Author:
Zhang Hong-Bin,Yang Cheng,Quan Xiao-Mei
Publisher
Springer Science and Business Media LLC
Subject
Computational Theory and Mathematics,Computer Science Applications,Hardware and Architecture,Theoretical Computer Science,Software
Reference18 articles.
1. Walton S. Information authentication for a slippery new age.Dr. Dobbs Journal, 1995, 20(4): 18–26.
2. Lin C Y, Chang S F. A robust image authentication method distinguishing JPEG compression from malicious manipulation.IEEE Trans. Circuits and Systems for Video Technology, 2001, 11(2): 153–168.
3. Lin E T, Delp E J. A review of fragile image watermarks. InProc. the Multimedia and Security Workshop (ACM Multimedia'99), Orlando, 1999, pp.25–29.
4. R van Schyndel, Tirkel A, Osborce C. A digital watermark. InProc. the IEEE ICIP, 1994, 2(11): 86–90.
5. Wolfgang R B, Delp E J. Fragile watermarking using the VW2D watermark. InProc. SPIE, Security and Watermarking of Multimedia Contents, San Jose, California, 1999, pp.204–213.
Cited by
7 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献