Author:
Huo Yaoran,He Hongjie,Chen Fan
Publisher
Springer Science and Business Media LLC
Subject
Computer Networks and Communications,Hardware and Architecture,Media Technology,Software
Reference20 articles.
1. Che S, Ma B, Che Z (2007) Semi-fragile image watermarking algorithm based on visual features. In: Proc. of international conference on wavelet analysis and pattern recognition. Beijing, China, pp 382–387
2. Fridrich J, Goljan M, Du R (2001) Invertible authentication watermark for JPEG images. In: Proc. Of IEEE internal conference on information technology, pp 223–227
3. Fridrich J, Goljan M, Memon N (2002) Cryptanalysis of the Yeung-Mintzer fragile watermarking technique. J Electron Imaging 11:262–274
4. Han S, Chu C (2010) Content-based image authentication current status, issues, and challenges. Int J Inf Secur 9:19–32
5. Haouzia A, Noumeir R (2008) Methods for image authentication: a survey. Multimed Tools Appl 39:1–46
Cited by
22 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献