Katoh, M.[Mitsutaka],
Ohmae, K.[Kouichi],
Sonoda, S.[Shinya],
Yanagida, M.[Masahito],
Senga, M.[Masanori],
Image processing device and method for identifying an input image,
and copier scanner and printer including same,
US_Patent5,845,008, Dec 1, 1998
WWW Link.
BibRef
9812
And:
US_Patent6,289,125, Sep 11, 2001
WWW Link. preprint a pattern, detect and do not copy.
BibRef
Brassil, J.T.,
Low, S.,
Maxemchuk, N.F.,
Copyright protection for the electronic distribution of text documents,
PIEEE(87), No. 7, July 1999, pp. 1181-1196.
IEEE DOI
9907
BibRef
Brzakovic, D.,
Vujovic, N.,
Authentication of Random Patterns by Finding a Match in an
Image Database,
IVC(14), No. 7, July 1996, pp. 485-499.
Elsevier DOI
9607
Find an exact match of a random texture.
Apply to authentication of documents where random fibers are embedded.
BibRef
Oruanaidh-Ruanaidh, J.J.K.,
Dowling, W.J.,
Boland, F.M.,
Watermarking Digital Images for Copyright Protection,
VISP(143), No. 4, August 1996, pp. 250-256.
9611
BibRef
Earlier:
Phase watermarking of digital images,
ICIP96(III: 239-242).
IEEE DOI
9610
BibRef
Barni, M.[Mauro],
Bartolini, F.[Franco],
Cappellini, V.[Vito],
Piva, A.[Alessandro],
Copyright Protection of Digital Images by Embedded Unperceivable Marks,
IVC(16), No. 12-13, 24 August 1998, pp. 897-906.
Elsevier DOI
BibRef
9808
Low, S.H.,
Maxemchuk, N.F.,
Lapone, A.M.,
Document Identification for Copyright Protection
Using Centroid Detection,
Commun(46), No. 3, March 1998, pp. 372-383.
9804
BibRef
Brassil, J.T.,
Low, S.H.,
Maxemchuk, N.F.,
O'Gorman, L.,
Marking text features of document images to deter illicit dissemination,
ICPR94(B:315-319).
IEEE DOI
9410
BibRef
Barnett, R.,
Pearson, D.,
Attack Operators for Digitally Watermarked Images,
VISP(145), No. 4, August 1998, pp. 271-279.
9810
BibRef
Memon, N.[Nasir],
Wong, P.W.[Ping Wah],
Protecting Digital Media Content,
CACM(41), No. 7, July 1998, pp. 35-43.
Adding visible and invisible watermarks
BibRef
9807
Memon, N.,
Wong, P.W.[Ping Wah],
A buyer-seller watermarking protocol,
IP(10), No. 4, April 2001, pp. 643-649.
IEEE DOI
0104
BibRef
Wong, P.W.[Ping Wah],
Memon, N.,
Secret and public key image watermarking schemes for image
authentication and ownership verification,
IP(10), No. 10, October 2001, pp. 1593-1601.
IEEE DOI
0111
BibRef
Holliman, M.,
Memon, N.,
Counterfeiting Attacks on Oblivious Block-wise Independent Invisible
Watermarking Schemes,
IP(9), No. 3, March 2000, pp. 432-441.
IEEE DOI
0003
BibRef
Wong, P.W.[Ping Wah],
A public key watermark for image verification and authentication,
ICIP98(I: 455-459).
IEEE DOI
9810
BibRef
Chen, T.S.,
Chang, C.C.,
Hwang, M.S.,
A Virtual Image Cryptosystem Based upon Vector Quantization,
IP(7), No. 10, October 1998, pp. 1485-1488.
IEEE DOI
BibRef
9810
Augot, D.,
Boucqueau, J.M.,
Delaigle, J.F.,
Fontaine, C.,
Goray, E.,
Secure delivery of images over open networks,
PIEEE(87), No. 7, July 1999, pp. 1251-1266.
IEEE DOI
9907
BibRef
Low, S.H.,
Maxemchuk, N.F.,
Capacity of Text Marking Channel,
SPLetters(7), No. 12, December 2000, pp. 345-347.
IEEE Top Reference.
0011
BibRef
Earlier: A2, A1:
Marking Text Documents,
ICIP97(III: 13).
IEEE DOI
BibRef
Burgett, S.,
Koch, E.,
Zhao, J.,
Copyright Labeling of Digitized Image Data,
CommunMag(36), No. 3, March 1998, pp. 94-100.
9804
BibRef
Garg, G.[Gaurav],
Sharma, P.K.[Pramod Kumar],
Chaudhury, S.[Santanu],
Image based document authentication using DCT,
PRL(22), No. 6-7, May 2001, pp. 725-729.
Elsevier DOI
0105
BibRef
Bartolini, F.,
Tefas, A.,
Barni, M.,
Pitas, I.,
Image authentication techniques for surveillance applications,
PIEEE(89), No. 10, October 2001, pp. 1403-1418.
IEEE DOI
0110
BibRef
Lu, C.S.[Chun-Shien],
Liao, H.Y.M.,
Multipurpose watermarking for image authentication and protection,
IP(10), No. 10, October 2001, pp. 1579-1592.
IEEE DOI
0111
BibRef
Dittmann, J.[Jana],
Steinebach, M.[Martin],
Wohlmacher, P.[Petra],
Ackermann, R.[Ralf],
Digital Watermarks Enabling E-Commerce Strategies:
Conditional and User Specific Access to Services and Resources,
JASP(2002), No. 2, 2002, pp. 174-184.
0202
BibRef
Liu, H.J.[Hua-Jian],
Steinebach, M.[Martin],
Digital Watermarking for Image Authentication with Localization,
ICIP06(1973-1976).
IEEE DOI
0610
BibRef
Merkel, R.[Ronny],
Kraetzer, C.[Christian],
Altschaffel, R.[Robert],
Clausing, E.[Eric],
Schott, M.[Maik],
Dittmann, J.[Jana],
Fingerprint Forensics Application Protocol: Semi-automated Modeling and
Verification of Watermark-Based Communication Using CASPER and FDR,
IWDW11(321-335).
Springer DOI
1208
BibRef
Wang, Y.W.[Yi-Wei],
Doherty, J.F.,
van Dyck, R.E.,
A wavelet-based watermarking algorithm for ownership verification of
digital images,
IP(11), No. 2, February 2002, pp. 77-88.
IEEE DOI
0202
BibRef
Lu, C.S.[Chun-Shien],
Liao, H.Y.M.,
Kutter, M.,
Denoising and copy attacks resilient watermarking by exploiting prior
knowledge at detector,
IP(11), No. 3, March 2002, pp. 280-292.
IEEE DOI
0203
BibRef
Desset, C.[Claude],
Macq, B.[Benoît],
Vandendorpe, L.[Luc],
Block error-correcting codes for systems with a very high BER:
Theoretical analysis and application to the protection of watermarks,
SP:IC(17), No. 5, May 2002, pp. 409-421.
Elsevier DOI
0206
BibRef
Celik, M.U.,
Sharma, G.,
Saber, E.,
Tekalp, A.M.[A. Murat],
Hierarchical watermarking for secure image authentication with
localization,
IP(11), No. 6, June 2002, pp. 585-595.
IEEE DOI
0207
BibRef
Earlier:
A Hierarchical Image Authentication Watermark with Improved
Localization and Security,
ICIP01(II: 502-505).
IEEE DOI
0108
BibRef
Altun, H.O.,
Sharma, G.,
Bocko, M.F.,
Optimum Watermark Design by Vector Space Projections,
ICIP06(1413-1416).
IEEE DOI
0610
BibRef
Altun, H.O.,
Sharma, G.,
Celik, M.U.,
Bocko, M.F.,
Semifragile Hierarchical Watermarking in a Set Theoretic Framework,
ICIP05(I: 1001-1004).
IEEE DOI
0512
BibRef
Gunsel, B.[Bilge],
Uludag, U.[Umut],
Tekalp, A.M.[A. Murat],
Robust watermarking of fingerprint images,
PR(35), No. 12, December 2002, pp. 2739-2747.
Elsevier DOI
0209
BibRef
Zhang, X.P.[Xin-Peng],
Wang, S.Z.[Shuo-Zhong],
Watermarking scheme capable of resisting attacks based on availability
of inserter,
SP(82), No. 11, November 2002, pp. 1801-1804.
Elsevier DOI
0210
BibRef
Zhang, X.P.[Xin-Peng],
Wang, S.Z.[Shuo-Zhong],
Watermarking Scheme Capable of Resisting Sensitivity Attack,
SPLetters(14), No. 2, February 2007, pp. 125-128.
IEEE DOI
0703
BibRef
Radhakrishnan, R.,
Memon, N.,
On the security of the digest function in the SARI image authentication
system,
CirSysVideo(12), No. 11, November 2002, pp. 1030-1033.
IEEE Top Reference.
0301
BibRef
Earlier:
On the security of the SARI image authentication system,
ICIP01(III: 971-974).
IEEE DOI
0108
BibRef
Baudry, S.[Séverine],
Nguyen, P.[Philippe],
Maître, H.[Henri],
Optimal decoding for watermarks subject to geometrical attacks,
SP:IC(18), No. 4, April 2003, pp. 297-307.
Elsevier DOI
0304
BibRef
Eskicioglu, A.M.[Ahmet M.],
Town, J.[John],
Delp, E.J.[Edward J.],
Security of digital entertainment content from creation to consumption,
SP:IC(18), No. 4, April 2003, pp. 237-262.
Elsevier DOI
0304
BibRef
Kim, B.S.[Bum-Soo],
Choi, J.G.[Jae-Gark],
Park, C.H.[Chul-Hyun],
Won, J.U.[Jong-Un],
Kwak, D.M.[Dong-Min],
Oh, S.K.[Sang-Keun],
Koh, C.R.[Chang-Rim],
Park, K.H.[Kil-Houm],
Robust digital image watermarking method against geometrical attacks,
RealTimeImg(9), No. 2, April 2003, pp. 139-149.
Elsevier DOI
0304
BibRef
Li, X.L.[Xue-Long],
Watermarking in secure image retrieval,
PRL(24), No. 14, October 2003, pp. 2431-2434.
Elsevier DOI
0307
BibRef
Zheng, D.[Dong],
Zhao, J.Y.[Ji-Ying],
El Saddik, A.,
RST-invariant digital image watermarking based on log-polar mapping and
phase correlation,
CirSysVideo(13), No. 8, August 2003, pp. 753-765.
IEEE Abstract.
0309
BibRef
Zheng, D.[Dong],
Liu, Y.[Yan],
Zhao, J.Y.[Ji-Ying],
El Saddik, A.[Abdulmotaleb],
A survey of RST invariant image watermarking algorithms,
Surveys(39), No. 2, July 2007, pp. 5.
WWW Link.
0805
Survey, Watermarks.
BibRef
Liu, Y.[Yan],
Zhao, J.Y.[Ji-Ying],
Rotation, scaling, translation invariant image watermarking based on
radon transform,
CRV04(225-232).
IEEE DOI
0408
BibRef
Wu, M.[Min],
Joint security and robustness enhancement for quantization based data
embedding,
CirSysVideo(13), No. 8, August 2003, pp. 831-841.
IEEE Abstract.
0309
BibRef
And:
Joint security and robustness enhancement for quantization embedding,
ICIP03(II: 483-486).
IEEE Abstract.
0312
BibRef
Izquierdo, E.,
Guerra, V.,
An ill-posed operator for secure image authentication,
CirSysVideo(13), No. 8, August 2003, pp. 842-852.
IEEE Abstract.
0309
BibRef
Tsai, P.[Piyu],
Hu, Y.C.[Yu-Chen],
Chang, C.C.[Chin-Chen],
Using set partitioning in hierarchical trees to authenticate digital
images,
SP:IC(18), No. 9, October 2003, pp. 813-822.
Elsevier DOI
0310
BibRef
Chang, C.C.[Chin-Chen],
Tsai, P.[Piyu],
Lin, C.C.[Chia-Chen],
SVD-based digital image watermarking scheme,
PRL(26), No. 10, 15 July 2005, pp. 1577-1586.
