Author:
Le Bac,Nguyen Hung,Tran Dat
Publisher
Springer Science and Business Media LLC
Reference25 articles.
1. Ryoichi, S., Hiroshi, Y.: Consideration on copyright and illegal copy countermeasures under IT revolution. Joho Shori Gakkai Kenkyu Hokoku 2001(52), 37–42 (2001)
2. Ramos, C., Reyes, R.R., Miyatake, M.N., Meana, H.P.: Image authentication scheme based on self-embedding watermarking. Lecture Notes Comput. Sci. 5856, 1005–1012 (2009)
3. MeenakshiDevi, P., Venkatesan, M., Duraiswamy, K.: A fragile watermarking scheme for image authentication with tamper localization using integer wavelet transform. J. Comput. Sci. 5(11), 831–837 (2009)
4. Hassanien, E.: Hiding Iris data for authentication of digital images using wavelet theory. Pattern Recognit. Image Anal. 16, 637–643 (December 2006)
5. Allah, M.M.A.: Embedded biometric data for a secure authentication watermarking. In: IASTED International Conference: Signal Processing, Pattern Recognition, and Applications, pp. 191–196 (2007)
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献