Author:
Yi Faliu,Jeoung Yousun,Geng Ruili,Moon Inkyu
Publisher
Springer International Publishing
Reference30 articles.
1. Ghoshal, N., Mandal, J.K.: Image authentication technique in frequency domain based on discrete Fourier transformation (IATFDDFT). arXiv preprint arXiv:1212.3371 (2012)
2. Bartolini, F., et al.: Image authentication techniques for surveillance applications. Proc. IEEE 89, 1403–1418 (2011)
3. Petitcolas, F., Ross, J.A., Markus, G.K.: Information hiding-a survey. Proc. IEEE 87, 1062–1078 (1999)
4. Champakamala, N., Padmini, K., Radhika, D.K.: Least significant bit algorithm for image steganography. Int. J. Adv. Comput. Technol. 3, 3–38 (2013)
5. Rey, C., Dugelay, J.L.: A survey of watermarking algorithms for image authentication. EURASIP J. Adv. Signal Process. 6, 218932 (2002)