AACI: The mechanism for approximate authentication and correction of images
暂无分享,去创建一个
[1] Gonzalo R. Arce,et al. Approximate image message authentication codes , 2001, IEEE Trans. Multim..
[2] Dongvu Tonien,et al. Unconditionally Secure Approximate Message Authentication , 2009, IWCC.
[3] Moni Naor,et al. Universal one-way hash functions and their cryptographic applications , 1989, STOC '89.
[4] Harald Niederreiter,et al. Probability and computing: randomized algorithms and probabilistic analysis , 2006, Math. Comput..
[6] Feller William,et al. An Introduction To Probability Theory And Its Applications , 1950 .
[7] Rita Noumeir,et al. Methods for image authentication: a survey , 2008, Multimedia Tools and Applications.
[8] Chien-Chang Chen,et al. Robust image authentication method surviving JPEG lossy compression , 1997, Electronic Imaging.
[9] Min Wu,et al. Robust and secure image hashing , 2006, IEEE Transactions on Information Forensics and Security.
[10] Alfred Menezes,et al. Handbook of Applied Cryptography , 2018 .
[11] A.H. Tewfik,et al. When seeing isn't believing [multimedia authentication technologies] , 2004, IEEE Signal Processing Magazine.
[12] Lize Joubert. When seeing is not believing : zoology , 2014 .
[13] Christoph Ruland,et al. Soft Input Decryption , 2006 .
[14] Christoph Ruland,et al. Soft Authentication and Correction of Images , 2013 .
[15] D. Storck,et al. A New Approach to Integrity of Digital Images , 1996, IFIP World Conference on Mobile Communications.
[16] Shih-Fu Chang,et al. SARI: self-authentication-and-recovery image watermarking system , 2001, MULTIMEDIA '01.
[17] Hung-Hsu Tsai,et al. GA-based adaptive image watermarking with JND profile and fuzzy inference system , 2005 .
[18] Rafael C. González,et al. Local Determination of a Moving Contrast Edge , 1985, IEEE Transactions on Pattern Analysis and Machine Intelligence.
[19] Natasa Zivic,et al. Noise tolerant image authentication with error localization and correction , 2012, 2012 50th Annual Allerton Conference on Communication, Control, and Computing (Allerton).
[20] Giovanni Di Crescenzo,et al. Approximate Message Authentication and Biometric Entity Authentication , 2005, Financial Cryptography.