Author:
Choi Ka-Cheng,Pun Chi-Man
Publisher
Springer Science and Business Media LLC
Subject
Computer Networks and Communications,Hardware and Architecture,Media Technology,Software
Reference28 articles.
1. Alavianmehr MA et al. (2012) “A Semi-Fragile Lossless Data Hiding Scheme Based on Multi-Level Histogram Shift in Image Integer Wavelet Transform Domain,” in Telecommunications (IST), 2012 Sixth International Symposium on, pp. 976–981
2. Ali MA, Ediriginshe EA (2012) “High-Capacity Reversible Multi-Layer Watermarking for H.264/AVC Video,” in Computing and Convergence Technology (ICCCT), 2012 7th International Conference on, pp. 631–636
3. An L et al. (2010) “Robust Lossless Data Hiding: Analysis and Evaluation,” in High Performance Computing and Simulation (HPCS), 2010 International Conference on, pp. 512–516
4. Caronni G (1995) “Assuring Ownership Rights for Digital Images,” in Verläßliche IT-Systeme, ed: Vieweg + Teubner Verlag, pp. 251–263
5. Celik MU et al (2006) “Lossless watermarking for image authentication: a New Framework and an Implementation”. Image Process IEEE Trans 15:1042–1049
Cited by
6 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献