25.3.12 Watermarks for Copyright, Ownership Protection, Authentication, Verification

Chapter Contents (Back)
Watermark. Copyright Protection. Ownership Protection. Authentication.
See also Watermarks in Halftone Images.
See also Video Copy, Video Duplicate Detection. Usually the more specific papers.
See also Forgery Detection for Images.

Katoh, M.[Mitsutaka], Ohmae, K.[Kouichi], Sonoda, S.[Shinya], Yanagida, M.[Masahito], Senga, M.[Masanori],
Image processing device and method for identifying an input image, and copier scanner and printer including same,
US_Patent5,845,008, Dec 1, 1998
WWW Link. BibRef 9812
And: US_Patent6,289,125, Sep 11, 2001
WWW Link. preprint a pattern, detect and do not copy. BibRef

Brassil, J.T., Low, S., Maxemchuk, N.F.,
Copyright protection for the electronic distribution of text documents,
PIEEE(87), No. 7, July 1999, pp. 1181-1196.
IEEE DOI 9907
BibRef

Brzakovic, D., Vujovic, N.,
Authentication of Random Patterns by Finding a Match in an Image Database,
IVC(14), No. 7, July 1996, pp. 485-499.
Elsevier DOI 9607
Find an exact match of a random texture. Apply to authentication of documents where random fibers are embedded. BibRef

Oruanaidh-Ruanaidh, J.J.K., Dowling, W.J., Boland, F.M.,
Watermarking Digital Images for Copyright Protection,
VISP(143), No. 4, August 1996, pp. 250-256. 9611
BibRef
Earlier:
Phase watermarking of digital images,
ICIP96(III: 239-242).
IEEE DOI 9610
BibRef

Barni, M.[Mauro], Bartolini, F.[Franco], Cappellini, V.[Vito], Piva, A.[Alessandro],
Copyright Protection of Digital Images by Embedded Unperceivable Marks,
IVC(16), No. 12-13, 24 August 1998, pp. 897-906.
Elsevier DOI BibRef 9808

Low, S.H., Maxemchuk, N.F., Lapone, A.M.,
Document Identification for Copyright Protection Using Centroid Detection,
Commun(46), No. 3, March 1998, pp. 372-383. 9804
BibRef

Brassil, J.T., Low, S.H., Maxemchuk, N.F., O'Gorman, L.,
Marking text features of document images to deter illicit dissemination,
ICPR94(B:315-319).
IEEE DOI 9410
BibRef

Barnett, R., Pearson, D.,
Attack Operators for Digitally Watermarked Images,
VISP(145), No. 4, August 1998, pp. 271-279. 9810
BibRef

Memon, N.[Nasir], Wong, P.W.[Ping Wah],
Protecting Digital Media Content,
CACM(41), No. 7, July 1998, pp. 35-43. Adding visible and invisible watermarks BibRef 9807

Memon, N., Wong, P.W.[Ping Wah],
A buyer-seller watermarking protocol,
IP(10), No. 4, April 2001, pp. 643-649.
IEEE DOI 0104
BibRef

Wong, P.W.[Ping Wah], Memon, N.,
Secret and public key image watermarking schemes for image authentication and ownership verification,
IP(10), No. 10, October 2001, pp. 1593-1601.
IEEE DOI 0111
BibRef

Holliman, M., Memon, N.,
Counterfeiting Attacks on Oblivious Block-wise Independent Invisible Watermarking Schemes,
IP(9), No. 3, March 2000, pp. 432-441.
IEEE DOI 0003
BibRef

Wong, P.W.[Ping Wah],
A public key watermark for image verification and authentication,
ICIP98(I: 455-459).
IEEE DOI 9810
BibRef

Chen, T.S., Chang, C.C., Hwang, M.S.,
A Virtual Image Cryptosystem Based upon Vector Quantization,
IP(7), No. 10, October 1998, pp. 1485-1488.
IEEE DOI BibRef 9810

Augot, D., Boucqueau, J.M., Delaigle, J.F., Fontaine, C., Goray, E.,
Secure delivery of images over open networks,
PIEEE(87), No. 7, July 1999, pp. 1251-1266.
IEEE DOI 9907
BibRef

Low, S.H., Maxemchuk, N.F.,
Capacity of Text Marking Channel,
SPLetters(7), No. 12, December 2000, pp. 345-347.
IEEE Top Reference. 0011
BibRef
Earlier: A2, A1:
Marking Text Documents,
ICIP97(III: 13).
IEEE DOI BibRef

Burgett, S., Koch, E., Zhao, J.,
Copyright Labeling of Digitized Image Data,
CommunMag(36), No. 3, March 1998, pp. 94-100. 9804
BibRef

Garg, G.[Gaurav], Sharma, P.K.[Pramod Kumar], Chaudhury, S.[Santanu],
Image based document authentication using DCT,
PRL(22), No. 6-7, May 2001, pp. 725-729.
Elsevier DOI 0105
BibRef

Bartolini, F., Tefas, A., Barni, M., Pitas, I.,
Image authentication techniques for surveillance applications,
PIEEE(89), No. 10, October 2001, pp. 1403-1418.
IEEE DOI 0110
BibRef

Lu, C.S.[Chun-Shien], Liao, H.Y.M.,
Multipurpose watermarking for image authentication and protection,
IP(10), No. 10, October 2001, pp. 1579-1592.
IEEE DOI 0111
BibRef

Dittmann, J.[Jana], Steinebach, M.[Martin], Wohlmacher, P.[Petra], Ackermann, R.[Ralf],
Digital Watermarks Enabling E-Commerce Strategies: Conditional and User Specific Access to Services and Resources,
JASP(2002), No. 2, 2002, pp. 174-184. 0202
BibRef

Liu, H.J.[Hua-Jian], Steinebach, M.[Martin],
Digital Watermarking for Image Authentication with Localization,
ICIP06(1973-1976).
IEEE DOI 0610
BibRef

Merkel, R.[Ronny], Kraetzer, C.[Christian], Altschaffel, R.[Robert], Clausing, E.[Eric], Schott, M.[Maik], Dittmann, J.[Jana],
Fingerprint Forensics Application Protocol: Semi-automated Modeling and Verification of Watermark-Based Communication Using CASPER and FDR,
IWDW11(321-335).
Springer DOI 1208
BibRef

Wang, Y.W.[Yi-Wei], Doherty, J.F., van Dyck, R.E.,
A wavelet-based watermarking algorithm for ownership verification of digital images,
IP(11), No. 2, February 2002, pp. 77-88.
IEEE DOI 0202
BibRef

Lu, C.S.[Chun-Shien], Liao, H.Y.M., Kutter, M.,
Denoising and copy attacks resilient watermarking by exploiting prior knowledge at detector,
IP(11), No. 3, March 2002, pp. 280-292.
IEEE DOI 0203
BibRef

