共 50 条
- [2] Data Hiding and Integrity Verification based on Quotient Value Differencing and Merkle Tree [J]. Arabian Journal for Science and Engineering, 2023, 48 : 1793 - 1805
- [4] An Image Authentication Scheme Using Merkle Tree Mechanisms [J]. FUTURE INTERNET, 2019, 11 (07):
- [5] Data Hiding Using Quotient Value Differencing and Remainder Value Substitution Avoiding Incorrect Extraction Problem [J]. SENSING AND IMAGING, 2021, 22 (01):
- [6] Data Hiding Using Quotient Value Differencing and Remainder Value Substitution Avoiding Incorrect Extraction Problem [J]. Sensing and Imaging, 2021, 22
- [7] Image tamper detection using mathematical morphology [J]. 2007 IEEE INTERNATIONAL CONFERENCE ON IMAGE PROCESSING, VOLS 1-7, 2007, : 2897 - 2900
- [8] A Fragile Watermarking Scheme Exploiting Neural Tree for Image Tamper Detection [J]. PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON SOFT COMPUTING FOR PROBLEM SOLVING (SOCPROS 2011), VOL 2, 2012, 131 : 547 - 554
- [9] Image Steganography using Pixel-Value Differencing [J]. PROCEEDINGS OF THE SECOND INTERNATIONAL SYMPOSIUM ON ELECTRONIC COMMERCE AND SECURITY, VOL II, 2009, : 109 - 112
- [10] Singular Value Decomposition (SVD) based Image Tamper Detection Scheme [J]. PROCEEDINGS OF THE 5TH INTERNATIONAL CONFERENCE ON INVENTIVE COMPUTATION TECHNOLOGIES (ICICT-2020), 2020, : 695 - 699