Subject
Artificial Intelligence,Computer Vision and Pattern Recognition,Signal Processing,Software
Reference9 articles.
1. Celik, M., Sharma, G., Saber, E., 2001. A hierarchical image authentication watermark with improved localization and security. In: Proc. ICIP, vol. II, pp. 502–505
2. Coppersmith, D., Mintzer, F., Tresser, C., Wu, C.W., Yeung, M.M., 1999. Fragile imperceptible digital watermark with privacy control. In: Proc. SPIE, Security and Watermarking of Multimedia Contents. San Jose, California, pp. 79–84
3. Fridrich, J., 2002. Security of fragile authentication watermarks with localization. In: Proc. SPIE Photonic West, vol. 4675, Electronic Imaging 2002, Security and Watermarking of Multimedia Contents. San Jose, California, pp. 691–700
4. Counterfeiting attacks on oblivious block-wise independent invisible watermarking schemes;Holliman;IEEE Trans. Image Process.,1997
5. Suthaharan, S., 2003a. A perceptually significant block-edge impairment metric for digital video coding. In: Proc. IEEE Internat. Conf. on Acoustics, Speech and Signal Processing 2003 (ICASSP’03), vol. III, pp. 681–684
Cited by
78 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献