Funder
Natural Science Foundation of Fujian Province
Education-Scientific research Project for Middle-aged and Young of Fujian Province
Open Fund of Engineering Research Center for ICH Digitalization and Multi-Source Information Fusion of Fujian Province
Publisher
Springer Science and Business Media LLC
Subject
Computer Networks and Communications,Hardware and Architecture,Media Technology,Software
Reference33 articles.
1. Ahmed F, Siyal MY, Abbas VU (2010) A Secure and Robust Hash-Based Scheme for Image Authentication. Signal Process 90(5):1456–1470
2. Chan CS, Chang CC (2007) An Efficient Image Authentication Method Based on Hamming Code. Pattern Recognition 40(2):681–690
3. Chang CC, Chou YC, Kieu TD (2008) An Information Hiding Scheme Using Sudoku. In: Proceedings of the 3rd International Conference on Innovative Computing Information and Control. IEEE, Liaoning, pp 17–22
4. Chen YL, Yau HT, Yang GJ (2013) A Maximum Entropy-Based Chaotic Time-Variant Fragile Watermarking Scheme for Image Tampering Detection. Entropy 15(8):3170–3185
5. Ding W, Xie Y, Wang Y (2019) Image Authentication and Tamper Localization Based on Relative Difference between DCT Coefficient and Its Estimated Value. Multimed Tools Appl 78(5):5305–5328
Cited by
14 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献