Desset, C.[Claude], Macq, B.[Benoît], Vandendorpe, L.[Luc],
Block error-correcting codes for systems with a very high BER: Theoretical analysis and application to the protection of watermarks,
SP:IC(17), No. 5, May 2002, pp. 409-421.
Elsevier DOI 0206
BibRef

Celik, M.U., Sharma, G., Saber, E., Tekalp, A.M.[A. Murat],
Hierarchical watermarking for secure image authentication with localization,
IP(11), No. 6, June 2002, pp. 585-595.
IEEE DOI 0207
BibRef
Earlier:
A Hierarchical Image Authentication Watermark with Improved Localization and Security,
ICIP01(II: 502-505).
IEEE DOI 0108
BibRef

Altun, H.O., Sharma, G., Bocko, M.F.,
Optimum Watermark Design by Vector Space Projections,
ICIP06(1413-1416).
IEEE DOI 0610
BibRef

Altun, H.O., Sharma, G., Celik, M.U., Bocko, M.F.,
Semifragile Hierarchical Watermarking in a Set Theoretic Framework,
ICIP05(I: 1001-1004).
IEEE DOI 0512
BibRef

Gunsel, B.[Bilge], Uludag, U.[Umut], Tekalp, A.M.[A. Murat],
Robust watermarking of fingerprint images,
PR(35), No. 12, December 2002, pp. 2739-2747.
Elsevier DOI 0209
BibRef

Zhang, X.P.[Xin-Peng], Wang, S.Z.[Shuo-Zhong],
Watermarking scheme capable of resisting attacks based on availability of inserter,
SP(82), No. 11, November 2002, pp. 1801-1804.
Elsevier DOI 0210
BibRef

Zhang, X.P.[Xin-Peng], Wang, S.Z.[Shuo-Zhong],
Watermarking Scheme Capable of Resisting Sensitivity Attack,
SPLetters(14), No. 2, February 2007, pp. 125-128.
IEEE DOI 0703
BibRef

Radhakrishnan, R., Memon, N.,
On the security of the digest function in the SARI image authentication system,
CirSysVideo(12), No. 11, November 2002, pp. 1030-1033.
IEEE Top Reference. 0301
BibRef
Earlier:
On the security of the SARI image authentication system,
ICIP01(III: 971-974).
IEEE DOI 0108
BibRef

Baudry, S.[Séverine], Nguyen, P.[Philippe], Maître, H.[Henri],
Optimal decoding for watermarks subject to geometrical attacks,
SP:IC(18), No. 4, April 2003, pp. 297-307.
Elsevier DOI 0304
BibRef

Eskicioglu, A.M.[Ahmet M.], Town, J.[John], Delp, E.J.[Edward J.],
Security of digital entertainment content from creation to consumption,
SP:IC(18), No. 4, April 2003, pp. 237-262.
Elsevier DOI 0304
BibRef

Kim, B.S.[Bum-Soo], Choi, J.G.[Jae-Gark], Park, C.H.[Chul-Hyun], Won, J.U.[Jong-Un], Kwak, D.M.[Dong-Min], Oh, S.K.[Sang-Keun], Koh, C.R.[Chang-Rim], Park, K.H.[Kil-Houm],
Robust digital image watermarking method against geometrical attacks,
RealTimeImg(9), No. 2, April 2003, pp. 139-149.
Elsevier DOI 0304
BibRef

Li, X.L.[Xue-Long],
Watermarking in secure image retrieval,
PRL(24), No. 14, October 2003, pp. 2431-2434.
Elsevier DOI 0307
BibRef

Zheng, D.[Dong], Zhao, J.Y.[Ji-Ying], El Saddik, A.,
RST-invariant digital image watermarking based on log-polar mapping and phase correlation,
CirSysVideo(13), No. 8, August 2003, pp. 753-765.
IEEE Abstract. 0309
BibRef

Zheng, D.[Dong], Liu, Y.[Yan], Zhao, J.Y.[Ji-Ying], El Saddik, A.[Abdulmotaleb],
A survey of RST invariant image watermarking algorithms,
Surveys(39), No. 2, July 2007, pp. 5.
WWW Link. 0805
Survey, Watermarks. BibRef

Liu, Y.[Yan], Zhao, J.Y.[Ji-Ying],
Rotation, scaling, translation invariant image watermarking based on radon transform,
CRV04(225-232).
IEEE DOI 0408
BibRef

Wu, M.[Min],
Joint security and robustness enhancement for quantization based data embedding,
CirSysVideo(13), No. 8, August 2003, pp. 831-841.
IEEE Abstract. 0309
BibRef
And:
Joint security and robustness enhancement for quantization embedding,
ICIP03(II: 483-486).
IEEE Abstract. 0312
BibRef

Izquierdo, E., Guerra, V.,
An ill-posed operator for secure image authentication,
CirSysVideo(13), No. 8, August 2003, pp. 842-852.
IEEE Abstract. 0309
BibRef

Tsai, P.[Piyu], Hu, Y.C.[Yu-Chen], Chang, C.C.[Chin-Chen],
Using set partitioning in hierarchical trees to authenticate digital images,
SP:IC(18), No. 9, October 2003, pp. 813-822.
Elsevier DOI 0310
BibRef

Chang, C.C.[Chin-Chen], Tsai, P.[Piyu], Lin, C.C.[Chia-Chen],
SVD-based digital image watermarking scheme,
PRL(26), No. 10, 15 July 2005, pp. 1577-1586.
Elsevier DOI 0506
BibRef

Wang, S.H.[Shih-Hao], Lin, Y.P.[Yuan-Pei],
Wavelet tree quantization for copyright protection watermarking,
IP(13), No. 2, February 2004, pp. 154-165.
IEEE DOI 0404
BibRef

Kim, Y.W.[Young-Won], Oh, I.S.[Il-Seok],
Watermarking text document images using edge direction histograms,
PRL(25), No. 11, August 2004, pp. 1243-1251.
Elsevier DOI 0409
BibRef

Kim, Y.W.[Young-Won], Moon, K.A.[Kyung-Ae], Oh, I.S.[Il-Seok],
A text watermarking algorithm based on word classification and inter-word space statistics,
ICDAR03(775-779).
IEEE DOI 0311
BibRef

Seo, J.S.[Jin S.], Haitsma, J.[Jaap], Kalker, T.[Ton], Yoo, C.D.[Chang D.],
A robust image fingerprinting system using the Radon transform,
SP:IC(19), No. 4, April 2004, pp. 325-339.
Elsevier DOI 0405
BibRef