Elsevier DOI
0506
BibRef
Wang, S.H.[Shih-Hao],
Lin, Y.P.[Yuan-Pei],
Wavelet tree quantization for copyright protection watermarking,
IP(13), No. 2, February 2004, pp. 154-165.
IEEE DOI
0404
BibRef
Kim, Y.W.[Young-Won],
Oh, I.S.[Il-Seok],
Watermarking text document images using edge direction histograms,
PRL(25), No. 11, August 2004, pp. 1243-1251.
Elsevier DOI
0409
BibRef
Kim, Y.W.[Young-Won],
Moon, K.A.[Kyung-Ae],
Oh, I.S.[Il-Seok],
A text watermarking algorithm based on word classification and
inter-word space statistics,
ICDAR03(775-779).
IEEE DOI
0311
BibRef
Seo, J.S.[Jin S.],
Haitsma, J.[Jaap],
Kalker, T.[Ton],
Yoo, C.D.[Chang D.],
A robust image fingerprinting system using the Radon transform,
SP:IC(19), No. 4, April 2004, pp. 325-339.
Elsevier DOI
0405
BibRef
Roy, S.[Sujoy],
Sun, Q.B.[Qi-Bin],
Kalker, T.[Ton],
Performance analysis of locality preserving image hash,
ICIP08(1268-1271).
IEEE DOI
0810
BibRef
Depovere, G.,
Kalker, T.,
Secret Key Watermarking with Changing Keys,
ICIP00(Vol I: 427-429).
IEEE DOI
0008
BibRef
Li, Q.M.[Qi-Ming],
Roy, S.[Sujoy],
On the security of non-forgeable robust hash functions,
ICIP08(3124-3127).
IEEE DOI
0810
BibRef
Ni, R.R.[Rong-Rong],
Ruan, Q.Q.[Qiu-Qi],
Cheng, H.D.,
Secure semi-blind watermarking based on iteration mapping and image
features,
PR(38), No. 3, March 2005, pp. 357-368.
Elsevier DOI
0412
BibRef
Lei, C.L.[Chin-Laung],
Yu, P.L.[Pei-Ling],
Tsai, P.L.[Pan-Lung],
Chan, M.H.[Ming-Hwa],
An efficient and anonymous buyer-seller watermarking protocol,
IP(13), No. 12, December 2004, pp. 1618-1626.
IEEE DOI
0412
BibRef
Wu, Y.,
Deng, R.H.,
Security of an Ill-Posed Operator for Image Authentication,
CirSysVideo(15), No. 1, January 2005, pp. 161-163.
IEEE Abstract.
0501
BibRef
El-Taweel, G.S.,
Onsi, H.M.,
Samy, M.,
Darwish, M.G.,
Secure and Non-Blind Watermarking Scheme for Color Images,
GVIP(SI1), 2005, pp. xx-yy
HTML Version.
BibRef
0500
Chen, T.H.[Tzung-Her],
Tsai, D.S.[Du-Shiau],
Owner-customer right protection mechanism using a watermarking scheme
and a watermarking protocol,
PR(39), No. 8, August 2006, pp. 1530-1541.
Elsevier DOI
0606
Visual cryptography; Digital signature; Digital timestamp
BibRef
Tsai, D.S.[Du-Shiau],
Chen, T.H.[Tzung-Her],
Horng, G.[Gwoboa],
A cheating prevention scheme for binary visual cryptography with
homogeneous secret images,
PR(40), No. 8, August 2007, pp. 2356-2366.
Elsevier DOI
0704
Visual cryptography; Cheating; Cheating prevention; Genetic algorithm
BibRef
Chen, Y.C.[Yu-Chi],
Tsai, D.S.[Du-Shiau],
Horng, G.[Gwoboa],
A new authentication based cheating prevention scheme in Naor-Shamir’s
visual cryptography,
JVCIR(23), No. 8, November 2012, pp. 1225-1233.
Elsevier DOI
1211
Secret sharing; Visual cryptography; Visual secret sharing; Human
vision system; Cheating; Cheating prevention; Authentication; Security
BibRef
Maret, Y.[Yannick],
DuFaux, F.[Frédéric],
Ebrahimi, T.[Touradj],
Adaptive image replica detection based on support vector classifiers,
SP:IC(21), No. 8, September 2006, pp. 688-703.
Elsevier DOI
0609
Image replica detection; Features extraction; SVM
Dimensionality reduction; Copyright infringement detection
BibRef
Zhao, Q.J.[Qi-Jun],
Lu, H.T.[Hong-Tao],
PCA-based web page watermarking,
PR(40), No. 4, April 2007, pp. 1334-1341.
Elsevier DOI
0701
Principal component analysis (PCA); Watermark;
HTML; Web page; Tamper-proof
BibRef
Zhao, Q.J.[Qi-Jun],
Lu, H.T.[Hong-Tao],
A PCA-based watermarking scheme for tamper-proof of web pages,
PR(38), No. 8, August 2005, pp. 1321-1323.
Elsevier DOI
0505
BibRef
Yang, H.J.[Hui-Juan],
Kot, A.C.[Alex C.],
Pattern-Based Data Hiding for Binary Image Authentication by
Connectivity-Preserving,
MultMed(9), No. 3, April 2007, pp. 475-486.
IEEE DOI
0905
BibRef
Earlier:
A General Data Hiding Framework and Multi-level Signature for Binary
Images,
DW07(188-202).
Springer DOI
0712
BibRef
Liu, J.[Jun],
Yang, H.J.[Hui-Juan],
Kot, A.C.,
Relationships And Unification of Binary Images Data-Hiding Methods,
ICIP05(I: 981-984).
IEEE DOI
0512
BibRef
Lin, C.H.,
Chan, D.Y.,
Su, H.,
Hsieh, W.S.,
Histogram-oriented watermarking algorithm: colour image watermarking
scheme robust against geometric attacks and signal processing,
VISP(153), No. 4, August 2006, pp. 483-492.
WWW Link.
0705
BibRef
Lu, C.S.[Chun-Shien],
Hsu, C.Y.[Chao-Yung],
Near-Optimal Watermark Estimation and Its Countermeasure:
Antidisclosure Watermark for Multiple Watermark Embedding,
CirSysVideo(17), No. 4, April 2007, pp. 454-467.
IEEE DOI
0705
BibRef
Cheung, Y.M.,
Wu, H.T.,
A Sequential Quantization Strategy for Data Embedding and Integrity
Verification,
CirSysVideo(17), No. 8, August 2007, pp. 1007-1016.
IEEE DOI
0710
BibRef
Wang, S.S.[Shuenn-Shyang],
Tsai, S.L.[Sung-Lin],
Automatic image authentication and recovery using fractal code
embedding and image inpainting,
PR(41), No. 2, February 2008, pp. 701-712.
Elsevier DOI
0711
Image processing; Watermarking; Fractal image coding
BibRef
Lin, E.I.,
Eskicioglu, A.M.,
Lagendijk, R.L.,
Delp, E.J.,
Advances in Digital Video Content Protection,
PIEEE(93), No. 1, January 2005, pp. 171-183.
IEEE DOI
0501
Survey, Authentication.
BibRef
Piva, A.[Alessandro],
Bartolini, F.[Franco],
Caldelli, R.[Roberto],
Self Recovery Authentication Of Images In The Dwt Domain,
IJIG(5), No. 1, January 2005, pp. 149-165.
0501
BibRef
Caldelli, R.[Roberto],
Bartolini, F.[Franco],
Cappellini, V.[Vito],
Piva, A.[Alessandro],
Barni, M.[Mauro],
A New Self-Recovery Technique for Image Authentication,
VLBV03(164-171).
Springer DOI
0310
BibRef
Wang, X.Y.[Xiang-Yang],
Hou, L.M.[Li-Min],
Wu, J.[Jun],
A feature-based robust digital image watermarking against geometric
attacks,
IVC(26), No. 7, 2 July 2008, pp. 980-989.
Elsevier DOI
0804
Image watermarking; Geometric attack; Image feature; Normalization
BibRef
Wang, X.Y.[Xiang-Yang],
Cui, C.Y.[Chang-Ying],
A novel image watermarking scheme against desynchronization attacks by
SVR revision,
JVCIR(19), No. 5, July 2008, pp. 334-342.
Elsevier DOI
0804
Digital image watermarking; Desynchronization attacks;
Support vector regression; Revision; Sum; Variance;
Image block; Neighboring pixel
BibRef
Lee, C.H.[Choong-Hoon],
Lee, H.K.[Heung-Kyu],
Suh, Y.H.[Young-Ho],
Image Watermarking Resistant To Combined Geometric And Removal Attacks,
IJIG(5), No. 1, January 2005, pp. 37-65.
0501
BibRef
Feng, W.[Wei],
Liu, Z.Q.[Zhi-Qiang],
Region-Level Image Authentication Using Bayesian Structural Content
Abstraction,
IP(17), No. 12, December 2008, pp. 2413-2424.
IEEE DOI
0811
BibRef
Earlier:
Bayesian Structural Content Abstraction for Region-Level Image
Authentication,
ICCV05(II: 1042-1047).
IEEE DOI
0510
Capture spatial topology of regions and use in description.
BibRef
Im, D.H.,
Lee, H.Y.,
Ryu, S.J.,
Lee, H.K.,
Vector Watermarking Robust to Both Global and Local Geometrical
Distortions,
SPLetters(15), No. 1, 2008, pp. 789-792.
IEEE DOI
0812
BibRef
Vatsa, M.[Mayank],
Singh, R.[Richa],
Noore, A.[Afzel],
Feature based RDWT watermarking for multimodal biometric system,
IVC(27), No. 3, February 2009, pp. 293-304.
Elsevier DOI
0804
Biometrics; Watermarking; RDWT: Redundant Discrete Wavelet Transform; Face
recognition; Voice recognition; Multimodal biometrics
BibRef
Tsai, M.J.[Min-Jen],
A visible watermarking algorithm based on the content and contrast
aware (COCOA) technique,
JVCIR(20), No. 5, July 2009, pp. 323-338.
Elsevier DOI
0905
BibRef
Earlier:
Filter bank selection for the ownership verification of wavelet based
digital image watermarking,
ICIP04(V: 3415-3418).
IEEE DOI
0505
CSF; Human Vision System; NVF; Visible watermarking; Wavelet
transform; Copyright protection; Image inpainting; Image recovery
BibRef
Ababneh, S.[Sufyan],
Ansari, R.[Rashid],
Khokhar, A.A.[Ashfaq A.],
Iterative compensation schemes for multimedia content authentication,
JVCIR(20), No. 5, July 2009, pp. 303-311.
Elsevier DOI
0905
BibRef
Earlier: A1, A3, A2:
Compensated Signature Embedding Based Multimedia Content Authentication
System,
ICIP07(I: 393-396).
IEEE DOI
0709
Authentication; Convex sets; POCS; Watermarking; Compensated signature
embedding; Image integrity; Multimedia authentication; Signature
embedding
BibRef
Singhal, N.[Nitin],
Lee, Y.Y.[Young-Yoon],
Kim, C.S.[Chang-Su],
Lee, S.U.[Sang-Uk],
Robust image watermarking using local Zernike moments,
JVCIR(20), No. 6, August 2009, pp. 408-419.
Elsevier DOI
0907
Digital image watermarking; Digital right management; Local Zernike
moments; Feature point detection; Image normalization; Content-based
synchronization; Salient region parameters; Geometric distortions
BibRef
Lai, C.H.[Chao-Hung],
Wu, J.L.[Jiunn-Lin],
Robust image watermarking against local geometric attacks using
multiscale block matching method,
JVCIR(20), No. 6, August 2009, pp. 377-388.
Elsevier DOI
0907
Local geometric attack; Stirmark; Deformable mesh model; Image
registration; Resynchronization; Multiscale block matching; AM based
watermarking
BibRef
Farid, H.,
Seeing is not believing,
Spectrum(46), No. 8, August 2009, pp. 44-51.
IEEE DOI
0909
Too many things can be done to a picture to believe the picture.
Techniques to counter such alterations, or at least to know they
happened.
