Author:
Chang Chin-Chen,Hu Yih-Shin,Lu Tzu-Chuen
Subject
Artificial Intelligence,Computer Vision and Pattern Recognition,Signal Processing,Software
Reference18 articles.
1. Toward secure public-key blockwise fragile authentication watermarking;Barreto;IEE Proc. Vision, Image Signal Process.,2002
2. Hierarchical watermarking for secure image authentication with localization;Celik;IEEE Trans. Image Process.,2002
3. A data-hiding technique with authentication, integration, and confidentiality for electronic patient records;Chao;IEEE Trans. Inf. Technol. Biomed.,2002
4. Eggers, J., Girod, B., 2001. Blind watermarking applied to image authentication. In: Proceedings of IEEE International Conference on Acoustics, Speech and Signal Processing, Salt Lake City, UT, 3, pp. 1977–1980.
5. Applying projection and B-spline to image authentication and remedy;Lin;IEEE Trans. Consumer Electron.,2003
Cited by
103 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献