Roy, S.[Sujoy], Sun, Q.B.[Qi-Bin], Kalker, T.[Ton],
Performance analysis of locality preserving image hash,
ICIP08(1268-1271).
IEEE DOI 0810
BibRef

Depovere, G., Kalker, T.,
Secret Key Watermarking with Changing Keys,
ICIP00(Vol I: 427-429).
IEEE DOI 0008
BibRef

Li, Q.M.[Qi-Ming], Roy, S.[Sujoy],
On the security of non-forgeable robust hash functions,
ICIP08(3124-3127).
IEEE DOI 0810
BibRef

Ni, R.R.[Rong-Rong], Ruan, Q.Q.[Qiu-Qi], Cheng, H.D.,
Secure semi-blind watermarking based on iteration mapping and image features,
PR(38), No. 3, March 2005, pp. 357-368.
Elsevier DOI 0412
BibRef

Lei, C.L.[Chin-Laung], Yu, P.L.[Pei-Ling], Tsai, P.L.[Pan-Lung], Chan, M.H.[Ming-Hwa],
An efficient and anonymous buyer-seller watermarking protocol,
IP(13), No. 12, December 2004, pp. 1618-1626.
IEEE DOI 0412
BibRef

Wu, Y., Deng, R.H.,
Security of an Ill-Posed Operator for Image Authentication,
CirSysVideo(15), No. 1, January 2005, pp. 161-163.
IEEE Abstract. 0501
BibRef

El-Taweel, G.S., Onsi, H.M., Samy, M., Darwish, M.G.,
Secure and Non-Blind Watermarking Scheme for Color Images,
GVIP(SI1), 2005, pp. xx-yy
HTML Version. BibRef 0500

Chen, T.H.[Tzung-Her], Tsai, D.S.[Du-Shiau],
Owner-customer right protection mechanism using a watermarking scheme and a watermarking protocol,
PR(39), No. 8, August 2006, pp. 1530-1541.
Elsevier DOI 0606
Visual cryptography; Digital signature; Digital timestamp BibRef

Tsai, D.S.[Du-Shiau], Chen, T.H.[Tzung-Her], Horng, G.[Gwoboa],
A cheating prevention scheme for binary visual cryptography with homogeneous secret images,
PR(40), No. 8, August 2007, pp. 2356-2366.
Elsevier DOI 0704
Visual cryptography; Cheating; Cheating prevention; Genetic algorithm BibRef

Chen, Y.C.[Yu-Chi], Tsai, D.S.[Du-Shiau], Horng, G.[Gwoboa],
A new authentication based cheating prevention scheme in Naor-Shamir’s visual cryptography,
JVCIR(23), No. 8, November 2012, pp. 1225-1233.
Elsevier DOI 1211
Secret sharing; Visual cryptography; Visual secret sharing; Human vision system; Cheating; Cheating prevention; Authentication; Security BibRef

Maret, Y.[Yannick], DuFaux, F.[Frédéric], Ebrahimi, T.[Touradj],
Adaptive image replica detection based on support vector classifiers,
SP:IC(21), No. 8, September 2006, pp. 688-703.
Elsevier DOI 0609
Image replica detection; Features extraction; SVM Dimensionality reduction; Copyright infringement detection BibRef

Zhao, Q.J.[Qi-Jun], Lu, H.T.[Hong-Tao],
PCA-based web page watermarking,
PR(40), No. 4, April 2007, pp. 1334-1341.
Elsevier DOI 0701
Principal component analysis (PCA); Watermark; HTML; Web page; Tamper-proof BibRef

Zhao, Q.J.[Qi-Jun], Lu, H.T.[Hong-Tao],
A PCA-based watermarking scheme for tamper-proof of web pages,
PR(38), No. 8, August 2005, pp. 1321-1323.
Elsevier DOI 0505
BibRef

Yang, H.J.[Hui-Juan], Kot, A.C.[Alex C.],
Pattern-Based Data Hiding for Binary Image Authentication by Connectivity-Preserving,
MultMed(9), No. 3, April 2007, pp. 475-486.
IEEE DOI 0905
BibRef
Earlier:
A General Data Hiding Framework and Multi-level Signature for Binary Images,
DW07(188-202).
Springer DOI 0712
BibRef

Liu, J.[Jun], Yang, H.J.[Hui-Juan], Kot, A.C.,
Relationships And Unification of Binary Images Data-Hiding Methods,
ICIP05(I: 981-984).
IEEE DOI 0512
BibRef

Lin, C.H., Chan, D.Y., Su, H., Hsieh, W.S.,
Histogram-oriented watermarking algorithm: colour image watermarking scheme robust against geometric attacks and signal processing,
VISP(153), No. 4, August 2006, pp. 483-492.
WWW Link. 0705
BibRef

Lu, C.S.[Chun-Shien], Hsu, C.Y.[Chao-Yung],
Near-Optimal Watermark Estimation and Its Countermeasure: Antidisclosure Watermark for Multiple Watermark Embedding,
CirSysVideo(17), No. 4, April 2007, pp. 454-467.
IEEE DOI 0705
BibRef

Cheung, Y.M., Wu, H.T.,
A Sequential Quantization Strategy for Data Embedding and Integrity Verification,
CirSysVideo(17), No. 8, August 2007, pp. 1007-1016.
IEEE DOI 0710
BibRef

Wang, S.S.[Shuenn-Shyang], Tsai, S.L.[Sung-Lin],
Automatic image authentication and recovery using fractal code embedding and image inpainting,
PR(41), No. 2, February 2008, pp. 701-712.
Elsevier DOI 0711
Image processing; Watermarking; Fractal image coding BibRef

Lin, E.I., Eskicioglu, A.M., Lagendijk, R.L., Delp, E.J.,
Advances in Digital Video Content Protection,
PIEEE(93), No. 1, January 2005, pp. 171-183.
IEEE DOI 0501
Survey, Authentication. BibRef

Piva, A.[Alessandro], Bartolini, F.[Franco], Caldelli, R.[Roberto],
Self Recovery Authentication Of Images In The Dwt Domain,
IJIG(5), No. 1, January 2005, pp. 149-165. 0501
BibRef

Caldelli, R.[Roberto], Bartolini, F.[Franco], Cappellini, V.[Vito], Piva, A.[Alessandro], Barni, M.[Mauro],
A New Self-Recovery Technique for Image Authentication,
VLBV03(164-171).
Springer DOI 0310
BibRef

Wang, X.Y.[Xiang-Yang], Hou, L.M.[Li-Min], Wu, J.[Jun],
A feature-based robust digital image watermarking against geometric attacks,
IVC(26), No. 7, 2 July 2008, pp. 980-989.
Elsevier DOI 0804
Image watermarking; Geometric attack; Image feature; Normalization BibRef