BibRef
Bhatnagar, G.[Gaurav],
Raman, B.[Balasubramanian],
Robust Reference-watermarking Scheme Using Wavelet Packet Transform and
Bidiagonal-singular Value Decomposition,
IJIG(9), No. 3, July 2009, pp. 449-477.
DOI Link
0911
BibRef
Earlier:
Robust Watermarking Scheme Based on Multiresolution Fractional Fourier
Transform,
ICCVGIP08(1-8).
IEEE DOI
0812
See also New Fractional Random Wavelet Transform for Fingerprint Security, A.
BibRef
Bhatnagar, G.[Gaurav],
Raman, B.[Balasubramanian],
Wu, Q.M.J.[Q. M. Jonathan],
Robust watermarking using fractional wavelet packet transform,
IET-IPR(6), No. 4, 2012, pp. 386-397.
DOI Link
1205
BibRef
Bhatnagar, G.[Gaurav],
Wu, Q.M.J.[Q. M. Jonathan],
Raman, B.[Balasubramanian],
A Novel Image Encryption Framework Based on Markov Map and Singular
Value Decomposition,
ICIAR11(II: 286-296).
Springer DOI
1106
See also Real Time Human Visual System Based Framework for Image Fusion.
BibRef
Rawat, S.[Sanjay],
Raman, B.[Balasubramanian],
A Chaos-based Robust Watermarking Algorithm For Rightful Ownership
Protection,
IJIG(11), No. 4, October 2011, pp. 471-493.
DOI Link
1201
BibRef
Singh, P.[Priyanka],
Raman, B.[Balasubramanian],
Misra, M.[Manoj],
A secure image sharing scheme based on SVD and Fractional Fourier
Transform,
SP:IC(57), No. 1, 2017, pp. 46-59.
Elsevier DOI
1709
Shamir secret sharing
BibRef
Awrangjeb, M.[Mohammad],
Lu, G.J.[Guo-Jun],
Techniques for efficient and effective transformed image identification,
JVCIR(20), No. 8, November 2009, pp. 511-520.
Elsevier DOI
0911
Feature detection; Feature representation; Feature matching;
Transformed image identification
BibRef
Nikolopoulos, S.[Spiros],
Zafeiriou, S.P.[Stafanos P.],
Nikolaidis, N.D.[Nikos D.],
Pitas, I.[Ioannis],
Image replica detection system utilizing R-trees and linear
discriminant analysis,
PR(43), No. 3, March 2010, pp. 636-649.
Elsevier DOI
1001
Replica detection; Copy image detection; Perceptual hashing; Robust
hashing; Fingerprinting; Copyright protection; Content-based
monitoring; Linear discriminant analysis (LDA); R-tree indexing
BibRef
Carreras, A.[Anna],
Delgado, J.[Jaime],
Rodriguez, E.[Eva],
Barbosa, V.[Vitor],
Andrade, M.[Maria],
Arachchi, H.K.[Hemantha Kodikara],
Dogan, S.[Safak],
Kondoz, A.M.[Ahmed M.],
A Platform for Context-Aware and Digital Rights Management-Enabled
Content Adaptation,
MultMedMag(17), No. 2, April-June 2010, pp. 74-89.
IEEE DOI
1006
BibRef
Kim, J.W.[Jong-Weon],
Kim, N.G.[Nam-Gyu],
Lee, D.W.[Dong-Won],
Park, S.B.[Sung-Bum],
Lee, S.W.[Sang-Won],
Watermarking two dimensional data object identifier for authenticated
distribution of digital multimedia contents,
SP:IC(25), No. 8, September 2010, pp. 559-576.
Elsevier DOI
1003
Digital object identifier; 2-dimensional barcode; Digital
watermarking; Digital multimedia contents; Universal Content
Identifier
BibRef
Mokhtarian, K.,
Hefeeda, M.,
Authentication of Scalable Video Streams With Low Communication
Overhead,
MultMed(12), No. 7, 2010, pp. 730-742.
IEEE DOI
1011
Security of video streams.
See also Capacity Management of Seed Servers in Peer-to-Peer Streaming Systems With Scalable Video Streams.
BibRef
Huang, T.J.[Tie-Jun],
Tian, Y.H.[Yong-Hong],
Gao, W.[Wen],
Lu, J.[Jian],
Mediaprinting:
Identifying Multimedia Content for Digital Rights Management,
Computer(43), No. 12, December 2010, pp. 28-35.
IEEE DOI
1101
BibRef
Zhang, X.P.[Xin-Peng],
Wang, S.Z.[Shuo-Zhong],
Qian, Z.X.[Zhen-Xing],
Feng, G.R.[Guo-Rui],
Reference Sharing Mechanism for Watermark Self-Embedding,
IP(20), No. 2, February 2011, pp. 485-495.
IEEE DOI
1102
BibRef
Tsai, J.S.[Jen-Sheng],
Huang, W.B.[Win-Bin],
Kuo, Y.H.[Yau-Hwang],
On the Selection of Optimal Feature Region Set for Robust Digital Image
Watermarking,
IP(20), No. 3, March 2011, pp. 735-743.
IEEE DOI
1103
BibRef
Tsai, J.S.[Jen-Sheng],
Huang, W.B.[Win-Bin],
Chen, C.L.[Chao-Lieh],
Kuo, Y.H.[Yau-Hwang],
A Feature-Based Digital Image Watermarking for Copyright Protection and
Content Authentication,
ICIP07(V: 469-472).
IEEE DOI
0709
BibRef
Kallel, M.[Mohamed],
Bouhlel, M.S.[Mohamed-Salim],
Lapayre, J.C.[Jean-Christophe],
Security of the Medical Media Using a Hybrid and Multiple Watermark
Technique,
IJIG(11), No. 1, January 2011, pp. 103-115.
DOI Link
1103
BibRef
Kakar, P.,
Sudha, N.,
Ser, W.,
Exposing Digital Image Forgeries by Detecting Discrepancies in Motion
Blur,
MultMed(13), No. 3, 2011, pp. 443-452.
IEEE DOI
1106
BibRef
Tian, L.H.[Li-Hua],
Zheng, N.N.[Nan-Ning],
Xue, J.R.[Jian-Ru],
Li, C.[Ce],
Wang, X.F.[Xiao-Feng],
An integrated visual saliency-based watermarking approach for
synchronous image authentication and copyright protection,
SP:IC(26), No. 8-9, October 2011, pp. 427-437.
Elsevier DOI
1109
Watermarking; Image authentication; Visual saliency; Tamper detection
and localization
BibRef
Lin, Y.C.[Yao-Chung],
Varodayan, D.[David],
Girod, B.[Bernd],
Image Authentication Using Distributed Source Coding,
IP(21), No. 1, January 2012, pp. 273-283.
IEEE DOI
1112
BibRef
Earlier:
Image Authentication Based on Distributed Source Coding,
ICIP07(III: 5-8).
IEEE DOI
0709
BibRef
Varodayan, D.[David],
Lin, Y.C.[Yao-Chung],
Girod, B.[Bernd],
Adaptive Distributed Source Coding,
IP(21), No. 5, May 2012, pp. 2630-2640.
IEEE DOI
1204
BibRef
Yin, H.,
Hui, W.,
Li, H.,
Lin, C.,
Zhu, W.,
A Novel Large-Scale Digital Forensics Service Platform for Internet
Videos,
MultMed(14), No. 1, January 2012, pp. 178-186.
IEEE DOI
1201
BibRef
Wu, L.[Lin],
Cao, X.C.[Xiao-Chun],
Zhang, W.[Wei],
Wang, Y.[Yang],
Detecting image forgeries using metrology,
MVA(23), No. 2, March 2012, pp. 363-373.
WWW Link.
1202
BibRef
Ling, H.F.[He-Fei],
Cheng, H.R.[Hong-Rui],
Ma, Q.Z.[Qing-Zhen],
Zou, F.H.[Fu-Hao],
Yan, W.Q.[Wei-Qi],
Efficient Image Copy Detection Using Multiscale Fingerprints,
MultMedMag(19), No. 1, January-March 2012, pp. 60-69.
IEEE DOI
1202
BibRef
Jin, C.[Cong],
Adaptive robust image watermark approach based on fuzzy comprehensive
evaluation and analytic hierarchy process,
SIViP(6), No. 2, June 2012, pp. 317-324.
WWW Link.
1205
BibRef
Jin, C.[Cong],
Jin, S.W.[Shu-Wei],
Adaptive digital image watermark scheme based on Fuzzy Neural Network
for copyright protection,
IASP10(599-602).
IEEE DOI
1004
See also Image distance metric learning based on neighborhood sets for automatic image annotation.
BibRef
Ulutas, G.[Guzin],
Ulutas, M.[Mustafa],
Nabiyev, V.V.[Vasif V.],
Secret image sharing scheme with adaptive authentication strength,
PRL(34), No. 3, 1 February 2013, pp. 283-291.
Elsevier DOI
1301
Secret sharing; Steganography; Chaining; Authentication
BibRef
Dirik, A.E.,
Haas, B.,
Copy detection pattern-based document protection for variable media,
IET-IPR(6), No. 8, 2012, pp. 1102-1113.
DOI Link
1302
BibRef
Yamasaki, T.[Toshihiko],
Aizawa, K.[Kiyoharu],
SIFT-Based Non-blind Watermarking Robust to Non-linear Geometrical
Distortions,
IEICE(E96-D), No. 6, June 2013, pp. 1368-1375.
WWW Link.
1306
BibRef
Yamasaki, T.[Toshihiko],
Nakai, Y.[Yasumasa],
Aizawa, K.[Kiyoharu],
An object-based non-blind watermarking that is robust to non-linear
geometrical distortion attacks,
ICIP09(3669-3672).
IEEE DOI
0911
BibRef
Pham, V.Q.[Viet Quoc],
Miyaki, T.[Takashi],
Yamasaki, T.[Toshihiko],
Aizawa, K.[Kiyoharu],
Geometrically Invariant Object-Based Watermarking using SIFT Feature,
ICIP07(V: 473-476).
IEEE DOI
0709
BibRef
Zheng, P.[Peijia],
Huang, J.W.[Ji-Wu],
Discrete Wavelet Transform and Data Expansion Reduction
in Homomorphic Encrypted Domain,
IP(22), No. 6, 2013, pp. 2455-2468.
IEEE DOI Haar transforms; Watermarking
1307
BibRef
Sahraee, M.J.,
Ghofrani, S.,
A robust blind watermarking method using quantization of distance
between wavelet coefficients,
SIViP(7), No. 4, July 2013, pp. 799-807.
WWW Link.
1306
BibRef
Agarwal, C.[Charu],
Mishra, A.[Anurag],
Sharma, A.[Arpita],
Gray-scale image watermarking using GA-BPN hybrid network,
JVCIR(24), No. 7, 2013, pp. 1135-1146.
Elsevier DOI
1309
Digital image watermarking
BibRef
Horng, S.J.[Shi-Jinn],
Rosiyadi, D.[Didi],
Li, T.R.[Tian-Rui],
Takao, T.[Terano],
Guo, M.[Minyi],
Khan, M.K.[Muhammad Khurram],
A blind image copyright protection scheme for e-government,
JVCIR(24), No. 7, 2013, pp. 1099-1105.
Elsevier DOI
1309
Blind
BibRef
Liu, S.C.[Shen-Chuan],
Sae-Tang, W.[Wannida],
Fujiyoshi, M.[Masaaki],
Kiya, H.[Hitoshi],
An Efficient Compression of Amplitude-Only Images for the Image Trading
System,
IEICE(E97-D), No. 2, February 2013, pp. 378-379.
WWW Link.
1402
BibRef
Pande, A.,
Chen, S.[Shaxun],
Mohapatra, P.,
Zambreno, J.,
Hardware Architecture for Video Authentication Using Sensor Pattern
Noise,
CirSysVideo(24), No. 1, January 2014, pp. 157-167.
IEEE DOI
1402
cameras
BibRef
Lee, J.S.[Jung-San],
Li, B.[Bo],
Self-Recognized Image Protection Technique that Resists Large-Scale
Cropping,
MultMedMag(21), No. 1, January 2014, pp. 60-73.
