Hash-Based Identification of Sparse Image Tampering
暂无分享,去创建一个
[1] John G. Proakis,et al. Probability, random variables and stochastic processes , 1985, IEEE Trans. Acoust. Speech Signal Process..
[2] Thomas M. Cover,et al. Elements of Information Theory , 2005 .
[3] Bruno O. Shubert,et al. Random variables and stochastic processes , 1979 .
[4] E.J. Candes,et al. An Introduction To Compressive Sampling , 2008, IEEE Signal Processing Magazine.
[5] Bernd Girod,et al. Rate-adaptive codes for distributed source coding , 2006, Signal Process..
[6] Jiri Fridrich,et al. Image watermarking for tamper detection , 1998, Proceedings 1998 International Conference on Image Processing. ICIP98 (Cat. No.98CB36269).
[7] Shih-Kun Huang,et al. Cocktail Watermarking for Digital Image Protection , 2000, IEEE Trans. Multim..
[8] Vishal Monga,et al. Image Authentication Under Geometric Attacks Via Structure Matching , 2005, 2005 IEEE International Conference on Multimedia and Expo.
[9] Kannan Ramchandran,et al. Dither-based secure image hashing using distributed coding , 2003, Proceedings 2003 International Conference on Image Processing (Cat. No.03CH37429).
[10] Hany Farid,et al. Exposing Digital Forgeries Through Specular Highlights on the Eye , 2007, Information Hiding.
[11] Aaron D. Wyner,et al. The rate-distortion function for source coding with side information at the decoder , 1976, IEEE Trans. Inf. Theory.
[12] J. Wolfowitz. The rate distortion function for source coding with side information at the decoder , 1979 .
[13] Bernd Girod,et al. Distributed Video Coding , 2005, Proceedings of the IEEE.
[14] Qibin Sun,et al. Robust Hash for Detecting and Localizing Image Tampering , 2007, 2007 IEEE International Conference on Image Processing.
[15] Robert D. Nowak,et al. Signal Reconstruction From Noisy Random Projections , 2006, IEEE Transactions on Information Theory.
[16] Bernd Girod,et al. Image Authentication Based on Distributed Source Coding , 2007, 2007 IEEE International Conference on Image Processing.
[17] Richard G. Baraniuk,et al. Multiscale Random Projections for Compressive Classification , 2007, 2007 IEEE International Conference on Image Processing.
[18] Deepa Kundur,et al. Digital watermarking for telltale tamper proofing and authentication , 1999, Proc. IEEE.
[19] Stefano Tubaro,et al. Rate allocation for robust video streaming based on distributed video coding , 2008, Signal Process. Image Commun..
[20] E.J. Candes. Compressive Sampling , 2022 .
[21] Ramarathnam Venkatesan,et al. Robust perceptual image hashing via matrix invariants , 2004, 2004 International Conference on Image Processing, 2004. ICIP '04..
[22] Stephen P. Boyd,et al. Convex Optimization , 2004, Algorithms and Theory of Computation Handbook.
[23] Stephen P. Boyd,et al. Enhancing Sparsity by Reweighted ℓ1 Minimization , 2007, 0711.1612.
[24] I. Miller. Probability, Random Variables, and Stochastic Processes , 1966 .
[25] Ramarathnam Venkatesan,et al. Robust image hashing , 2000, Proceedings 2000 International Conference on Image Processing (Cat. No.00CH37101).
[26] Guillermo Sapiro,et al. Image inpainting , 2000, SIGGRAPH.
[27] Hany Farid,et al. Exposing digital forgeries through chromatic aberration , 2006, MM&Sec '06.
[28] Bernd Girod,et al. Spatial models for localization of image tampering using distributed source codes , 2007, PCS 2007.
[29] Hany Farid,et al. Detecting Photographic Composites of People , 2008, IWDW.
[30] Ping Wah Wong,et al. A public key watermark for image verification and authentication , 1998, Proceedings 1998 International Conference on Image Processing. ICIP98 (Cat. No.98CB36269).
[31] Bernd Girod,et al. Blind watermarking applied to image authentication , 2001, 2001 IEEE International Conference on Acoustics, Speech, and Signal Processing. Proceedings (Cat. No.01CH37221).
[32] Hany Farid,et al. Exposing digital forgeries in scientific images , 2006, MM&Sec '06.
[33] Richard G. Baraniuk,et al. Detection and estimation with compressive measurements , 2006 .
[34] E. Berg,et al. In Pursuit of a Root , 2007 .
[35] Pierre Vandergheynst,et al. Compressed Sensing and Redundant Dictionaries , 2007, IEEE Transactions on Information Theory.
[36] Richard G. Baraniuk,et al. The smashed filter for compressive classification and target recognition , 2007, Electronic Imaging.
[37] A. Murat Tekalp,et al. Hierarchical watermarking for secure image authentication with localization , 2002, IEEE Trans. Image Process..
[38] Terence Tao,et al. The Dantzig selector: Statistical estimation when P is much larger than n , 2005, math/0506081.
[39] Michael B. Wakin,et al. An Introduction To Compressive Sampling [A sensing/sampling paradigm that goes against the common knowledge in data acquisition] , 2008 .
[40] Allen Gersho,et al. Vector quantization and signal compression , 1991, The Kluwer international series in engineering and computer science.
[41] Marco Dalai,et al. The DISCOVER codec: Architecture, Techniques and Evaluation , 2007, PCS 2007.
[42] Min Wu,et al. Robust and secure image hashing , 2006, IEEE Transactions on Information Forensics and Security.