Author:
Chen Fan,He Hongjie,Huo Yaoran
Funder
National Natural Science Foundation of China
Science and Technique Foundation of Tibet Autonomous Region
the Science and Technology Innovation Talent Project of Sichuan Province
Publisher
Springer Science and Business Media LLC
Subject
Computer Networks and Communications,Hardware and Architecture,Media Technology,Software
Reference34 articles.
1. Didi R, Horng SJ, Fan PZ, Wang X, Khan MK (2012) An efficient copyright protection scheme for e-government document images. IEEE Multimed 19(3):62–73
2. Fridrich J, Goljan M (1999) Images with self-correcting capabilities. Proc ICIP’99, Kobe, Japan
3. Fridrich J, Goljan M, Memon M (2002) Cryptanalysis of the yeung-mintzer fragile watermarking technique. J Electron Imag 11(4):262–274
4. Han S, Chu C (2010) Content-based image authentication current status, issues, and challenges. Int J Inf Secur 9:19–32
5. Haouzia A, Noumeir R (2008) Methods for image authentication: a survey, multimedia tools and applications. 39:1–46
Cited by
20 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献