Author:
Lu T. -C.,Chang C. -C.,Liu Y. -L.
Subject
Computer Graphics and Computer-Aided Design,Computer Vision and Pattern Recognition
Reference20 articles.
1. S. Bhattacharjee and M. Kutter, “Compression Tolerant Image Authentication,” in Proceedings of IEEE International Conference on Image Processing (Chicago, 1998), Vol. 1, pp. 435–439.
2. S. C. Byun, S. K. Lee, and A. H. Tewfik, “A SVD-Based Fragile Watermarking Scheme for Image Authentication,” in Proceedings of International Workshop on Digital Watermarking (Seoul, Korea, 2002), pp. 211–219.
3. J. Dittmann, A. Steinmetz, and R. Steinmetz, “Content-Based Digital Signature for Motion Pictures Authentication and Content-Fragile Watermarking,” in Proceedings of IEEE Multimedia Systems, Multimedia Computing and Systems (Florence, Italy, 1999), Vol. 1, pp. 574–579.
4. E. Izquierdo and V. Guerra, “An Ill-Posed Operator for Secure Image Authentication,” IEEE Transactions on Circuits and Systems for Video Technology 13(8), 842–852 (2003).
5. D. Kundur and D. Hatzinakos, “Digital Watermarking for Telltale Tamper-Proofing and Authentication,” Proceedings of the IEEE Special Issue on Identification and Protection of Multimedia Information 87(7), 1167–1180 (1999).
Cited by
9 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献