Wang, X.Y.[Xiang-Yang], Cui, C.Y.[Chang-Ying],
A novel image watermarking scheme against desynchronization attacks by SVR revision,
JVCIR(19), No. 5, July 2008, pp. 334-342.
Elsevier DOI 0804
Digital image watermarking; Desynchronization attacks; Support vector regression; Revision; Sum; Variance; Image block; Neighboring pixel BibRef

Lee, C.H.[Choong-Hoon], Lee, H.K.[Heung-Kyu], Suh, Y.H.[Young-Ho],
Image Watermarking Resistant To Combined Geometric And Removal Attacks,
IJIG(5), No. 1, January 2005, pp. 37-65. 0501
BibRef

Feng, W.[Wei], Liu, Z.Q.[Zhi-Qiang],
Region-Level Image Authentication Using Bayesian Structural Content Abstraction,
IP(17), No. 12, December 2008, pp. 2413-2424.
IEEE DOI 0811
BibRef
Earlier:
Bayesian Structural Content Abstraction for Region-Level Image Authentication,
ICCV05(II: 1042-1047).
IEEE DOI 0510
Capture spatial topology of regions and use in description. BibRef

Im, D.H., Lee, H.Y., Ryu, S.J., Lee, H.K.,
Vector Watermarking Robust to Both Global and Local Geometrical Distortions,
SPLetters(15), No. 1, 2008, pp. 789-792.
IEEE DOI 0812
BibRef

Vatsa, M.[Mayank], Singh, R.[Richa], Noore, A.[Afzel],
Feature based RDWT watermarking for multimodal biometric system,
IVC(27), No. 3, February 2009, pp. 293-304.
Elsevier DOI 0804
Biometrics; Watermarking; RDWT: Redundant Discrete Wavelet Transform; Face recognition; Voice recognition; Multimodal biometrics BibRef

Tsai, M.J.[Min-Jen],
A visible watermarking algorithm based on the content and contrast aware (COCOA) technique,
JVCIR(20), No. 5, July 2009, pp. 323-338.
Elsevier DOI 0905
BibRef
Earlier:
Filter bank selection for the ownership verification of wavelet based digital image watermarking,
ICIP04(V: 3415-3418).
IEEE DOI 0505
CSF; Human Vision System; NVF; Visible watermarking; Wavelet transform; Copyright protection; Image inpainting; Image recovery BibRef

Ababneh, S.[Sufyan], Ansari, R.[Rashid], Khokhar, A.A.[Ashfaq A.],
Iterative compensation schemes for multimedia content authentication,
JVCIR(20), No. 5, July 2009, pp. 303-311.
Elsevier DOI 0905
BibRef
Earlier: A1, A3, A2:
Compensated Signature Embedding Based Multimedia Content Authentication System,
ICIP07(I: 393-396).
IEEE DOI 0709
Authentication; Convex sets; POCS; Watermarking; Compensated signature embedding; Image integrity; Multimedia authentication; Signature embedding BibRef

Singhal, N.[Nitin], Lee, Y.Y.[Young-Yoon], Kim, C.S.[Chang-Su], Lee, S.U.[Sang-Uk],
Robust image watermarking using local Zernike moments,
JVCIR(20), No. 6, August 2009, pp. 408-419.
Elsevier DOI 0907
Digital image watermarking; Digital right management; Local Zernike moments; Feature point detection; Image normalization; Content-based synchronization; Salient region parameters; Geometric distortions BibRef

Lai, C.H.[Chao-Hung], Wu, J.L.[Jiunn-Lin],
Robust image watermarking against local geometric attacks using multiscale block matching method,
JVCIR(20), No. 6, August 2009, pp. 377-388.
Elsevier DOI 0907
Local geometric attack; Stirmark; Deformable mesh model; Image registration; Resynchronization; Multiscale block matching; AM based watermarking BibRef

Farid, H.,
Seeing is not believing,
Spectrum(46), No. 8, August 2009, pp. 44-51.
IEEE DOI 0909
Too many things can be done to a picture to believe the picture. Techniques to counter such alterations, or at least to know they happened. BibRef

Bhatnagar, G.[Gaurav], Raman, B.[Balasubramanian],
Robust Reference-watermarking Scheme Using Wavelet Packet Transform and Bidiagonal-singular Value Decomposition,
IJIG(9), No. 3, July 2009, pp. 449-477.
DOI Link 0911
BibRef
Earlier:
Robust Watermarking Scheme Based on Multiresolution Fractional Fourier Transform,
ICCVGIP08(1-8).
IEEE DOI 0812

See also New Fractional Random Wavelet Transform for Fingerprint Security, A. BibRef

Bhatnagar, G.[Gaurav], Raman, B.[Balasubramanian], Wu, Q.M.J.[Q. M. Jonathan],
Robust watermarking using fractional wavelet packet transform,
IET-IPR(6), No. 4, 2012, pp. 386-397.
DOI Link 1205
BibRef

Bhatnagar, G.[Gaurav], Wu, Q.M.J.[Q. M. Jonathan], Raman, B.[Balasubramanian],
A Novel Image Encryption Framework Based on Markov Map and Singular Value Decomposition,
ICIAR11(II: 286-296).
Springer DOI 1106

See also Real Time Human Visual System Based Framework for Image Fusion. BibRef

Rawat, S.[Sanjay], Raman, B.[Balasubramanian],
A Chaos-based Robust Watermarking Algorithm For Rightful Ownership Protection,
IJIG(11), No. 4, October 2011, pp. 471-493.
DOI Link 1201
BibRef

Singh, P.[Priyanka], Raman, B.[Balasubramanian], Misra, M.[Manoj],
A secure image sharing scheme based on SVD and Fractional Fourier Transform,
SP:IC(57), No. 1, 2017, pp. 46-59.
Elsevier DOI 1709
Shamir secret sharing BibRef

Awrangjeb, M.[Mohammad], Lu, G.J.[Guo-Jun],
Techniques for efficient and effective transformed image identification,
JVCIR(20), No. 8, November 2009, pp. 511-520.
Elsevier DOI 0911
Feature detection; Feature representation; Feature matching; Transformed image identification BibRef

Nikolopoulos, S.[Spiros], Zafeiriou, S.P.[Stafanos P.], Nikolaidis, N.D.[Nikos D.], Pitas, I.[Ioannis],
Image replica detection system utilizing R-trees and linear discriminant analysis,
PR(43), No. 3, March 2010, pp. 636-649.
Elsevier DOI 1001
Replica detection; Copy image detection; Perceptual hashing; Robust hashing; Fingerprinting; Copyright protection; Content-based monitoring; Linear discriminant analysis (LDA); R-tree indexing BibRef

