Marcas d'Água Frágeis de Autenticação para Imagens em Tonalidade Contínua e Esteganografia para Imagens Binárias e Meio-Tom
暂无分享,去创建一个
[1] Minerva M. Yeung,et al. An invisible watermarking technique for image verification , 1997, Proceedings of International Conference on Image Processing.
[2] Sun Fu. Data Hiding in Halftone Images by Stochastic Error Diffusion , 2004 .
[3] H. Y. Kim,et al. Toward a secure public-key blockwise fragile authentication watermarking , 2001, Proceedings 2001 International Conference on Image Processing (Cat. No.01CH37205).
[4] Soo-Chang Pei,et al. Hybrid pixel-based data hiding and block-based watermarking for error-diffused halftone images , 2003, IEEE Trans. Circuits Syst. Video Technol..
[5] Hagit Hel-Or. Watermarking and copyright labeling of printed images , 2001, J. Electronic Imaging.
[6] Alfred Menezes,et al. Handbook of Applied Cryptography , 2018 .
[7] Ping Wah Wong,et al. A Watermark for Image Integrity and Ownership Verification , 1998, PICS.
[8] K. Nishimura,et al. Probability to meet in the middle , 2005, Journal of Cryptology.
[9] Donald E. Knuth,et al. Digital halftones by dot diffusion , 1987, TOGS.
[10] Chang-Tsun Li,et al. Image authentication and integrity verification via content-based watermarks and a public key cryptosystem , 2000, Proceedings 2000 International Conference on Image Processing (Cat. No.00CH37101).
[11] Gary Friedman,et al. The trustworthy digital camera: restoring credibility to the photographic image , 1993 .
[12] Paulo S. L. M. Barreto,et al. Pitfalls in public key watermarking , 1999, XII Brazilian Symposium on Computer Graphics and Image Processing (Cat. No.PR00481).
[13] Nasir Memon,et al. Secret and public key image watermarking schemes for image authentication and ownership verification , 2001, IEEE Trans. Image Process..
[14] Adi Shamir,et al. A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.
[15] Oscar C. Au,et al. Data hiding watermarking for halftone images , 2002, IEEE Trans. Image Process..
[16] Nasir D. Memon,et al. Counterfeiting attacks on oblivious block-wise independent invisible watermarking schemes , 2000, IEEE Trans. Image Process..
[17] P. Barreto,et al. Toward secure public-key blockwise fragile authentication watermarking , 2002 .
[18] Robert Ulichney,et al. Digital Halftoning , 1987 .
[19] Ping Wah Wong,et al. A public key watermark for image verification and authentication , 1998, Proceedings 1998 International Conference on Image Processing. ICIP98 (Cat. No.98CB36269).
[20] Oscar C. Au,et al. Data hiding by smart pair toggling for halftone images , 2000, 2000 IEEE International Conference on Acoustics, Speech, and Signal Processing. Proceedings (Cat. No.00CH37100).