IEEE DOI
1405
data compression
BibRef
Xu, Y.Y.[Yan-Yan],
Xiong, L.Z.[Li-Zhi],
Xu, Z.Q.[Zheng-Quan],
Pan, S.M.[Shao-Ming],
A content security protection scheme in JPEG compressed domain,
JVCIR(25), No. 5, 2014, pp. 805-813.
Elsevier DOI
1406
Content security
BibRef
Xu, Z.Q.[Zheng-Quan],
Xiong, L.Z.[Li-Zhi],
Xu, Y.Y.[Yan-Yan],
On the provably secure CEW based on orthogonal decomposition,
SP:IC(29), No. 5, 2014, pp. 607-617.
Elsevier DOI
1406
Commutative Encryption and Watermarking (CEW)
BibRef
Yang, Q.T.[Qun-Ting],
Gao, T.G.[Tie-Gang],
An Image Authentication Scheme for Accurate Localization and
Restoration,
IWDW13(475-487).
Springer DOI
1407
BibRef
Amiri, S.H.[S. Hamid],
Jamzad, M.[Mansour],
Robust watermarking against print and scan attack through efficient
modeling algorithm,
SP:IC(29), No. 10, 2014, pp. 1181-1196.
Elsevier DOI
1411
Image watermarking
BibRef
Maatouk, M.N.[Mohamed Neji],
Ben Amara, N.E.[Najoua Essoukri],
Intelligent hybrid watermarking ancient-document wavelet packet
decomposition-singular value decomposition-based schema,
IET-IPR(8), No. 12, 2014, pp. 708-717.
DOI Link
1412
document image processing
BibRef
Maatouk, M.N.[Mohamed Neji],
Bellaj, M.[Majd],
Ben Amara, N.E.[Najoua Essoukri],
Watermarking ancient documents schema using wavelet packets and
convolutional code,
IPTA10(172-176).
IEEE DOI
1007
BibRef
Li, X.[Xu],
Sun, X.M.[Xing-Ming],
Liu, Q.S.[Quan-Sheng],
Image Integrity Authentication Scheme Based on Fixed Point Theory,
IP(24), No. 2, February 2015, pp. 632-645.
IEEE DOI
1502
convolution
BibRef
Tabatabaei, S.A.H.,
Ur-Rehman, O.,
Zivic, N.,
Ruland, C.,
Secure and Robust Two-Phase Image Authentication,
MultMed(17), No. 7, July 2015, pp. 945-956.
IEEE DOI
1506
Authentication
BibRef
Guo, J.T.[Jian-Ting],
Zheng, P.[Peijia],
Huang, J.W.[Ji-Wu],
Secure watermarking scheme against watermark attacks in the encrypted
domain,
JVCIR(30), No. 1, 2015, pp. 125-135.
Elsevier DOI
1507
Blind watermarking scheme
BibRef
Wójtowicz, W.[Wioletta],
Ogiela, M.R.[Marek R.],
Digital images authentication scheme based on bimodal biometric
watermarking in an independent domain,
JVCIR(38), No. 1, 2016, pp. 1-10.
Elsevier DOI
1605
Image watermarking
BibRef
Wu, W.C.[Wen-Chuan],
Lin, Z.W.[Zi-Wei],
SVD-based self-embedding image authentication scheme using quick
response code features,
JVCIR(38), No. 1, 2016, pp. 18-28.
Elsevier DOI
1605
Image authentication
BibRef
Lin, C.Y.[Chih-Yang],
Muchtar, K.[Kahlil],
Yeh, C.H.[Chia-Hung],
Lu, C.S.[Chun-Shien],
Secure multicasting of images via joint privacy-preserving
fingerprinting, decryption, and authentication,
JVCIR(38), No. 1, 2016, pp. 858-871.
Elsevier DOI
1605
Authentication
BibRef
Markman, A.[Adam],
Carnicer, A.[Artur],
Javidi, B.[Bahram],
Security authentication with a three-dimensional optical phase code
using random forest classifier,
JOSA-A(33), No. 6, June 2016, pp. 1160-1165.
DOI Link
1606
Speckle; Imaging systems; Pattern recognition, Baysian processors.
Attach a 3D optical phase mask.
BibRef
Tew, Y.[Yiqi],
Wong, K.[Kok_Sheik],
Phan, R.C.W.[Raphael C.W.],
Ngan, K.N.[King Ngi],
Multi-layer authentication scheme for HEVC video based on embedded
statistics,
JVCIR(40, Part B), No. 1, 2016, pp. 502-515.
Elsevier DOI
1610
BibRef
Earlier: A1, A2, A3, Only:
HEVC video authentication using data embedding technique,
ICIP15(1265-1269)
IEEE DOI
1511
Authentication; Coding Unit Size; Data Embedding; HEVC; Information Hiding
BibRef
Pang, L.L.[Lie-Lin],
Wong, K.[Kok_Sheik],
A Data Embedding Technique for Spatial Scalable Coded Video Using
Motion Vector Predictor,
ICIP19(4050-4054)
IEEE DOI
1910
Motion vector predictor, data embedding, SHVC, co-located blocks
BibRef
Franco-Contreras, J.[Javier],
Coatrieux, G.[Gouenou],
Databases Traceability by Means of Watermarking with Optimized
Detection,
IWDW16(343-357).
Springer DOI
1703
BibRef
Liu, X.Y.[Xi-Yao],
Zhao, R.C.[Rong-Chang],
Li, F.F.[Fang-Fang],
Liao, S.H.[Sheng-Hui],
Ding, Y.P.[Yi-Peng],
Zou, B.[Beiji],
Novel robust zero-watermarking scheme for digital rights management
of 3D videos,
SP:IC(54), No. 1, 2017, pp. 140-151.
Elsevier DOI
1704
3D video
BibRef
Fadoua, S.,
Noura, A.,
Hamid, T.,
A new robust watermarking scheme based on polynomial decomposition,
ISCV17(1-6)
IEEE DOI
1710
image texture, image watermarking, polynomials,
bivariate polynomial basis, digital images,
human visual system model, image texture extraction,
mathematical model, orthogonal polynomial basis transform,
polynomial decomposition, watermarked image, Digital images,
Discrete cosine transforms, Image coding, Mathematical model,
Robustness, Watermarking, Watermarking, polynomial transformation,
structure extraction, texture, extraction
BibRef
Li, Y.N.[Yue-Nan],
Guo, L.L.[Lin-Lin],
Robust Image Fingerprinting via Distortion-Resistant Sparse Coding,
SPLetters(25), No. 1, January 2018, pp. 140-144.
IEEE DOI
1801
copyright, feature extraction, fingerprint identification,
image coding, image matching, atom selection,
robust hashing
BibRef
Liu, X.L.,
Lin, C.C.,
Yuan, S.M.,
Blind Dual Watermarking for Color Images:
Authentication and Copyright Protection,
CirSysVideo(28), No. 5, May 2018, pp. 1047-1055.
IEEE DOI
1805
Authentication, Color, Copyright protection,
Discrete wavelet transforms, Image color analysis, Robustness,
watermarking
BibRef
Chen, Z.,
Li, L.,
Peng, H.,
Liu, Y.,
Yang, Y.,
A Novel Digital Watermarking Based on General Non-Negative Matrix
Factorization,
MultMed(20), No. 8, August 2018, pp. 1973-1986.
IEEE DOI
1808
copyright, image watermarking, matrix decomposition, random matrix,
copyright protection, integrity authentication,
semi-tensor product (STP)
BibRef
Kim, M.[Minsu],
Lee, K.W.[Kun-Woo],
Gondow, K.[Katsuhiko],
Imura, J.I.[Jun-Ichi],
Robust Index Code to Distribute Digital Images and Digital Contents
Together,
IEICE(E101-D), No. 9, September 2018, pp. 2179-2189.
WWW Link.
1809
BibRef
Khelifi, F.,
Bouridane, A.,
Perceptual Video Hashing for Content Identification and
Authentication,
CirSysVideo(29), No. 1, January 2019, pp. 50-67.
DOI Link
1901
Authentication, Feature extraction, Robustness, Calibration,
Discrete cosine transforms, Distortion, Authentication,
video hashing
BibRef
Li, Y.,
Wang, D.,
Tang, L.,
Robust and Secure Image Fingerprinting Learned by Neural Network,
CirSysVideo(30), No. 2, February 2020, pp. 362-375.
IEEE DOI
2002
Feature extraction, Security, Neural networks,
Quantization (signal), Training, Robustness, Distortion, multimedia security
BibRef
Zhang, Y.[Yun],
Tang, Z.[Zhi],
Huang, J.[Jing],
Ding, Y.[Yue],
He, H.[Hao],
Xia, X.S.[Xiao-Sheng],
Li, C.H.[Chun-Hua],
A Decentralized Model for Spatial Data Digital Rights Management,
IJGI(9), No. 2, 2020, pp. xx-yy.
DOI Link
2003
BibRef
Garain, U.[Utpal],
Halder, B.[Biswajit],
Even big data is not enough: need for a novel reference modelling for
forensic document authentication,
IJDAR(23), No. 1, January 2020, pp. 1-11.
WWW Link.
2003
BibRef
Ding, K.M.[Kai-Meng],
Liu, Y.M.[Yue-Ming],
Xu, Q.[Qin],
Lu, F.Q.A.[Fu-Qi-Ang],
A Subject-Sensitive Perceptual Hash Based on MUM-Net for the
Integrity Authentication of High Resolution Remote Sensing Images,
IJGI(9), No. 8, 2020, pp. xx-yy.
DOI Link
2008
BibRef
Anand, A.,
Singh, A.K.,
Joint Watermarking-Encryption-ECC for Patient Record Security in
Wavelet Domain,
MultMedMag(27), No. 3, July 2020, pp. 66-75.
IEEE DOI
2009
Watermarking, Biomedical imaging, Encryption, Turbo codes, Robustness
BibRef
Anand, A.,
Singh, A.K.,
Lv, Z.,
Bhatnagar, G.,
Compression-Then-Encryption-Based Secure Watermarking Technique for
Smart Healthcare System,
MultMedMag(27), No. 4, October 2020, pp. 133-143.
IEEE DOI
2012
Watermarking, Encryption, Image coding,
Discrete wavelet transforms, Biomedical imaging, Robustness
BibRef
Chidambaram, N.[Nithya],
Raj, P.[Pethuru],
Thenmozhi, K.[Karruppuswamy],
Amirtharajan, R.[Rengarajan],
Advanced framework for highly secure and cloud-based storage of colour
images,
IET-IPR(14), No. 13, November 2020, pp. 3143-3153.
DOI Link
2012
BibRef
Li, Y.,
Chen, X.,
Yin, Y.,
Wan, J.,
Zhang, J.,
Kuang, L.,
Dong, Z.,
SDABS: A Flexible and Efficient Multi-Authority Hybrid
Attribute-Based Signature Scheme in Edge Environment,
ITS(22), No. 3, March 2021, pp. 1892-1906.
IEEE DOI
2103
Vehicle dynamics, Transportation, Security, Roads, Reliability,
Authentication, Heuristic algorithms, Multi-authority,
edge computing
BibRef
Su, Z.Y.[Zhi-Yong],
Yao, L.[Liang],
Mei, J.L.[Jia-Lin],
Zhou, L.[Lang],
Li, W.Q.[Wei-Qing],
Learning to Hash for Personalized Image Authentication,
CirSysVideo(31), No. 4, April 2021, pp. 1648-1660.
IEEE DOI
2104
Authentication, Quantization (signal), Feature extraction,
Measurement, Training, Task analysis, Binary codes, Metric learning, LMNN
BibRef
Sinhal, R.[Rishi],
Jain, D.K.[Deepak Kumar],
Ansari, I.A.[Irshad Ahmad],
Machine learning based blind color image watermarking scheme for
copyright protection,
PRL(145), 2021, pp. 171-177.
Elsevier DOI
2104
Robust image watermarking, Artificial neural network,
Machine learning, YCbCr color space
BibRef
Ren, N.[Na],
Zhao, Y.Z.[Ya-Zhou],
Zhu, C.Q.[Chang-Qing],
Zhou, Q.F.[Qi-Fei],
Xu, D.J.[Ding-Jie],
Copyright Protection Based on Zero Watermarking and Blockchain for
Vector Maps,
IJGI(10), No. 5, 2021, pp. xx-yy.