Carreras, A.[Anna], Delgado, J.[Jaime], Rodriguez, E.[Eva], Barbosa, V.[Vitor], Andrade, M.[Maria], Arachchi, H.K.[Hemantha Kodikara], Dogan, S.[Safak], Kondoz, A.M.[Ahmed M.],
A Platform for Context-Aware and Digital Rights Management-Enabled Content Adaptation,
MultMedMag(17), No. 2, April-June 2010, pp. 74-89.
IEEE DOI 1006
BibRef

Kim, J.W.[Jong-Weon], Kim, N.G.[Nam-Gyu], Lee, D.W.[Dong-Won], Park, S.B.[Sung-Bum], Lee, S.W.[Sang-Won],
Watermarking two dimensional data object identifier for authenticated distribution of digital multimedia contents,
SP:IC(25), No. 8, September 2010, pp. 559-576.
Elsevier DOI 1003
Digital object identifier; 2-dimensional barcode; Digital watermarking; Digital multimedia contents; Universal Content Identifier BibRef

Mokhtarian, K., Hefeeda, M.,
Authentication of Scalable Video Streams With Low Communication Overhead,
MultMed(12), No. 7, 2010, pp. 730-742.
IEEE DOI 1011
Security of video streams.
See also Capacity Management of Seed Servers in Peer-to-Peer Streaming Systems With Scalable Video Streams. BibRef

Huang, T.J.[Tie-Jun], Tian, Y.H.[Yong-Hong], Gao, W.[Wen], Lu, J.[Jian],
Mediaprinting: Identifying Multimedia Content for Digital Rights Management,
Computer(43), No. 12, December 2010, pp. 28-35.
IEEE DOI 1101
BibRef

Zhang, X.P.[Xin-Peng], Wang, S.Z.[Shuo-Zhong], Qian, Z.X.[Zhen-Xing], Feng, G.R.[Guo-Rui],
Reference Sharing Mechanism for Watermark Self-Embedding,
IP(20), No. 2, February 2011, pp. 485-495.
IEEE DOI 1102
BibRef

Tsai, J.S.[Jen-Sheng], Huang, W.B.[Win-Bin], Kuo, Y.H.[Yau-Hwang],
On the Selection of Optimal Feature Region Set for Robust Digital Image Watermarking,
IP(20), No. 3, March 2011, pp. 735-743.
IEEE DOI 1103
BibRef

Tsai, J.S.[Jen-Sheng], Huang, W.B.[Win-Bin], Chen, C.L.[Chao-Lieh], Kuo, Y.H.[Yau-Hwang],
A Feature-Based Digital Image Watermarking for Copyright Protection and Content Authentication,
ICIP07(V: 469-472).
IEEE DOI 0709
BibRef

Kallel, M.[Mohamed], Bouhlel, M.S.[Mohamed-Salim], Lapayre, J.C.[Jean-Christophe],
Security of the Medical Media Using a Hybrid and Multiple Watermark Technique,
IJIG(11), No. 1, January 2011, pp. 103-115.
DOI Link 1103
BibRef

Kakar, P., Sudha, N., Ser, W.,
Exposing Digital Image Forgeries by Detecting Discrepancies in Motion Blur,
MultMed(13), No. 3, 2011, pp. 443-452.
IEEE DOI 1106
BibRef

Tian, L.H.[Li-Hua], Zheng, N.N.[Nan-Ning], Xue, J.R.[Jian-Ru], Li, C.[Ce], Wang, X.F.[Xiao-Feng],
An integrated visual saliency-based watermarking approach for synchronous image authentication and copyright protection,
SP:IC(26), No. 8-9, October 2011, pp. 427-437.
Elsevier DOI 1109
Watermarking; Image authentication; Visual saliency; Tamper detection and localization BibRef

Lin, Y.C.[Yao-Chung], Varodayan, D.[David], Girod, B.[Bernd],
Image Authentication Using Distributed Source Coding,
IP(21), No. 1, January 2012, pp. 273-283.
IEEE DOI 1112
BibRef
Earlier:
Image Authentication Based on Distributed Source Coding,
ICIP07(III: 5-8).
IEEE DOI 0709
BibRef

Varodayan, D.[David], Lin, Y.C.[Yao-Chung], Girod, B.[Bernd],
Adaptive Distributed Source Coding,
IP(21), No. 5, May 2012, pp. 2630-2640.
IEEE DOI 1204
BibRef

Yin, H., Hui, W., Li, H., Lin, C., Zhu, W.,
A Novel Large-Scale Digital Forensics Service Platform for Internet Videos,
MultMed(14), No. 1, January 2012, pp. 178-186.
IEEE DOI 1201
BibRef

Wu, L.[Lin], Cao, X.C.[Xiao-Chun], Zhang, W.[Wei], Wang, Y.[Yang],
Detecting image forgeries using metrology,
MVA(23), No. 2, March 2012, pp. 363-373.
WWW Link. 1202
BibRef

Ling, H.F.[He-Fei], Cheng, H.R.[Hong-Rui], Ma, Q.Z.[Qing-Zhen], Zou, F.H.[Fu-Hao], Yan, W.Q.[Wei-Qi],
Efficient Image Copy Detection Using Multiscale Fingerprints,
MultMedMag(19), No. 1, January-March 2012, pp. 60-69.
IEEE DOI 1202
BibRef

Jin, C.[Cong],
Adaptive robust image watermark approach based on fuzzy comprehensive evaluation and analytic hierarchy process,
SIViP(6), No. 2, June 2012, pp. 317-324.
WWW Link. 1205
BibRef

Jin, C.[Cong], Jin, S.W.[Shu-Wei],
Adaptive digital image watermark scheme based on Fuzzy Neural Network for copyright protection,
IASP10(599-602).
IEEE DOI 1004

See also Image distance metric learning based on neighborhood sets for automatic image annotation. BibRef

Ulutas, G.[Guzin], Ulutas, M.[Mustafa], Nabiyev, V.V.[Vasif V.],
Secret image sharing scheme with adaptive authentication strength,
PRL(34), No. 3, 1 February 2013, pp. 283-291.
Elsevier DOI 1301
Secret sharing; Steganography; Chaining; Authentication BibRef

Dirik, A.E., Haas, B.,
Copy detection pattern-based document protection for variable media,
IET-IPR(6), No. 8, 2012, pp. 1102-1113.
DOI Link 1302
BibRef

Yamasaki, T.[Toshihiko], Aizawa, K.[Kiyoharu],
SIFT-Based Non-blind Watermarking Robust to Non-linear Geometrical Distortions,
IEICE(E96-D), No. 6, June 2013, pp. 1368-1375.
WWW Link. 1306
BibRef

