共 10 条
[1]
Circular interpretation of histogram for reversible watermarking
[J].
2001 IEEE FOURTH WORKSHOP ON MULTIMEDIA SIGNAL PROCESSING,
2001,
:345-350
[2]
Distortion bounded authentication techniques
[J].
SECURITY AND WATERMARKING OF MULTIMEDIA CONTENTS II,
2000, 3971
:164-174
[3]
Towards robust, content based techniques for image authentication
[J].
1998 IEEE SECOND WORKSHOP ON MULTIMEDIA SIGNAL PROCESSING,
1998,
:297-302
[4]
SCHNEIDER M, 1996, P ICIP 96, V3, P16
[5]
WALTON S, 1995, DR DOBBS J, V20, P18
[6]
WOLF W, 2001, IEEE T MULTIMEDIA, V8, P38
[8]
Limitations and requirements of content-based multimedia authentication systems
[J].
SECURITY AND WATERMARKING OF MULTIMEDIA CONTENTS III,
2001, 4314
:241-252
[9]
Wu M, 1998, 1998 INTERNATIONAL CONFERENCE ON IMAGE PROCESSING - PROCEEDINGS, VOL 2, P437, DOI 10.1109/ICIP.1998.723413
[10]
Xie LH, 1998, 1998 INTERNATIONAL CONFERENCE ON IMAGE PROCESSING - PROCEEDINGS, VOL 2, P427, DOI 10.1109/ICIP.1998.723409