Author:
Tsai Piyu,Hu Yu-Chen,Chang Chin-Chen
Subject
Electrical and Electronic Engineering,Computer Vision and Pattern Recognition,Signal Processing,Software
Reference13 articles.
1. S. Bhattacharjee, M. Kutter, Compression tolerant image authentication, in: Proceedings of IEEE International Conference on Image Processing, Chicago, IL, October 1998, Vol. 1, pp. 435–439.
2. Hierarchical watermarking for secure image authentication with localization;Celik;IEEE Trans. Image Process.,2002
3. J. Eggers, B. Girod, Blind watermarking applied to image authentication, in: Proceedings of IEEE International Conference on Acoustics, Speech and Signal Processing ICASSP ’01, Salt Lake City, UT, May 2001, pp. 1977–1980.
4. J. Fridrich, Methods for tamper detection in digital image, in: Proceedings of Multimedia and Security Workshop at ACM Multimedia, Orlando, FL, 1999, pp. 29–34.
5. The trustworthy digital camera;Friedman;IEEE Trans. Consumer Electron.,1993
Cited by
24 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献