Author:
Choi Yong Soo,Park Jong Hyuk
Publisher
Springer Science and Business Media LLC
Subject
Computer Networks and Communications,Hardware and Architecture,Media Technology,Software
Reference20 articles.
1. Belongie S, Malik J, Puzicha J (2002) Shape matching and object recognition using shape contexts. IEEE Trans Pattern Anal Mach Intell 24(4):509–522
2. Bhatacherjee S, Kutter M (1998) Compression tolerant image authentication. Proc. IEEE Conf. on Image Processing
3. Dittman J, Steinmetz A, Steinmetz R (1999) Content based digital signature for motion picture authentication and content fragile watermarking. Proc. IEEE Int. Conf. on Multimedia Computing and Systems, pp 209–213
4. Fridrich J, Goljan M (2000) Robust hash functions for digital watermarking. Proc. IEEE International Conf. on Information Technology: Coding and Computing, pp 178–183, Mar
5. Fridrich J, Soukal D, Lukas J (2003) Detection of copymove forgery in digital images. Proceedings of Digital Forensic Research Workshop
Cited by
34 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献