Watermarking on CNN‐UM for image and video authentication
暂无分享,去创建一个
Joos Vandewalle | Luigi Fortuna | Müstak E. Yalçin | Paolo Arena | Adriano Basile | J. Vandewalle | P. Arena | L. Fortuna | M. Yalçin | A. Basile
[1] Ángel Rodríguez-Vázquez,et al. CMOS design of focal plane programmable array processors , 2001, ESANN.
[2] Tamás Roska,et al. The CNN universal machine: an analogic array computer , 1993 .
[3] Ángel Rodríguez-Vázquez,et al. Toward visual microprocessors , 2002, Proc. IEEE.
[4] Alfred Menezes,et al. Handbook of Applied Cryptography , 2018 .
[5] Gonzalo R. Arce,et al. Joint wavelet compression and authentication watermarking , 1998, Proceedings 1998 International Conference on Image Processing. ICIP98 (Cat. No.98CB36269).
[6] Lin-Bao Yang,et al. Cellular neural networks: theory , 1988 .
[7] Sushil Jajodia,et al. Information Hiding: Steganography and Watermarking-Attacks and Countermeasures , 2000, Advances in Information Security.
[8] Leon O. Chua,et al. Pseudo-random sequence generation using the CNN universal machine with applications to cryptography , 1996, 1996 Fourth IEEE International Workshop on Cellular Neural Networks and their Applications Proceedings (CNNA-96).
[9] Edward J. Delp,et al. Fragile watermarking using the VW2D watermark , 1999, Electronic Imaging.
[10] Donald Ervin Knuth,et al. The Art of Computer Programming, Volume II: Seminumerical Algorithms , 1970 .
[11] Joos Vandewalle,et al. Fragile watermarking and unkeyed hash function implementation for image authentication on CNN-UM , 2002, Proceedings of the 2002 7th IEEE International Workshop on Cellular Neural Networks and Their Applications.
[12] Stephen Wolfram,et al. Cellular Automata And Complexity , 1994 .
[13] Valeri Mladenov,et al. Cellular Neural Networks: Theory And Applications , 2004 .
[14] Pieter Retief Kasselman,et al. Analysis and design of cryptographic hash functions , 1999 .
[15] L.O. Chua,et al. Cellular neural networks , 1993, 1988., IEEE International Symposium on Circuits and Systems.
[16] Edward J. Delp,et al. Perceptual watermarks for digital images and video , 1999, Electronic Imaging.
[17] Howard C. Card,et al. Cellular automata-based pseudorandom number generators for built-in self-test , 1989, IEEE Trans. Comput. Aided Des. Integr. Circuits Syst..
[18] Joos Vandewalle,et al. High speed calculation of cryptographic hash functions by CNN chips , 1998, 1998 Fifth IEEE International Workshop on Cellular Neural Networks and their Applications. Proceedings (Cat. No.98TH8359).
[19] Edward J. Delp,et al. A watermark for digital images , 1996, Proceedings of 3rd IEEE International Conference on Image Processing.
[20] I. Szatmari,et al. Image processing library for the Aladdin Visual Computer , 2002, Proceedings of the 2002 7th IEEE International Workshop on Cellular Neural Networks and Their Applications.
[21] Joos Vandewalle,et al. Watermarking for the authentication of video on CNN-UM , 2002, Proceedings of the 2002 7th IEEE International Workshop on Cellular Neural Networks and Their Applications.
[22] Ton Kalker,et al. Digital watermarking for DVD video copy protection , 2000 .
[23] Ángel Rodríguez-Vázquez,et al. ACE4k: An analog I/O 64×64 visual microprocessor chip with 7-bit analog accuracy , 2002, Int. J. Circuit Theory Appl..
[24] Minerva M. Yeung,et al. Invisible watermarking for image verification , 1998, J. Electronic Imaging.
[25] Anastasios Tefas,et al. Image authentication techniques for surveillance applications , 2001, Proc. IEEE.
[26] Iwan Setyawan,et al. Watermarking digital image and video data. A state-of-the-art overview , 2000 .
[27] Donald Ervin Knuth,et al. The Art of Computer Programming , 1968 .
[28] Marco Tomassini,et al. On the Generation of High-Quality Random Numbers by Two-Dimensional Cellular Automata , 2000, IEEE Trans. Computers.
[29] Gary Friedman,et al. The trustworthy digital camera: restoring credibility to the photographic image , 1993 .
[30] Parimal Pal Chaudhuri,et al. A class of two-dimensional cellular automata and their applications in random pattern testing , 1994, J. Electron. Test..
[31] C. F. Osborne,et al. A digital watermark , 1994, Proceedings of 1st International Conference on Image Processing.
[32] Leon O. Chua,et al. Efficient implementation of neighborhood logic for cellular automata via the Cellular Neural Network Universal Machine , 1997 .
[33] Ángel Rodríguez-Vázquez,et al. ACE4k: An analog I/O 64×64 visual microprocessor chip with 7-bit analog accuracy: Research Articles , 2002 .
[34] Ákos Zarándy. ACE Box: High-performance Visual Computer based on the ACE4k Analogic Array Processor Chip , 2001 .
[35] Shujian Zhang,et al. Minimal cost one-dimensional linear hybrid cellular automata of degree through 500 , 1995, J. Electron. Test..
[36] Min Wu,et al. Watermarking for image authentication , 1998, Proceedings 1998 International Conference on Image Processing. ICIP98 (Cat. No.98CB36269).
[37] S. Zöld,et al. The computational infrastructure of analogic CNN computing. I. The CNN-UM chip prototyping system , 1999 .
[38] Nasir D. Memon,et al. Protecting digital media content , 1998, CACM.
[39] Ángel Rodríguez-Vázquez,et al. ACE16k: A 128x128 Focal Plane Analog Processor with Digital I/O , 2003, Int. J. Neural Syst..
[40] Ton Kalker,et al. Digital Watermarking for DVD Video Copy Protection What Issues Play a Role in Designing an Effective System ? , 2000 .