共 50 条
- [1] Using entropy for image and video authentication watermarks [J]. SECURITY, STEGANOGRAPHY, AND WATERMARKING OF MULTIMEDIA CONTENTS VIII, 2006, 6072
- [2] Image authentication algorithm based on chaos and dual-bit watermarks [J]. Tongxin Xuebao/Journal on Communications, 2007, 28 (SUPPL.): : 177 - 180
- [3] IMAGE AUTHENTICATION AND TAMPER DETECTION USING TWO COMPLEMENTARY WATERMARKS [J]. 2009 16TH IEEE INTERNATIONAL CONFERENCE ON IMAGE PROCESSING, VOLS 1-6, 2009, : 4257 - 4260
- [4] Image authentication using hierarchical semi-fragile watermarks [J]. E-BUSINESS AND TELECOMMUNICATION NETWORKS, 2006, : 241 - +
- [7] Restoration in secure text document image authentication using erasable watermarks [J]. COMPUTATIONAL INTELLIGENCE AND SECURITY, PT 2, PROCEEDINGS, 2005, 3802 : 661 - 668
- [9] A multiple watermarks algorithm for image content authentication [J]. Journal of Central South University, 2012, 19 : 2866 - 2874
- [10] 2D barcodes as watermarks in image authentication [J]. 6TH IEEE/ACIS INTERNATIONAL CONFERENCE ON COMPUTER AND INFORMATION SCIENCE, PROCEEDINGS, 2007, : 432 - +