DOI Link
2106
BibRef
Lim, J.H.[Jian Han],
Chan, C.S.[Chee Seng],
Ng, K.W.[Kam Woh],
Fan, L.X.[Li-Xin],
Yang, Q.[Qiang],
Protect, show, attend and tell:
Empowering image captioning models with ownership protection,
PR(122), 2022, pp. 108285.
Elsevier DOI
2112
Image captioning, Ownership protection, Deep neural network,
Recurrent neural network, Long short-term memory
BibRef
Qin, C.[Chuan],
Liu, E.[Enli],
Feng, G.R.[Guo-Rui],
Zhang, X.P.[Xin-Peng],
Perceptual Image Hashing for Content Authentication Based on
Convolutional Neural Network With Multiple Constraints,
CirSysVideo(31), No. 11, November 2021, pp. 4523-4537.
IEEE DOI
2112
Feature extraction, Training, Robustness, Neural networks,
Authentication, Discrete cosine transforms, Transforms, CNN
BibRef
Hasan, M.K.[Mohammad Kamrul],
Kamil, S.[Samar],
Shafiq, M.[Muhammad],
Yuvaraj, S.,
Kumar, E.S.[E. Saravana],
Vincent, R.[Rajiv],
Nafi, N.S.[Nazmus Shaker],
An improved watermarking algorithm for robustness and
imperceptibility of data protection in the perception layer of
internet of things,
PRL(152), 2021, pp. 283-294.
Elsevier DOI
2112
Fintech, Internet of things, Text document image, Watermark, Pascal Triangle
BibRef
Kaur, J.[Jasvinder],
Singh, P.[Parvinder],
Comparative analysis of wavelet-based copyright protection techniques,
IJCVR(12), No. 3, 2022, pp. 219-235.
DOI Link
2205
BibRef
Zhang, J.[Jie],
Chen, D.D.[Dong-Dong],
Liao, J.[Jing],
Zhang, W.M.[Wei-Ming],
Feng, H.M.[Hua-Min],
Hua, G.[Gang],
Yu, N.H.[Neng-Hai],
Deep Model Intellectual Property Protection via Deep Watermarking,
PAMI(44), No. 8, August 2022, pp. 4005-4020.
IEEE DOI
2207
Watermarking, Computational modeling, Training, Task analysis,
IP networks, Image processing, Media, Deep model IP protection,
image processing
BibRef
Wang, B.W.[Bao-Wei],
Wang, W.[Weishen],
Zhao, P.[Peng],
A zero-watermark algorithm for multiple images based on visual
cryptography and image fusion,
JVCIR(87), 2022, pp. 103569.
Elsevier DOI
2208
Zero-watermark, Multiple images, Copyright protection,
Non-extended visual cryptography, Gray-weighted average image fusion
BibRef
Fan, L.X.[Li-Xin],
Ng, K.W.[Kam Woh],
Chan, C.S.[Chee Seng],
Yang, Q.[Qiang],
DeepIPR: Deep Neural Network Ownership Verification With Passports,
PAMI(44), No. 10, October 2022, pp. 6122-6139.
IEEE DOI
2209
Watermarking, Data models, Computational modeling,
Analytical models, Training, Task analysis, Neural networks, deep learning
BibRef
Li, B.[Bowen],
Fan, L.X.[Li-Xin],
Gu, H.L.[Han-Lin],
Li, J.[Jie],
Yang, Q.[Qiang],
FedIPR: Ownership Verification for Federated Deep Neural Network
Models,
PAMI(45), No. 4, April 2023, pp. 4521-4536.
IEEE DOI
2303
Watermarking, Collaborative work, Data models,
Computational modeling, Training, Intellectual property,
backdoor training
BibRef
Sharma, S.,
Zou, J.J.,
Fang, G.,
A single watermark based scheme for both protection and
authentication of identities,
IET-IPR(16), No. 12, 2022, pp. 3113-3132.
DOI Link
2209
BibRef
Liu, X.[Xiyao],
Zhang, Y.[Yayun],
Du, S.[Sibo],
Zhang, J.[Jian],
Jiang, M.[Ming],
Fang, H.[Hui],
DIBR Zero-Watermarking Based on Invariant Feature and Geometric
Rectification,
MultMedMag(29), No. 3, July 2022, pp. 27-37.
IEEE DOI
2209
Videos, Feature extraction, Robustness, Watermarking, Cryptography, Shearing
BibRef
Wu, T.[Tong],
Li, X.H.[Xing-Hua],
Miao, Y.B.[Yin-Bin],
Xu, M.F.[Meng-Fan],
Zhang, H.Y.[Hai-Yan],
Liu, X.[Ximeng],
Choo, K.K.R.[Kim-Kwang Raymond],
CITS-MEW: Multi-Party Entangled Watermark in Cooperative Intelligent
Transportation System,
ITS(24), No. 3, March 2023, pp. 3528-3540.
IEEE DOI
2303
Watermarking, Federated learning, Training, Data models,
Intelligent transportation systems, Task analysis,
intellectual property
BibRef
Xiong, L.Z.[Li-Zhi],
Wu, Y.[Yue],
Yu, P.P.[Pei-Peng],
Zheng, Y.H.[Yu-Hui],
A black-box reversible adversarial example for authorizable
recognition to shared images,
PR(140), 2023, pp. 109549.
Elsevier DOI
2305
Reversible adversarial example, Reversible data hiding,
Prediction-error histogram
BibRef
Hua, G.[Guang],
Teoh, A.B.J.[Andrew Beng Jin],
Deep fidelity in DNN watermarking: A study of backdoor watermarking
for classification models,
PR(144), 2023, pp. 109844.
Elsevier DOI
2310
Deep fidelity, Backdoor watermarking, Backdoor fidelity,
Deep learning security, Neural network watermarking, Ownership verification
BibRef
Wang, H.[Heng],
Wang, H.X.[Hong-Xia],
Xia, J.H.[Jing-Hong],
Zhang, F.[Fei],
Robust Watermarking Against Camera Shooting for PowerPoint
Presentation,
SPLetters(31), 2024, pp. 1264-1268.
IEEE DOI
2405
Watermarking, Discrete cosine transforms, Cameras, Layout,
Visualization, Robustness, Smart phones, Document watermarking, robustness
BibRef
Xia, X.J.[Xiao-Jie],
Wang, L.[Liuan],
Sun, J.[Jun],
Nakagawa, A.[Akira],
Towards Generated Image Provenance Analysis via
Conceptual-Similar-Guided-SLIP Retrieval,
SPLetters(31), 2024, pp. 1419-1423.
IEEE DOI
2405
Image retrieval, Feature extraction, Self-supervised learning,
Visualization, Training, Task analysis, Refining, cross-modal
BibRef
Ding, K.M.[Kai-Meng],
Wang, Y.Y.[Ying-Ying],
Wang, C.[Chishe],
Ma, J.[Ji],
A New Subject-Sensitive Hashing Algorithm Based on Multi-PatchDrop
and Swin-Unet for the Integrity Authentication of HRRS Image,
IJGI(13), No. 9, 2024, pp. 336.
DOI Link
2410
BibRef
Huang, X.[Xinyi],
Wang, H.X.[Hong-Xia],
Robust text watermarking based on average skeleton mass of characters
against cross-media attacks,
JVCIR(104), 2024, pp. 104300.
Elsevier DOI
2411
Robust watermarking, Cross-media transmission, Document image
BibRef
Wang, L.[Lianyu],
Wang, M.[Meng],
Fu, H.Z.[Hua-Zhu],
Zhang, D.Q.[Dao-Qiang],
Say No to Freeloader: Protecting Intellectual Property of Your Deep
Model,
PAMI(46), No. 12, December 2024, pp. 11073-11086.
IEEE DOI
2411
Predictive models, Watermarking, Authorization, Adaptation models,
Protection, IP networks, Computational modeling, Deep learning,
domain transfer
BibRef
Zhu, L.[Liuhao],
Fang, Y.X.[Yi-Xiang],
Zhao, Y.[Yi],
Peng, Y.[Yi],
Wang, J.X.[Jun-Xiang],
Ni, J.Q.[Jiang-Qun],
Lite Localization Network and DUE-Based Watermarking for Color Image
Copyright Protection,
CirSysVideo(34), No. 10, October 2024, pp. 9311-9325.
IEEE DOI
2411
Watermarking, Distortion, Noise, Location awareness, Decoding,
Robustness, Transforms, Digital watermarking, DNN
BibRef
Dey, A.[Ashis],
Chowdhuri, P.[Partha],
Pal, P.[Pabitra],
Nandi, U.[Utpal],
A robust watermarking approach for medical image authentication using
dual image and quorum function,
JVCIR(104), 2024, pp. 104299.
Elsevier DOI
2411
Watermarking, Dual image, AD interpolation, Imperceptibility, Quorum function
BibRef
Alexan, W.[Wassim],
Mamdouh, E.[Eyad],
Aboshousha, A.[Amr],
Alsahafi, Y.S.[Youssef S.],
Gabr, M.[Mohamed],
Hosny, K.M.[Khalid M.],
Stegocrypt: A robust tri-stage spatial steganography algorithm using
TLM encryption and DNA coding for securing digital images,
IET-IPR(18), No. 13, 2024, pp. 4189-4206.
DOI Link
2411
DNA, image processing, steganography
BibRef
Huang, H.[Hong],
Han, Z.[ZhiGuang],
Multi-image encryption and authentication using computational ghost
imaging and singular value decomposition,
IET-IPR(18), No. 13, 2024, pp. 3878-3891.
DOI Link
2411
image coding, image processing, image reconstruction
BibRef
Cui, Q.[Qi],
Meng, R.[Ruohan],
Xu, C.H.[Chao-Hui],
Chang, C.H.[Chip-Hong],
Steganographic Passport: An Owner and User Verifiable Credential for
Deep Model IP Protection Without Retraining,
CVPR24(12302-12311)
IEEE DOI
2410
Training, Technological innovation, Law, Licenses, Robustness,
IP networks
BibRef
Zhu, P.F.[Pei-Fei],
Takahashi, T.[Tsubasa],
Kataoka, H.[Hirokatsu],
Watermark-embedded Adversarial Examples for Copyright Protection
against Diffusion Models,
CVPR24(24420-24430)
IEEE DOI
2410
Training, Image synthesis, Perturbation methods, Force, Watermarking,
Copyright protection, Generative adversarial networks,
copyright protection
BibRef
Golatkar, A.[Aditya],
Achille, A.[Alessandro],
Zancato, L.[Luca],
Wang, Y.X.[Yu-Xiang],
Swaminathan, A.[Ashwin],
Soatto, S.[Stefano],
CPR: Retrieval Augmented Generation for Copyright Protection,
CVPR24(12374-12384)
IEEE DOI
2410
Training, Adaptation models, Image synthesis, Merging, Text to image,
Copyright protection, Diffusion models
BibRef
Peng, B.Y.[Bo-Yang],
Qu, S.Q.[San-Qing],
Wu, Y.[Yong],
Zou, T.[Tianpei],
He, L.[Lianghua],
Knoll, A.[Alois],
Chen, G.[Guang],
Jiang, C.J.[Chang-Jun],
MAP: MAsk-Pruning for Source-Free Model Intellectual Property
Protection,
CVPR24(23585-23594)
IEEE DOI Code:
WWW Link.
2410
Measurement, Degradation, Training, Accuracy, Neural networks,
Training data, Intellectual property, intellectual property,
source free domain adaptation
BibRef
Jiang, Z.Y.[Zheng-Yuan],
Fang, M.[Minghong],
Gong, N.Z.Q.[Neil Zhen-Qiang],
IPCert: Provably Robust Intellectual Property Protection for Machine
Learning,
AROW23(3614-3623)
IEEE DOI
2401
BibRef
Luo, Z.Y.[Zi-Yuan],
Guo, Q.[Qing],
Cheung, K.C.[Ka Chun],
See, S.[Simon],
Wan, R.J.[Ren-Jie],
CopyRNeRF: Protecting the CopyRight of Neural Radiance Fields,
ICCV23(22344-22354)
IEEE DOI Code:
WWW Link.
