Author:
He HongJie,Zhang JiaShu,Tai Heng-Ming
Publisher
Springer Berlin Heidelberg
Reference12 articles.
1. Yeung, M.M., Mintzer, F.: An invisible watermarking technique for image verification. In: Proc. IEEE Int. Conf. Image Processing, vol. 2, pp. 680–683 (1997)
2. Wong, P.: A public key watermark for image verification and authentication. In: Proc. IEEE Int. Conf. Image Processing, Chicago, IL, pp. 425–429 (1998)
3. Barreto, P., Kim, H., Rijmen, V.: Toward secure public-key block-wise fragile authentication watermarking. IEE Proceedings-Vision, Image and Signal Processing (149), 57–62 (2002)
4. Holliman, M., Memon, N.: Counterfeiting attacks on oblivious block-wise independent invisible watermarking schemes. IEEE Trans. Image Processing 9(3), 432–441 (2000)
5. Fridrich, J.: Security of fragile authentication watermarks with localization. In: Proc. SPIE, Security and Watermarking of Multimedia Contents, San Jose, CA, pp. 691–700 (January 2002)
Cited by
23 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献