Author:
Chen Wei-Che,Wang Ming-Shi
Subject
Artificial Intelligence,Computer Science Applications,General Engineering
Reference23 articles.
1. Pattern recognition with fuzzy objective function algorithms;Bezdec,1981
2. Bhattacharjee, S., & Kutter, M. (1998). Compression tolerant image authentication. In Proceedings of IEEE international conference on image processing (pp. 435–439).
3. Hierarchical watermarking for secure image authentication with localization;Celik;IEEE Transactions on Image Processing,2000
4. A watermarking-based image ownership and tampering authentication scheme;Chang;Pattern Recognition Letters,2006
5. Eggers, J. J., & Girod, B. (2001). Blind watermarking applied to image authentication. In Proceedings of IEEE international conference on acoustics, speech and signal processing (pp. 1977–1980).
Cited by
83 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献