2401
BibRef
Wang, L.Y.[Lian-Yu],
Wang, M.[Meng],
Zhang, D.Q.[Dao-Qiang],
Fu, H.Z.[Hua-Zhu],
Model Barrier: A Compact Un-Transferable Isolation Domain for Model
Intellectual Property Protection,
CVPR23(20475-20484)
IEEE DOI
2309
BibRef
Chen, Y.M.[Yi-Ming],
Tian, J.[Jinyu],
Chen, X.Y.[Xiang-Yu],
Zhou, J.T.[Jian-Tao],
Effective Ambiguity Attack Against Passport-based DNN Intellectual
Property Protection Schemes through Fully Connected Layer
Substitution,
CVPR23(8123-8132)
IEEE DOI
2309
BibRef
Chen, J.B.[Jian-Bo],
Liu, X.W.[Xin-Wei],
Liang, S.Y.[Si-Yuan],
Jia, X.J.[Xiao-Jun],
Xun, Y.[Yuan],
Universal Watermark Vaccine: Universal Adversarial Perturbations for
Watermark Protection,
AML23(2322-2329)
IEEE DOI
2309
BibRef
Wang, X.J.[Xing-Jun],
Jin, Y.X.[Yu-Xin],
A high-capacity text watermarking method based on geometric
micro-distortion,
ICPR22(1749-1755)
IEEE DOI
2212
Layout, Watermarking, Copyright protection, Distortion, Robustness, Faces
BibRef
Li, Y.[Yinan],
Zhang, W.M.[Wei-Ming],
Fang, H.[Han],
Yang, X.[Xi],
Ma, Z.[Zehua],
Yu, N.H.[Neng-Hai],
Font Watermarking Network for Text Images,
ICIP22(486-490)
IEEE DOI
2211
Perturbation methods, Watermarking, Manuals, digital watermark,
glyph perturbation, document protection, deep learning
BibRef
Zou, Z.H.[Zi-Hang],
Gong, B.Q.[Bo-Qing],
Wang, L.Q.[Li-Qiang],
Anti-Neuron Watermarking: Protecting Personal Data Against Unauthorized
Neural Networks,
ECCV22(XIII:449-465).
Springer DOI
2211
BibRef
Jeong, Y.[Yonghyun],
Kim, D.[Doyeon],
Ro, Y.[Youngmin],
Kim, P.[Pyounggeon],
Choi, J.W.[Jong-Won],
FingerprintNet: Synthesized Fingerprints for Generated Image Detection,
ECCV22(XIV:76-94).
Springer DOI
2211
BibRef
Ying, Q.C.[Qi-Chao],
Zhou, H.[Hang],
Zeng, X.H.[Xian-Han],
Xu, H.S.[Hai-Sheng],
Qian, Z.X.[Zhen-Xing],
Zhang, X.P.[Xin-Peng],
Hiding Images Into Images with Real-World Robustness,
ICIP22(111-115)
IEEE DOI
2211
Training, Image coding, Perturbation methods, Transform coding,
Copyright protection, Visual effects, Robustness, image hiding,
generative adversarial networks
BibRef
Andriushchenko, M.[Maksym],
Li, X.Y.R.[Xiao-Yang Rebecca],
Oxholm, G.[Geoffrey],
Gittings, T.[Thomas],
Bui, T.[Tu],
Flammarion, N.[Nicolas],
Collomosse, J.[John],
ARIA: Adversarially Robust Image Attribution for Content Provenance,
WMF22(33-43)
IEEE DOI
2210
Training, Location awareness, Heating systems, Visualization,
Perturbation methods, Computational modeling, Fingerprint recognition
BibRef
Xie, M.Y.[Ming-Yang],
Kulshrestha, M.[Manav],
Wang, S.J.[Shao-Jie],
Yang, J.H.[Jing-Han],
Chakrabarti, A.[Ayan],
Zhang, N.[Ning],
Vorobeychik, Y.[Yevgeniy],
PROVES: Establishing Image Provenance using Semantic Signatures,
WACV22(3017-3026)
IEEE DOI
2202
Training, Visualization, Image synthesis, Weapons,
Semantics, Generative adversarial networks,
Adversarial Attack and Defense Methods
BibRef
Sharma, S.[Sunpreet],
Zou, J.J.[Ju Jia],
Fang, G.[Gu],
A Novel Signature Watermarking Scheme for Identity Protection,
DICTA20(1-5)
IEEE DOI
2201
Digital images, Watermarking, Transforms,
Discrete wavelet transforms, Watermark, Cybersecurity, Wavelets, DWT, Identity
BibRef
Gruber, S.[Sebastian],
Neumayr, B.[Bernd],
Fabianek, C.[Christoph],
Gringinger, E.[Eduard],
Schuetz, C.G.[Christoph Georg],
Schrefl, M.[Michael],
Towards Informed Watermarking of Personal Health Sensor Data for Data
Leakage Detection,
IWDW20(109-124).
Springer DOI
2103
BibRef
Tohidi, F.[Faranak],
Paul, M.[Manoranjan],
Hooshmandasl, M.R.[Mohammad Reza],
Chakraborty, S.[Subrata],
Pradhan, B.[Biswajeet],
Block-wise Authentication and Recovery Scheme for Medical Images
Focusing on Content Complexity,
PSIVT19(86-99).
Springer DOI
2003
BibRef
Du, L.[Ling],
Wang, Y.J.[Yi-Jing],
Ho, A.T.S.[Anthony T. S.],
Multi-attack Reference Hashing Generation for Image Authentication,
IWDW19(407-420).
Springer DOI
2003
BibRef
Kuribayashi, M.[Minoru],
Wong, K.[Kok_Sheik],
Improved DM-QIM Watermarking Scheme for PDF Document,
IWDW19(171-183).
Springer DOI
2003
BibRef
Korus, P.[Pawel],
Memon, N.[Nasir],
Content Authentication for Neural Imaging Pipelines: End-To-End
Optimization of Photo Provenance in Complex Distribution Channels,
CVPR19(8613-8621).
IEEE DOI
2002
BibRef
Hachani, M.[Meha],
Zaid, A.O.[Azza Ouled],
Digital Signature Based Control Integrity for JPEG HDR Images,
CAIP19(II:449-458).
Springer DOI
1909
BibRef
Cardamone, N.[Nicolò],
d'Amore, F.[Fabrizio],
DWT and QR Code Based Watermarking for Document DRM,
IWDW18(137-150).
Springer DOI
1905
BibRef
Loc, C.V.[Cu Vinh],
Nguyen, T.[Trac],
Burie, J.C.[Jean-Christophe], xo
Ogier, J.M.[Jean-Marc],
A robust watermarking approach for security issue of binary documents
using fully convolutional networks,
IJDAR(23), No. 3, September 2020, pp. ages 219-239.
Springer DOI
2008
BibRef
Earlier: A1, A3, A4, Only:
Document Images Watermarking for Security Issue using Fully
Convolutional Networks,
ICPR18(1091-1096)
IEEE DOI
1812
Watermarking, Distortion, Transforms, Image segmentation,
Convolution, Feature extraction, Image edge detection
BibRef
Kim, E.J.[Eun-Jin],
Yu, J.M.[Jeong-Min],
A Consortium Blockchain System for Verifying Digital Contents on
Traditional Costumes,
EuroMed18(I:437-446).
Springer DOI
1811
BibRef
Ejeta, T.G.[Tekachew Gobena],
Kim, H.J.[Hyoung Joong],
Website Fingerprinting Attack on Psiphon and Its Forensic Analysis,
IWDW17(42-51).
Springer DOI
1708
BibRef
Uehira, K.[Kazutake],
Suzuki, M.[Masahiro],
Silapasuphakornwong, P.[Piyarat],
Torii, H.[Hideyuki],
Takashima, Y.[Youichi],
Copyright Protection for 3D Printing by Embedding Information Inside
3D-Printed Objects,
IWDW16(370-378).
Springer DOI
1703
BibRef
Sulema, Y.,
Image protection method based on binary operations,
WSSIP16(1-4)
IEEE DOI
1608
image coding
BibRef
Yang, P.P.[Peng-Peng],
Li, R.[Ruihan],
Ni, R.R.[Rong-Rong],
Zhao, Y.[Yao],
Recaptured Image Forensics Based on Quality Aware and Histogram Feature,
IWDW17(31-41).
Springer DOI
1708
BibRef
Earlier: A1, A3, A4, Only:
Recapture Image Forensics Based on Laplacian Convolutional Neural
Networks,
IWDW16(119-128).
Springer DOI
1703
BibRef
Qiao, X.M.[Xiu-Mei],
Ni, R.R.[Rong-Rong],
Zhao, Y.[Yao],
Superpixel-Based Watermarking Scheme for Image Authentication and
Recovery,
IWDW14(160-173).
Springer DOI
1602
BibRef
Cui, C.C.[Chen-Chen],
Ni, R.R.[Rong-Rong],
Zhao, Y.[Yao],
Robust Zero Watermarking for 3D Triangular Mesh Models Based on
Spherical Integral Invariants,
IWDW17(318-330).
Springer DOI
1708
BibRef
Lin, C.C.[Chia-Chen],
Huang, Y.H.[Yue-Hong],
Tai, W.L.[Wei-Liang],
A Novel Hybrid Image Authentication Scheme for AMBTC-Compressed Images,
IWDW14(433-443).
Springer DOI
1602
BibRef
Stole, S.[Svorad],
Soukup, D.[Daniel],
Huber-Mork, R.[Reinhold],
Invariant characterization of DOVID security features using a
photometric descriptor,
ICIP15(3422-3426)
IEEE DOI
1511
computational imaging.
Diffractive Optically Variable Image Devices. For security documents, money,
passports, etc.
BibRef
Zhao, B.[Bo],
Model-based iterative reconstruction for magnetic resonance
fingerprinting,
ICIP15(3392-3396)
IEEE DOI
1511
Bloch equation
BibRef
Kuribayashi, M.[Minoru],
Schaathun, H.G.[Hans Georg],
Image fingerprinting system based on collusion secure code and
watermarking method,
ICIP15(2120-2124)
IEEE DOI
1511
OFDM-based watermarking
BibRef
Naveen, C.,
Gupta, T.V.S.,
Satpute, V.R.,
Gandhi, A.S.,
A simple and efficient approach for medical image security using
chaos on EZW,
ICAPR15(1-6)
IEEE DOI
1511
image coding
BibRef
Chetan, K.R.,
Nirmala, S.,
A novel intelligent robust watermarking scheme for protecting
information in document images,
ICAPR15(1-6)
IEEE DOI
1511
document image processing
BibRef
Shin, J.[Jinse],
Kim, D.S.[Dong-Sung],
Ruland, C.[Christoph],
Content based image authentication using HOG feature descriptor,
ICIP14(5292-5296)
IEEE DOI
1502
Authentication
BibRef
Hoang, B.A.M.[Bao An Mai],
Sawaya, W.[Wadih],
Bas, P.[Patrick],
Image model and printed document authentication:
A theoretical analysis,
ICIP14(5377-5381)
IEEE DOI
1502
Authentication
BibRef
Sun, J.H.[Jia-Hao],
Lin, Y.H.[Yu-Hsun],
Wu, J.L.[Ja-Ling],
Secure Client Side Watermarking with Limited Key Size,
MMMod15(I: 13-24).
Springer DOI
1501
BibRef
Chen, C.[Chao],
Li, H.D.[Hao-Dong],
Luo, W.Q.[Wei-Qi],
Yang, R.[Rui],
Huang, J.W.[Ji-Wu],
Anti-forensics of JPEG Detectors via Adaptive Quantization Table
Replacement,
ICPR14(672-677)
IEEE DOI
1412
Detectors
BibRef
Hoang, A.T.[Anh-Tu],
Nguyen-Son, H.Q.[Hoang-Quoc],
Tran, M.T.[Minh-Triet],
Echizen, I.[Isao],
Detecting Traitors in Re-publishing Updated Datasets,
IWDW13(205-220).
