Chaotic Watermarking for Video Authentication in Surveillance Applications
暂无分享,去创建一个
[1] J. Yorke,et al. Chaos: An Introduction to Dynamical Systems , 1997 .
[2] Minerva M. Yeung,et al. An invisible watermarking technique for image verification , 1997, Proceedings of International Conference on Image Processing.
[3] Mauro Barni,et al. A DCT-domain system for robust image watermarking , 1998, Signal Process..
[4] Deepa Kundur,et al. Digital watermarking for telltale tamper proofing and authentication , 1999, Proc. IEEE.
[5] Jiri Fridrich,et al. New fragile authentication watermark for images , 2000, Proceedings 2000 International Conference on Image Processing (Cat. No.00CH37101).
[6] Shih-Fu Chang,et al. Semifragile watermarking for authenticating JPEG visual content , 2000, Electronic Imaging.
[7] Der-Chyuan Lou,et al. Fault resilient and compression tolerant digital signature for image authentication , 2000, IEEE Trans. Consumer Electron..
[8] Anastasios Tefas,et al. Image authentication using chaotic mixing systems , 2000, 2000 IEEE International Symposium on Circuits and Systems. Emerging Technologies for the 21st Century. Proceedings (IEEE Cat No.00CH36353).
[9] Anastasios Tefas,et al. Image authentication techniques for surveillance applications , 2001, Proc. IEEE.
[10] Hong Heather Yu,et al. A semi-fragile watermarking system for MPEG video authentication , 2002, 2002 IEEE International Conference on Acoustics, Speech, and Signal Processing.
[11] Chaotic parameter modulation with application to digital watermarking , 2002, 2002 IEEE International Conference on Acoustics, Speech, and Signal Processing.
[12] Chai Wah Wu,et al. On the design of content-based multimedia authentication systems , 2002, IEEE Trans. Multim..
[13] Antonio Albiol,et al. Robust motion detector for video surveillance applications , 2003, Proceedings 2003 International Conference on Image Processing (Cat. No.03CH37429).
[14] Qi Tian,et al. A secure and robust approach to scalable video authentication , 2003, 2003 International Conference on Multimedia and Expo. ICME '03. Proceedings (Cat. No.03TH8698).
[15] Deepa Kundur,et al. Analysis and design of secure watermark-based authentication systems , 2006, IEEE Transactions on Information Forensics and Security.
[16] Shih-Fu Chang,et al. New semi-fragile image authentication watermarking techniques using random bias and nonuniform quantization , 2006, IEEE Transactions on Multimedia.