Author:
Wang Xiang-yang,Zhang Si-yu,Wen Tao-tao,Xu Huan,Yang Hong-ying
Publisher
Springer Science and Business Media LLC
Subject
Artificial Intelligence,Computer Vision and Pattern Recognition
Reference31 articles.
1. Winkler T, Rinner B (2014) Security and privacy protection in visual sensor networks: a survey. ACM Comput Surv 47(1):2
2. Zhou Z, Wang Y, Wu QMJ, Yang C-N, Sun X (2017) Effective and efficient global context verification for image copy detection. IEEE Trans Inf Forensics Secur 12(1):48–63
3. Verma VS, Jha RK (2015) An overview of robust digital image watermarking. IETE Tech Rev 32(6):479–496
4. CaoJ, Li H, Luo W (2016) A secure watermarking technique without loss of robustness. In: 2016 IEEE international conference on image processing (ICIP). Phoenix, pp 2723–2726
5. Xia Z, Wang X, Sun X (2016) Steganalysis of LSB matching using differences between nonadjacent pixels. Multimed Tools Appl 75(4):1947–1962
Cited by
13 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献