1 |
Wong P W Memon N Secret and public key imagewatermarking schemes for image authentication and ownership verificationIEEE Transactions on Image Processing 2001 10(10)15931601. doi:10.1109/83.951543
|
2 |
Memon N Vora P Yeo B L et al.Distortion bounded authentication techniquesIn: Proceedings of the SPIE on Security and Watermarkingof Multimedia Contents IISan JoseSPIE 2000 164174
|
3 |
Queluz M P TowardsRobust, content based techniques for image authenticationIEEE Second Workshop on Multimedia Signal ProcessingRedondo BeachIEEE Press 1998 297302
|
4 |
Rey C Dugelay J L Blind detection of maliciousalterations on still image using robust watermarksIEE Seminar on Secure Images and Image AuthenticationLondonIEE Press 2000 716
|
5 |
Xie L Arce G R A class of authentication digitalwatermarks for secure multimedia communicationIEEE Transactions on Image Processing 2001 10(11)17541764. doi:10.1109/83.967402
|
6 |
Wo Y Han G Q Zhang B A new feature-based image content authentication algorithmChinese Journal of Computers 2005 28(1)105112(in Chinese)
|
7 |
Wo Y Han G Q Zhang J W et al.New image content authentication algorithm basedon wavelet transform and morphologicJournalon Communications 2005 26(8)915(in Chinese)
|
8 |
Wo Y Han G Q Blind watermarking algorithmbased on wavelet transform and visual perception characteristicsJournal of South China University of Technology (NaturalScience Edition) 2005 33(4)2933(in Chinese)
|
9 |
Burt P Adelson E The Laplacian pyramid as acompact image codeIEEE Transactions onCommunications 1983 31(4)532540. doi:10.1109/TCOM.1983.1095851
|
10 |
Song J Delp E J A generalization of morphologicalfilters using multiple structuring elementsIEEE International Symposium on Circuits and Systems 1989 2(3)991994. doi:10.1109/ISCAS.1989.100518
|