Iterative compensation schemes for multimedia content authentication
- 31 July 2009
- journal article
- Published by Elsevier BV in Journal of Visual Communication and Image Representation
- Vol. 20 (5), 303-311
- https://doi.org/10.1016/j.jvcir.2009.03.010
Abstract
No abstract availableKeywords
This publication has 16 references indexed in Scilit:
- Improved image authentication using closed-form compensation and spread-spectrum watermarkingInternational Conference on Acoustics, Speech, and Signal Processing (ICASSP), 2008
- Compensated Signature Embedding Based Multimedia Content Authentication SystemIEEE International Conference on Image Processing (ICIP), 2007
- Fragile Watermark for Tamper Detection using Structural Distortion MeasurePublished by Institute of Electrical and Electronics Engineers (IEEE) ,2007
- Robust Hash for Detecting and Localizing Image TamperingPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2007
- A Set Theoretic Framework for Watermarking and Its Application to Semifragile Tamper DetectionIEEE Transactions on Information Forensics and Security, 2006
- Region of Interest Fragile Watermarking for Image AuthenticationPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2006
- A Survey of Watermarking Algorithms for Image AuthenticationEURASIP Journal on Advances in Signal Processing, 2002
- Semifragile watermarking for authenticating JPEG visual contentPublished by SPIE-Intl Soc Optical Eng ,2000
- Fragile watermarking using the VW2D watermarkPublished by SPIE-Intl Soc Optical Eng ,1999
- Image Restoration by the Method of Convex Projections: Part 1ߞTheoryIEEE Transactions on Medical Imaging, 1982