Yamasaki, T.[Toshihiko], Nakai, Y.[Yasumasa], Aizawa, K.[Kiyoharu],
An object-based non-blind watermarking that is robust to non-linear geometrical distortion attacks,
ICIP09(3669-3672).
IEEE DOI 0911
BibRef

Pham, V.Q.[Viet Quoc], Miyaki, T.[Takashi], Yamasaki, T.[Toshihiko], Aizawa, K.[Kiyoharu],
Geometrically Invariant Object-Based Watermarking using SIFT Feature,
ICIP07(V: 473-476).
IEEE DOI 0709
BibRef

Zheng, P.[Peijia], Huang, J.W.[Ji-Wu],
Discrete Wavelet Transform and Data Expansion Reduction in Homomorphic Encrypted Domain,
IP(22), No. 6, 2013, pp. 2455-2468.
IEEE DOI Haar transforms; Watermarking 1307
BibRef

Sahraee, M.J., Ghofrani, S.,
A robust blind watermarking method using quantization of distance between wavelet coefficients,
SIViP(7), No. 4, July 2013, pp. 799-807.
WWW Link. 1306
BibRef

Agarwal, C.[Charu], Mishra, A.[Anurag], Sharma, A.[Arpita],
Gray-scale image watermarking using GA-BPN hybrid network,
JVCIR(24), No. 7, 2013, pp. 1135-1146.
Elsevier DOI 1309
Digital image watermarking BibRef

Horng, S.J.[Shi-Jinn], Rosiyadi, D.[Didi], Li, T.R.[Tian-Rui], Takao, T.[Terano], Guo, M.[Minyi], Khan, M.K.[Muhammad Khurram],
A blind image copyright protection scheme for e-government,
JVCIR(24), No. 7, 2013, pp. 1099-1105.
Elsevier DOI 1309
Blind BibRef

Liu, S.C.[Shen-Chuan], Sae-Tang, W.[Wannida], Fujiyoshi, M.[Masaaki], Kiya, H.[Hitoshi],
An Efficient Compression of Amplitude-Only Images for the Image Trading System,
IEICE(E97-D), No. 2, February 2013, pp. 378-379.
WWW Link. 1402
BibRef

Pande, A., Chen, S.[Shaxun], Mohapatra, P., Zambreno, J.,
Hardware Architecture for Video Authentication Using Sensor Pattern Noise,
CirSysVideo(24), No. 1, January 2014, pp. 157-167.
IEEE DOI 1402
cameras BibRef

Lee, J.S.[Jung-San], Li, B.[Bo],
Self-Recognized Image Protection Technique that Resists Large-Scale Cropping,
MultMedMag(21), No. 1, January 2014, pp. 60-73.
IEEE DOI 1405
data compression BibRef

Xu, Y.Y.[Yan-Yan], Xiong, L.Z.[Li-Zhi], Xu, Z.Q.[Zheng-Quan], Pan, S.M.[Shao-Ming],
A content security protection scheme in JPEG compressed domain,
JVCIR(25), No. 5, 2014, pp. 805-813.
Elsevier DOI 1406
Content security BibRef

Xu, Z.Q.[Zheng-Quan], Xiong, L.Z.[Li-Zhi], Xu, Y.Y.[Yan-Yan],
On the provably secure CEW based on orthogonal decomposition,
SP:IC(29), No. 5, 2014, pp. 607-617.
Elsevier DOI 1406
Commutative Encryption and Watermarking (CEW) BibRef

Yang, Q.T.[Qun-Ting], Gao, T.G.[Tie-Gang],
An Image Authentication Scheme for Accurate Localization and Restoration,
IWDW13(475-487).
Springer DOI 1407
BibRef

Amiri, S.H.[S. Hamid], Jamzad, M.[Mansour],
Robust watermarking against print and scan attack through efficient modeling algorithm,
SP:IC(29), No. 10, 2014, pp. 1181-1196.
Elsevier DOI 1411
Image watermarking BibRef

Maatouk, M.N.[Mohamed Neji], Ben Amara, N.E.[Najoua Essoukri],
Intelligent hybrid watermarking ancient-document wavelet packet decomposition-singular value decomposition-based schema,
IET-IPR(8), No. 12, 2014, pp. 708-717.
DOI Link 1412
document image processing BibRef

Maatouk, M.N.[Mohamed Neji], Bellaj, M.[Majd], Ben Amara, N.E.[Najoua Essoukri],
Watermarking ancient documents schema using wavelet packets and convolutional code,
IPTA10(172-176).
IEEE DOI 1007
BibRef

Li, X.[Xu], Sun, X.M.[Xing-Ming], Liu, Q.S.[Quan-Sheng],
Image Integrity Authentication Scheme Based on Fixed Point Theory,
IP(24), No. 2, February 2015, pp. 632-645.
IEEE DOI 1502
convolution BibRef

Tabatabaei, S.A.H., Ur-Rehman, O., Zivic, N., Ruland, C.,
Secure and Robust Two-Phase Image Authentication,
MultMed(17), No. 7, July 2015, pp. 945-956.
IEEE DOI 1506
Authentication BibRef

Guo, J.T.[Jian-Ting], Zheng, P.[Peijia], Huang, J.W.[Ji-Wu],
Secure watermarking scheme against watermark attacks in the encrypted domain,
JVCIR(30), No. 1, 2015, pp. 125-135.
Elsevier DOI 1507
Blind watermarking scheme BibRef

Wójtowicz, W.[Wioletta], Ogiela, M.R.[Marek R.],
Digital images authentication scheme based on bimodal biometric watermarking in an independent domain,
JVCIR(38), No. 1, 2016, pp. 1-10.
Elsevier DOI 1605
Image watermarking BibRef

Wu, W.C.[Wen-Chuan], Lin, Z.W.[Zi-Wei],
SVD-based self-embedding image authentication scheme using quick response code features,
JVCIR(38), No. 1, 2016, pp. 18-28.
Elsevier DOI 1605
Image authentication BibRef

Lin, C.Y.[Chih-Yang], Muchtar, K.[Kahlil], Yeh, C.H.[Chia-Hung], Lu, C.S.[Chun-Shien],
Secure multicasting of images via joint privacy-preserving fingerprinting, decryption, and authentication,
JVCIR(38), No. 1, 2016, pp. 858-871.
Elsevier DOI 1605
Authentication BibRef

Markman, A.[Adam], Carnicer, A.[Artur], Javidi, B.[Bahram],
Security authentication with a three-dimensional optical phase code using random forest classifier,
JOSA-A(33), No. 6, June 2016, pp. 1160-1165.
DOI Link 1606
Speckle; Imaging systems; Pattern recognition, Baysian processors. Attach a 3D optical phase mask. BibRef