Springer DOI
1407
BibRef
Tian, H.W.[Hua-Wei],
Zhao, Y.[Yao],
Ni, R.R.[Rong-Rong],
Qin, L.M.[Lun-Ming],
Li, X.L.[Xue-Long],
LDFT-Based Watermarking Resilient to Local Desynchronization Attacks,
Cyber(43), No. 6, 2013, pp. 2190-2201.
IEEE DOI
1312
feature extraction
BibRef
Gebhardt, J.,
Goldstein, M.,
Shafait, F.,
Dengel, A.R.,
Document Authentication Using Printing Technique Features and
Unsupervised Anomaly Detection,
ICDAR13(479-483)
IEEE DOI
1312
authorisation
BibRef
Bertrand, R.,
Gomez-Kramer, P.,
Ramos Terrades, O.,
Franco, P.,
Ogier, J.M.,
A System Based on Intrinsic Features for Fraudulent Document
Detection,
ICDAR13(106-110)
IEEE DOI
1312
document image processing
BibRef
Imran, M.[Muhammad],
Ghafoor, A.[Abdul],
Khokher, M.R.[Muhammad Rizwan],
A robust non-blind color image watermarking scheme,
ICARCV12(1392-1396).
IEEE DOI
1304
BibRef
Liu, F.[Fang],
Cheng, L.M.[Lee-Ming],
Perceptual Image Hashing via Wave Atom Transform,
IWDW11(468-478).
Springer DOI
1208
BibRef
Schrittwieser, S.[Sebastian],
Kieseberg, P.[Peter],
Echizen, I.[Isao],
Wohlgemuth, S.[Sven],
Sonehara, N.[Noboru],
Weippl, E.[Edgar],
An Algorithm for k-Anonymity-Based Fingerprinting,
IWDW11(439-452).
Springer DOI
1208
BibRef
Yamada, T.[Takayuki],
Gohshi, S.[Seiichi],
Echizen, I.[Isao],
Countermeasure of re-recording prevention against attack with short
wavelength pass filter,
ICIP11(2753-2756).
IEEE DOI
1201
BibRef
Praveen, R.G.[R. Gnana],
Madhavaraj, A.,
Karthik, K.[Kannan],
A code and domain independent traitor tracing system based on the
eigen-decomposition of fingerprinted images,
ICIIP11(1-6).
IEEE DOI
1112
BibRef
Shakeri, M.[Mahsa],
Jamzad, M.[Mansour],
A Robust Zero-Watermark Copyright Protection Scheme Based on DWT and
Image Normalization,
PSIVT11(II: 359-370).
Springer DOI
1111
BibRef
Bruna, A.R.,
Messina, G.,
Battiato, S.,
Crop Detection through Blocking Artefacts Analysis,
CIAP11(I: 650-659).
Springer DOI
1109
Actually not a watermark, analysis to detect cropping.
BibRef
El-Hadedy, M.[Mohamed],
Pitsilis, G.[Georgios],
Knapskog, S.J.[Svein J.],
An Efficient Authorship Protection Scheme for Shared Multimedia Content,
ICIG11(914-919).
IEEE DOI
1109
BibRef
Cao, G.[Gang],
Zhao, Y.[Yao],
Ni, R.[Rongrong],
Forensic estimation of gamma correction in digital images,
ICIP10(2097-2100).
IEEE DOI
1009
BibRef
Gul, G.[Gokhan],
Avcibas, I.[Ismail],
Kurugollu, F.[Fatih],
SVD based image manipulation detection,
ICIP10(1765-1768).
IEEE DOI
1009
BibRef
Conotter, V.[Valentina],
Boato, G.[Giulia],
Farid, H.[Hany],
Detecting photo manipulation on signs and billboards,
ICIP10(1741-1744).
IEEE DOI
1009
BibRef
Vazquez-Padin, D.[David],
Mosquera, C.[Carlos],
Perez-Gonzalez, F.[Fernando],
Two-dimensional statistical test for the presence of almost
cyclostationarity on images,
ICIP10(1745-1748).
IEEE DOI
1009
To detect digital forgeries.
BibRef
Shariati, S.[Saloomeh],
Jacques, L.[Laurent],
Standaert, F.X.[Francois-Xavier],
Macq, B.[Benoit],
Salhi, M.A.[Mohamed Amin],
Antoine, P.[Philippe],
Randomly driven fuzzy key extraction of unclonable images,
ICIP10(4329-4332).
IEEE DOI
1009
BibRef
Yamada, T.[Takayuki],
Gohshi, S.[Seiichi],
Echizen, I.[Isao],
Preventing re-recording based on difference between sensory perceptions
of humans and devices,
ICIP10(993-996).
IEEE DOI
1009
BibRef
Lu, W.J.[Wen-Jun],
Wu, M.[Min],
Multimedia forensic hash based on visual words,
ICIP10(989-992).
IEEE DOI
1009
BibRef
Koide, M.[Masafumi],
Iwamura, K.[Keiichi],
Scalable authentication for various representations of JPEG 2000 images,
ICIP10(985-988).
IEEE DOI
1009
BibRef
Lie, W.N.[Won-Nuiig],
Hsu, T.L.[Tze-Liang],
Lin, G.S.[Guo-Shiang],
Verification of image content integrity by using dual watermarking on
wavelets domain,
ICIP03(II: 487-490).
IEEE Abstract.
0312
BibRef
Kundu, M.K.[Malay Kumar],
Das, S.[Sudeb],
Lossless ROI Medical Image Watermarking Technique with Enhanced
Security and High Payload Embedding,
ICPR10(1457-1460).
IEEE DOI
1008
BibRef
Zhang, C.[Chi],
Zhang, H.B.[Hong-Bin],
Exposing Digital Image Forgeries by Using Canonical Correlation
Analysis,
ICPR10(838-841).
IEEE DOI
1008
BibRef
Huang, Y.Z.[Yi-Zhen],
Fan, N.[Na],
Learning from interpolated images using neural networks for digital
forensics,
CVPR10(177-182).
IEEE DOI
1006
BibRef
Cai, L.[Ling],
Xu, Y.[Yiren],
He, L.[Lei],
Zhao, Y.M.[Yu-Ming],
Yang, X.[Xin],
An Effective Segmentation for Noise-Based Image Verification Using
Gamma Mixture Models,
ACCV09(III: 21-32).
Springer DOI
0909
For verification, protection. Add noise to make OCR difficult.
BibRef
Hsu, C.Y.[Chao-Yung],
Lu, C.S.[Chun-Shien],
Pei, S.C.[Soo-Chang],
Secure image hashing via minimum distortion estimation,
ICIP09(1281-1284).
IEEE DOI
0911
BibRef
Kang, L.W.[Li-Wei],
Lu, C.S.[Chun-Shien],
Hsu, C.Y.[Chao-Yung],
Compressive sensing-based image hashing,
ICIP09(1285-1288).
IEEE DOI
0911
BibRef
Laadjel, M.,
Zebbiche, K.,
Kurugullu, F.,
Bouridane, A.,
Nibouche, O.,
Watermarking for Palmprint Image Protection,
IMVIP09(71-76).
IEEE DOI
0909
BibRef
Cruz-Ramos, C.[Clara],
Reyes-Reyes, R.[Rogelio],
Nakano-Miyatake, M.[Mariko],
Pérez-Meana, H.M.[Héctor M.],
Image Authentication Scheme Based on Self-embedding Watermarking,
CIARP09(1005-1012).
Springer DOI
0911
BibRef
Xing, N.[Nan],
Zhu, H.[Hong],
Ma, W.Q.[Wen-Qing],
Dong, M.[Min],
The Identification Algorithm of Forged Image Based on BP Neural Network,
CISP09(1-4).
IEEE DOI
0910
BibRef
Lv, X.L.[Xiu-Li],
Bian, H.Y.[Hong-Yu],
Yang, Y.F.[Yu-Fei],
Color Image Watermarking Using Support Vector Regression,
CISP09(1-4).
IEEE DOI
0910
BibRef
Li, Y.[Yang],
Du, S.[Sidan],
Biometric Watermarking Based on Affine Parameters Estimation,
CISP09(1-6).
IEEE DOI
0910
BibRef
Ye, T.Y.[Tian-Yu],
Ma, Z.F.[Zhao-Feng],
Niu, X.X.[Xin-Xin],
Yang, Y.X.[Yi-Xian],
A Robust Zero-Watermark Algorithm Based on Singular Value Decomposition
for Digital Right Management,
CISP09(1-3).
IEEE DOI
0910
BibRef
Kiani, S.,
Moghaddam, M.E.,
A Fractal Based Image Watermarking for Authentication and Verification,
CISP09(1-5).
IEEE DOI
0910
BibRef
Kuo, C.C.J.[C.C. Jay],
Design of Collusion-Resistant Fingerprinting Systems:
Review and New Results,
DW08(469).
Springer DOI
0811
BibRef
Poh, G.S.[Geong Sen],
Martin, K.M.[Keith M.],
An Efficient Buyer-Seller Watermarking Protocol Based on Chameleon
Encryption,
DW08(433-447).
Springer DOI
0811
BibRef
Williams, D.M.[David M.],
Treharne, H.[Helen],
Ho, A.T.S.[Anthony T.S.],
Waller, A.[Adrian],
Formal Analysis of Two Buyer-Seller Watermarking Protocols,
DW08(278-292).
Springer DOI
0811
BibRef
Zhang, Y.P.[Yong-Ping],
Kang, X.G.[Xian-Gui],
Zhang, P.[Philipp],
A Practical Print-and-Scan Resilient Watermarking for High Resolution
Images,
DW08(103-112).
Springer DOI
0811
BibRef
Poh, G.S.[Geong Sen],
Martin, K.M.[Keith M.],
Classification Framework for Fair Content Tracing Protocols,
DW09(252-267).
Springer DOI
0908
BibRef
Delp, E.J.[Edward J.],
Forensic Techniques for Image Source Classification:
A Comparative Study,
DW09(3).
Springer DOI
0908
BibRef
Sun, S.[Shewen],
Wei, S.[Song],
Wang, C.[Cong],
DPCC and QR factorization-based color medical image authentication
algorithm,
IASP09(81-84).
IEEE DOI
0904
BibRef
Kim, H.S.[Hung-Sik],
Lee, J.K.[Jeong-Kyu],
Liu, H.B.[Hai-Bin],
Lee, D.W.[Dong-Won],
Video linkage: group based copied video detection,
CIVR08(397-406).
0807
BibRef
Garain, U.[Utpal],
Halder, B.[Biswajit],
Machine Authentication of Security Documents,
ICDAR09(718-722).
IEEE DOI
0907
BibRef
Earlier:
On Automatic Authenticity Verification of Printed Security Documents,
ICCVGIP08(706-713).
IEEE DOI
0812
BibRef
Geisselhardt, W.[Walter],
Iqbal, T.[Taswar],
High-Capacity Invisible Background Encoding for Digital Authentication
of Hardcopy Documents,
DW07(203-221).
Springer DOI
0712
BibRef
Li, Q.M.[Qi-Ming],
Memon, N.[Nasir],
Practical Security of Non-Invertible Watermarking Schemes,
ICIP07(IV: 445-448).
IEEE DOI
0709
BibRef
Okada, M.[Mitsuo],
Okabe, Y.[Yasuo],
Uehara, T.[Tetsutaro],
Semi-blind Fingerprinting Utilizing Ordinary Existing Watermarking
Techniques,
DW09(14-28).
Springer DOI
0908
BibRef
Hou, S.H.[Shu-Hui],
Uehara, T.[Tetsutaro],
Morimura, Y.[Yoshitaka],
Minoh, M.[Michihiko],
Fingerprinting Codes for Live Pay-Television Broadcast Via Internet,
MCAM07(252-261).
Springer DOI
0706
BibRef
Hu, C.Y.[Cheng-Yu],
Liu, P.T.[Peng-Tao],
Li, D.X.[Da-Xing],
A New Type of Proxy Ring Signature Scheme with Revocable Anonymity and
No Info Leaked,
MCAM07(262-266).
Springer DOI
0706
BibRef
Chang, S.F.[Shih-Fu],
Blind Passive Media Forensics: Motivation and Opportunity,
MCAM07(57-59).
Springer DOI
0706
BibRef
Li, Q.M.[Qi-Ming],
Memon, N.[Nasir],
Security Models of Digital Watermarking,
MCAM07(60-64).
