2000, Electronic Imaging.
[20] J.E. Mazo,et al. Digital communications , 1985, Proceedings of the IEEE.
[21] Tiago Rosa Maria Paula Queluz. Towards robust, content based techniques for image authentication , 1998, 1998 IEEE Second Workshop on Multimedia Signal Processing (Cat. No.98EX175).
[22] Jiri Fridrich,et al. Robust bit extraction from images , 1999, Proceedings IEEE International Conference on Multimedia Computing and Systems.
[23] Sviatoslav Voloshynovskiy,et al. Watermark copy attack , 2000, Electronic Imaging.
[24] Thierry Pun,et al. Rotation, scale and translation invariant digital image watermarking , 1997, Proceedings of International Conference on Image Processing.
[25] Deepa Kundur,et al. Towards a telltale watermarking technique for tamper-proofing , 1998, Proceedings 1998 International Conference on Image Processing. ICIP98 (Cat. No.98CB36269).
[26] Shih-Fu Chang,et al. SARI: self-authentication-and-recovery image watermarking system , 2001, MULTIMEDIA '01.
[27] Rama Chellappa,et al. A new approach to image feature detection with applications , 1996, Pattern Recognit..
[28] Adi Shamir,et al. On Digital Signatures and Public-Key Cryptosystems. , 1977 .
[29] Sushil K. Bhattacharjee,et al. Compression tolerant image authentication , 1998, Proceedings 1998 International Conference on Image Processing. ICIP98 (Cat. No.98CB36269).
[30] Jean-Luc Dugelay,et al. Introduction au tatouage d’images , 1999, Ann. des Télécommunications.
[31] Bülent Sankur,et al. Strict integrity control of biomedical images , 2001, IS&T/SPIE Electronic Imaging.