Tew, Y.[Yiqi], Wong, K.[Kok_Sheik], Phan, R.C.W.[Raphael C.W.], Ngan, K.N.[King Ngi],
Multi-layer authentication scheme for HEVC video based on embedded statistics,
JVCIR(40, Part B), No. 1, 2016, pp. 502-515.
Elsevier DOI 1610
BibRef
Earlier: A1, A2, A3, Only:
HEVC video authentication using data embedding technique,
ICIP15(1265-1269)
IEEE DOI 1511
Authentication; Coding Unit Size; Data Embedding; HEVC; Information Hiding BibRef

Pang, L.L.[Lie-Lin], Wong, K.[Kok_Sheik],
A Data Embedding Technique for Spatial Scalable Coded Video Using Motion Vector Predictor,
ICIP19(4050-4054)
IEEE DOI 1910
Motion vector predictor, data embedding, SHVC, co-located blocks BibRef

Franco-Contreras, J.[Javier], Coatrieux, G.[Gouenou],
Databases Traceability by Means of Watermarking with Optimized Detection,
IWDW16(343-357).
Springer DOI 1703
BibRef

Liu, X.Y.[Xi-Yao], Zhao, R.C.[Rong-Chang], Li, F.F.[Fang-Fang], Liao, S.H.[Sheng-Hui], Ding, Y.P.[Yi-Peng], Zou, B.[Beiji],
Novel robust zero-watermarking scheme for digital rights management of 3D videos,
SP:IC(54), No. 1, 2017, pp. 140-151.
Elsevier DOI 1704
3D video BibRef

Fadoua, S., Noura, A., Hamid, T.,
A new robust watermarking scheme based on polynomial decomposition,
ISCV17(1-6)
IEEE DOI 1710
image texture, image watermarking, polynomials, bivariate polynomial basis, digital images, human visual system model, image texture extraction, mathematical model, orthogonal polynomial basis transform, polynomial decomposition, watermarked image, Digital images, Discrete cosine transforms, Image coding, Mathematical model, Robustness, Watermarking, Watermarking, polynomial transformation, structure extraction, texture, extraction BibRef

Li, Y.N.[Yue-Nan], Guo, L.L.[Lin-Lin],
Robust Image Fingerprinting via Distortion-Resistant Sparse Coding,
SPLetters(25), No. 1, January 2018, pp. 140-144.
IEEE DOI 1801
copyright, feature extraction, fingerprint identification, image coding, image matching, atom selection, robust hashing BibRef

Liu, X.L., Lin, C.C., Yuan, S.M.,
Blind Dual Watermarking for Color Images: Authentication and Copyright Protection,
CirSysVideo(28), No. 5, May 2018, pp. 1047-1055.
IEEE DOI 1805
Authentication, Color, Copyright protection, Discrete wavelet transforms, Image color analysis, Robustness, watermarking BibRef

Chen, Z., Li, L., Peng, H., Liu, Y., Yang, Y.,
A Novel Digital Watermarking Based on General Non-Negative Matrix Factorization,
MultMed(20), No. 8, August 2018, pp. 1973-1986.
IEEE DOI 1808
copyright, image watermarking, matrix decomposition, random matrix, copyright protection, integrity authentication, semi-tensor product (STP) BibRef

Kim, M.[Minsu], Lee, K.W.[Kun-Woo], Gondow, K.[Katsuhiko], Imura, J.I.[Jun-Ichi],
Robust Index Code to Distribute Digital Images and Digital Contents Together,
IEICE(E101-D), No. 9, September 2018, pp. 2179-2189.
WWW Link. 1809
BibRef

Khelifi, F., Bouridane, A.,
Perceptual Video Hashing for Content Identification and Authentication,
CirSysVideo(29), No. 1, January 2019, pp. 50-67.
DOI Link 1901
Authentication, Feature extraction, Robustness, Calibration, Discrete cosine transforms, Distortion, Authentication, video hashing BibRef

Li, Y., Wang, D., Tang, L.,
Robust and Secure Image Fingerprinting Learned by Neural Network,
CirSysVideo(30), No. 2, February 2020, pp. 362-375.
IEEE DOI 2002
Feature extraction, Security, Neural networks, Quantization (signal), Training, Robustness, Distortion, multimedia security BibRef

Zhang, Y.[Yun], Tang, Z.[Zhi], Huang, J.[Jing], Ding, Y.[Yue], He, H.[Hao], Xia, X.S.[Xiao-Sheng], Li, C.H.[Chun-Hua],
A Decentralized Model for Spatial Data Digital Rights Management,
IJGI(9), No. 2, 2020, pp. xx-yy.
DOI Link 2003
BibRef

Garain, U.[Utpal], Halder, B.[Biswajit],
Even big data is not enough: need for a novel reference modelling for forensic document authentication,
IJDAR(23), No. 1, January 2020, pp. 1-11.
WWW Link. 2003
BibRef

Ding, K.M.[Kai-Meng], Liu, Y.M.[Yue-Ming], Xu, Q.[Qin], Lu, F.Q.A.[Fu-Qi-Ang],
A Subject-Sensitive Perceptual Hash Based on MUM-Net for the Integrity Authentication of High Resolution Remote Sensing Images,
IJGI(9), No. 8, 2020, pp. xx-yy.
DOI Link 2008
BibRef

Anand, A., Singh, A.K.,
Joint Watermarking-Encryption-ECC for Patient Record Security in Wavelet Domain,
MultMedMag(27), No. 3, July 2020, pp. 66-75.
IEEE DOI 2009
Watermarking, Biomedical imaging, Encryption, Turbo codes, Robustness BibRef

Anand, A., Singh, A.K., Lv, Z., Bhatnagar, G.,
Compression-Then-Encryption-Based Secure Watermarking Technique for Smart Healthcare System,
MultMedMag(27), No. 4, October 2020, pp. 133-143.
IEEE DOI 2012
Watermarking, Encryption, Image coding, Discrete wavelet transforms, Biomedical imaging, Robustness BibRef

Chidambaram, N.[Nithya], Raj, P.[Pethuru], Thenmozhi, K.[Karruppuswamy], Amirtharajan, R.[Rengarajan],
Advanced framework for highly secure and cloud-based storage of colour images,
IET-IPR(14), No. 13, November 2020, pp. 3143-3153.
DOI Link 2012
BibRef

Li, Y., Chen, X., Yin, Y., Wan, J., Zhang, J., Kuang, L., Dong, Z.,
SDABS: A Flexible and Efficient Multi-Authority Hybrid Attribute-Based Signature Scheme in Edge Environment,
ITS(22), No. 3, March 2021, pp. 1892-1906.
IEEE DOI 2103
Vehicle dynamics, Transportation, Security, Roads, Reliability, Authentication, Heuristic algorithms, Multi-authority, edge computing BibRef