Springer DOI
0706
BibRef
Jin, C.[Cong],
Pan, L.G.[Liang-Gang],
Su, T.[Ting],
A Blind Watermarking Scheme Based on Visual Model for Copyright
Security,
MCAM07(454-463).
Springer DOI
0706
BibRef
Qin, C.[Chuan],
Lee, W.B.[Wei-Bin],
Zhang, X.P.[Xin-Peng],
Wang, S.Z.[Shuo-Zhong],
Copyright Management Using Progressive Image Delivery, Visible
Watermarking and Robust Fingerprinting,
ICARCV06(1-4).
IEEE DOI
0612
BibRef
Ni, J.Q.[Jiang-Qun],
Zhang, R.Y.[Rong-Yue],
Huang, J.W.[Ji-Wu],
Wang, C.T.[Chun-Tao],
Li, Q.B.[Quan-Bo],
A Rotation-Invariant Secure Image Watermarking Algorithm Incorporating
Steerable Pyramid Transform,
DW06(446-460).
Springer DOI
0611
BibRef
Ye, S.M.[Shui-Ming],
Sun, Q.B.[Qi-Bin],
Chang, E.C.[Ee-Chien],
Error Resilient Image Authentication Using Feature Statistical and
Spatial Properties,
DW06(461-472).
Springer DOI
0611
BibRef
Lemma, A.[Aweke],
Katzenbeisser, S.[Stefan],
Celik, M.U.[Mehmet U.],
van der Veen, M.[Michiel],
Secure Watermark Embedding Through Partial Encryption,
DW06(433-445).
Springer DOI
0611
BibRef
Kwon, G.R.[Goo-Rak],
Lee, K.H.[Kwan-Hee],
Nam, S.J.[Sang-Jae],
Ko, S.J.[Sung-Jea],
Intellectual Property Rights Management Using Combination Encryption in
MPEG-4,
DW06(188-196).
Springer DOI
0611
BibRef
Awrangjeb, M.[Mohammad],
Murshed, M.,
Robust Signature-Based Geometric Invariant Copyright Protection,
ICIP06(1961-1964).
IEEE DOI
0610
BibRef
Akhshani, A.,
Mahmodi, H.,
Akhavan, A.,
A Novel Block Cipher Based on Hierarchy of One-Dimensional Composition
Chaotic Maps,
ICIP06(1993-1996).
IEEE DOI
0610
BibRef
Cho, I.H.[Ik-Hwan],
Cho, A.Y.[A-Young],
Kim, H.K.[Hae-Kwang],
Oh, W.G.[Weon-Geun],
Jeong, D.S.[Dong-Seok],
Robust Visual Identifier for Cropped Natural Photos,
ACIVS06(933-943).
Springer DOI
0609
Actually not a watermark, analysis to detect cropping.
BibRef
Hsu, C.S.[Ching-Sheng],
Tu, S.F.[Shu-Fen],
Hou, Y.C.[Young-Chang],
A Statistical Approach for Ownership Identification of Digital Images,
ACIVS06(666-674).
Springer DOI
0609
BibRef
Cheng, S.,
Wu, Q.A.[Qi-Ang],
Castleman, K.R.,
Non-Ubiquitous Digital Watermarking for Record Indexing and Integrity
Protection of Medical Images,
ICIP05(II: 1062-1065).
IEEE DOI
0512
BibRef
Doerr, G.J.,
Dugelay, J.L.,
A Countermeasure to Resist Block Replacement Attacks,
ICIP05(I: 965-968).
IEEE DOI
0512
BibRef
He, D.J.[Da-Jun],
Sun, Q.B.[Qi-Bin],
A Practical Print-Scan Resilient Watermarking Scheme,
ICIP05(I: 257-260).
IEEE DOI
0512
BibRef
Tzeng, J.N.[Jeng-Nan],
Hwang, W.L.[Wen-Liang],
Chern, I.L.[I-Liang],
An Asymmetric Watermarking Method for Copyright Protection Utilizing
Dual Bases,
ICIP05(I: 269-272).
IEEE DOI
0512
BibRef
Harmanci, O.,
Monga, V.,
Mihcak, M.K.,
Geometrically Invariant Image Watermarking via Robust Perceptual Hashes,
ICIP06(1397-1400).
IEEE DOI
0610
BibRef
Mao, Y.N.[Yi-Nian],
Mihcak, M.K.,
Collusion-Resistant Intentional De-Synchronization for Digital Video
Fingerprinting,
ICIP05(I: 237-240).
IEEE DOI
0512
BibRef
Krawczyk, S.[Stephen],
Jain, A.K.[Anil K.],
Securing Electronic Medical Records Using Biometric Authentication,
AVBPA05(1110).
Springer DOI
0509
BibRef
Monaci, G.,
Escoda, O.D.,
Vandergheynst, P.,
Analysis of Multimodal Signals Using Redundant Representations,
ICIP05(III: 145-148).
IEEE DOI
0512
BibRef
Yu, S.S.[Sheng-Sheng],
Hu, Y.P.[Yu-Ping],
Zhou, J.L.[Jing-Li],
Content-based watermarking scheme for image authentication,
ICARCV04(II: 1083-1087).
IEEE DOI
0412
BibRef
Jost, P.,
Vandergheynst, P.,
Frossard, P.,
Redundant image representations in security applications,
ICIP04(IV: 2151-2154).
IEEE DOI
0505
BibRef
Herley, C.,
Vora, P.,
Yang, S.,
Detection and deterrence of counterfeiting of valuable documents,
ICIP04(IV: 2423-2426).
IEEE DOI
0505
BibRef
Kim, H.Y.[Hae Yong],
A New Public-Key Authentication Watermarking for Binary Document Images
Resistant to Parity Attacks,
ICIP05(II: 1074-1077).
IEEE DOI
0512
BibRef
Kim, H.Y.[Hae Yong],
de Queiroz, R.L.,
A public-key authentication watermarking for binary images,
ICIP04(V: 3459-3462).
IEEE DOI
0505
BibRef
Pamboukian, S.V.D.,
Kim, H.Y.[Hae Yong],
de Queiroz, R.L.,
Watermarking JBIG2 Text Region for Image Authentication,
ICIP05(II: 1078-1081).
IEEE DOI
0512
BibRef
Kim, H.Y.[Hae Yong],
de Queiroz, R.L.[Ricardo Lopes],
Alteration-Locating Authentication Watermarking for Binary Images,
DW04(125-136).
Springer DOI
0505
BibRef
Patra, J.C.,
Ang, K.K.[Kah K.],
Ang, E.L.[Ee-Luang],
Hierarchical multiple image watermarking for image authentication and
ownership verification,
ICIP04(IV: 2661-2664).
IEEE DOI
0505
BibRef
Avcibas, I.,
Bayram, S.,
Memon, N.,
Ramkumar, M.,
Sankur, B.,
A classifier design for detecting image manipulations,
ICIP04(IV: 2645-2648).
IEEE DOI
0505
BibRef
Chao, J.H.[Jin-Hui],
Suzuki, S.,
Kim, J.[Jongdae],
Copyright tracing using invariants of contents,
ICIP04(IV: 2183-2186).
IEEE DOI
0505
BibRef
Kim, W.G.[Won-Gyum],
Suh, Y.H.[Young-Ho],
Short N-Secure Fingerprinting Code for Image,
ICIP04(IV: 2167-2170).
IEEE DOI
0505
BibRef
Yao, Z.[Zhen],
Rajpoot, N.M.,
Radon/ridgelet signature for image authentication,
ICIP04(I: 43-46).
IEEE DOI
0505
BibRef
Shaked, D.,
Baharav, Z.,
Levy, A.,
Yen, J.,
Saw, C.W.[Chit Wei],
Graphical Indicia,
ICIP03(I: 485-488).
IEEE Abstract.
0312
Authenticable graphical barcode.
BibRef
Adelsbach, A.[André],
Katzenbeisser, S.[Stefan],
Sadeghi, A.R.[Ahmad-Reza],
On the Insecurity of Non-invertible Watermarking Schemes for Dispute
Resolving,
DW03(355-369).
Springer DOI
0405
BibRef
Lu, C.S.[Chun-Shien],
Hsu, C.Y.[Chao-Yong],
Content-Dependent Anti-disclosure Image Watermark,
DW03(61-76).
Springer DOI
0405
BibRef
Johnson, M.[Mark],
Ramchandran, K.,
Dither-based secure image hashing using distributed coding,
ICIP03(II: 751-754).
IEEE Abstract.
0312
BibRef
Lefebvre, F.,
Czyz, J.,
Macq, B.,
A robust soft hash algorithm for digital image signature,
ICIP03(II: 495-498).
IEEE Abstract.
0312
BibRef
Lee, S.K.[Sang-Kwang],
Suh, Y.H.[Young-Ho],
Ho, Y.S.[Yo-Sung],
Public Key Watermarking for Reversible Image Authentication,
ICIP06(1409-1412).
IEEE DOI
0610
BibRef
Sagetong, P.,
Zhou, W.S.[Wen-Sheng],
Dynamic wavelet feature-based watermarking for copyright tracking in
digital movie distribution systems,
ICIP02(III: 653-656).
IEEE DOI
0210
BibRef
Aguzzi, M.[Marco],
Albanesi, M.G.[Maria Grazia],
Ferretti, M.[Marco],
A Novel Watermarking Algorithm for Image Authentication: Robustness
Against Common Attacks and JPEG2000 Compression,
CIAP05(559-567).
Springer DOI
0509
BibRef
Albanesi, M.G.,
Ferretti, M.,
Guerrini, F.,
A taxonomy for image authentication techniques and its application to
the current state of the art,
CIAP01(535-540).
IEEE DOI
0210
BibRef
Yu, G.J.,
Mean Quantization Blind Watermarking for Image Authentication,
ICIP00(Vol III: 706-709).
IEEE DOI
0008
BibRef
Herley, C.,
Securing Images Online:
A Protection Mechanism That Does Not Involve Watermarking,
ICIP00(Vol III: 660-663).
IEEE DOI
0008
BibRef
Hel-Or, H.,
Copyright Labeling of Printed Images,
ICIP00(Vol III: 702-705).
IEEE DOI
0008
BibRef
Tsekeridou, S.,
Nikolaidis, N.D.,
Sidiropoulos, N.D.,
Pitas, I.,
Copyright Protection of Still Images Using Self-similar Chaotic
Watermarks,
ICIP00(Vol I: 411-414).
IEEE DOI
0008
BibRef
O'Ruanaidh, J.J.K.[Joseph J.K.],
Csurka, G.[Gabriella],
A Bayesian Approach to Spread Spectrum Watermark Detection and Secure
Copyright Protection for Digital Image Libraries,
CVPR99(I: 207-212).
IEEE DOI
BibRef
9900
Ratakonda, K.,
Dugad, R.,
Ahuja, N.,
Digital image watermarking: issues in resolving rightful ownership,
ICIP98(II: 414-418).
IEEE DOI
9810
BibRef
Dugad, R.,
Ratakonda, K.,
Ahuja, N.,
A new wavelet-based scheme for watermarking images,
ICIP98(II: 419-423).
IEEE DOI
9810
BibRef
Braudaway, G.,
Protecting Publicly Available Images with an Invisible Image Watermark,
ICIP97(I: 524-527).
IEEE DOI
BibRef
9700
Zeng, W., and
Liu, B.,
On Resolving Rightful Ownerships of Digital Images by
Invisible Watermarks,
ICIP97(I: 552-555).
IEEE DOI
9710
BibRef
Yeung, M., and
Mintzer, F.,
An Invisible Watermarking Technique for Image Verification,
ICIP97(II: 680-683).
IEEE DOI
BibRef
9700
Pitas, I.,
A method for signature casting on digital images,
ICIP96(III: 215-218).
IEEE DOI
9610
BibRef
Schneider, M.,
Chang, S.F.[Shih-Fu],
A robust content based digital signature for image authentication,
ICIP96(III: 227-230).
IEEE DOI
9610
BibRef
Chapter on OCR, Document Analysis and Character Recognition Systems continues in
Forgery Detection for Images .