Study on watermarking scheme using threshold value and S-Box
暂无分享,去创建一个
[1] Min Wu,et al. Data hiding in binary image for authentication and annotation , 2004, IEEE Transactions on Multimedia.
[2] Behrouz A. Forouzan. Cryptography & Network Security , 2007 .
[3] William Stallings,et al. Cryptography and network security , 1998 .
[4] Behrouz A. Forouzan,et al. Cryptography and network security , 1998 .
[5] Minerva M. Yeung,et al. An invisible watermarking technique for image verification , 1997, Proceedings of International Conference on Image Processing.
[6] Stefano Tubaro,et al. Hash-Based Identification of Sparse Image Tampering , 2009, IEEE Transactions on Image Processing.
[7] Hae Yong Kim. A new public-key authentication watermarking for binary document images resistant to parity attacks , 2005, IEEE International Conference on Image Processing 2005.
[8] Rita Noumeir,et al. Methods for image authentication: a survey , 2008, Multimedia Tools and Applications.
[9] Ingemar J. Cox,et al. Digital Watermarking and Steganography , 2014 .
[10] Shuangyuan Yang,et al. Content-based image authentication: current status, issues, and challenges , 2007, International Conference on Semantic Computing (ICSC 2007).
[11] Nasir Memon,et al. Secret and public key image watermarking schemes for image authentication and ownership verification , 2001, IEEE Trans. Image Process..
[12] Ping Wah Wong,et al. A public key watermark for image verification and authentication , 1998, Proceedings 1998 International Conference on Image Processing. ICIP98 (Cat. No.98CB36269).
[13] Nasir D. Memon,et al. Counterfeiting attacks on oblivious block-wise independent invisible watermarking schemes , 2000, IEEE Trans. Image Process..