Su, Z.Y.[Zhi-Yong], Yao, L.[Liang], Mei, J.L.[Jia-Lin], Zhou, L.[Lang], Li, W.Q.[Wei-Qing],
Learning to Hash for Personalized Image Authentication,
CirSysVideo(31), No. 4, April 2021, pp. 1648-1660.
IEEE DOI 2104
Authentication, Quantization (signal), Feature extraction, Measurement, Training, Task analysis, Binary codes, Metric learning, LMNN BibRef

Sinhal, R.[Rishi], Jain, D.K.[Deepak Kumar], Ansari, I.A.[Irshad Ahmad],
Machine learning based blind color image watermarking scheme for copyright protection,
PRL(145), 2021, pp. 171-177.
Elsevier DOI 2104
Robust image watermarking, Artificial neural network, Machine learning, YCbCr color space BibRef

Ren, N.[Na], Zhao, Y.Z.[Ya-Zhou], Zhu, C.Q.[Chang-Qing], Zhou, Q.F.[Qi-Fei], Xu, D.J.[Ding-Jie],
Copyright Protection Based on Zero Watermarking and Blockchain for Vector Maps,
IJGI(10), No. 5, 2021, pp. xx-yy.
DOI Link 2106
BibRef

Lim, J.H.[Jian Han], Chan, C.S.[Chee Seng], Ng, K.W.[Kam Woh], Fan, L.X.[Li-Xin], Yang, Q.[Qiang],
Protect, show, attend and tell: Empowering image captioning models with ownership protection,
PR(122), 2022, pp. 108285.
Elsevier DOI 2112
Image captioning, Ownership protection, Deep neural network, Recurrent neural network, Long short-term memory BibRef

Qin, C.[Chuan], Liu, E.[Enli], Feng, G.R.[Guo-Rui], Zhang, X.P.[Xin-Peng],
Perceptual Image Hashing for Content Authentication Based on Convolutional Neural Network With Multiple Constraints,
CirSysVideo(31), No. 11, November 2021, pp. 4523-4537.
IEEE DOI 2112
Feature extraction, Training, Robustness, Neural networks, Authentication, Discrete cosine transforms, Transforms, CNN BibRef

Hasan, M.K.[Mohammad Kamrul], Kamil, S.[Samar], Shafiq, M.[Muhammad], Yuvaraj, S., Kumar, E.S.[E. Saravana], Vincent, R.[Rajiv], Nafi, N.S.[Nazmus Shaker],
An improved watermarking algorithm for robustness and imperceptibility of data protection in the perception layer of internet of things,
PRL(152), 2021, pp. 283-294.
Elsevier DOI 2112
Fintech, Internet of things, Text document image, Watermark, Pascal Triangle BibRef

Kaur, J.[Jasvinder], Singh, P.[Parvinder],
Comparative analysis of wavelet-based copyright protection techniques,
IJCVR(12), No. 3, 2022, pp. 219-235.
DOI Link 2205
BibRef

Zhang, J.[Jie], Chen, D.D.[Dong-Dong], Liao, J.[Jing], Zhang, W.M.[Wei-Ming], Feng, H.M.[Hua-Min], Hua, G.[Gang], Yu, N.H.[Neng-Hai],
Deep Model Intellectual Property Protection via Deep Watermarking,
PAMI(44), No. 8, August 2022, pp. 4005-4020.
IEEE DOI 2207
Watermarking, Computational modeling, Training, Task analysis, IP networks, Image processing, Media, Deep model IP protection, image processing BibRef

Wang, B.W.[Bao-Wei], Wang, W.[Weishen], Zhao, P.[Peng],
A zero-watermark algorithm for multiple images based on visual cryptography and image fusion,
JVCIR(87), 2022, pp. 103569.
Elsevier DOI 2208
Zero-watermark, Multiple images, Copyright protection, Non-extended visual cryptography, Gray-weighted average image fusion BibRef

Fan, L.X.[Li-Xin], Ng, K.W.[Kam Woh], Chan, C.S.[Chee Seng], Yang, Q.[Qiang],
DeepIPR: Deep Neural Network Ownership Verification With Passports,
PAMI(44), No. 10, October 2022, pp. 6122-6139.
IEEE DOI 2209
Watermarking, Data models, Computational modeling, Analytical models, Training, Task analysis, Neural networks, deep learning BibRef

Li, B.[Bowen], Fan, L.X.[Li-Xin], Gu, H.L.[Han-Lin], Li, J.[Jie], Yang, Q.[Qiang],
FedIPR: Ownership Verification for Federated Deep Neural Network Models,
PAMI(45), No. 4, April 2023, pp. 4521-4536.
IEEE DOI 2303
Watermarking, Collaborative work, Data models, Computational modeling, Training, Intellectual property, backdoor training BibRef

Sharma, S., Zou, J.J., Fang, G.,
A single watermark based scheme for both protection and authentication of identities,
IET-IPR(16), No. 12, 2022, pp. 3113-3132.
DOI Link 2209
BibRef

Liu, X.[Xiyao], Zhang, Y.[Yayun], Du, S.[Sibo], Zhang, J.[Jian], Jiang, M.[Ming], Fang, H.[Hui],
DIBR Zero-Watermarking Based on Invariant Feature and Geometric Rectification,
MultMedMag(29), No. 3, July 2022, pp. 27-37.
IEEE DOI 2209
Videos, Feature extraction, Robustness, Watermarking, Cryptography, Shearing BibRef

Wu, T.[Tong], Li, X.H.[Xing-Hua], Miao, Y.B.[Yin-Bin], Xu, M.F.[Meng-Fan], Zhang, H.Y.[Hai-Yan], Liu, X.[Ximeng], Choo, K.K.R.[Kim-Kwang Raymond],
CITS-MEW: Multi-Party Entangled Watermark in Cooperative Intelligent Transportation System,
ITS(24), No. 3, March 2023, pp. 3528-3540.
IEEE DOI 2303
Watermarking, Federated learning, Training, Data models, Intelligent transportation systems, Task analysis, intellectual property BibRef

Xiong, L.Z.[Li-Zhi], Wu, Y.[Yue], Yu, P.P.[Pei-Peng], Zheng, Y.H.[Yu-Hui],
A black-box reversible adversarial example for authorizable recognition to shared images,
PR(140), 2023, pp. 109549.
Elsevier DOI 2305
Reversible adversarial example, Reversible data hiding, Prediction-error histogram BibRef

Hua, G.[Guang], Teoh, A.B.J.[Andrew Beng Jin],
Deep fidelity in DNN watermarking: A study of backdoor watermarking for classification models,
PR(144), 2023, pp. 109844.
Elsevier DOI 2310
Deep fidelity, Backdoor watermarking, Backdoor fidelity, Deep learning security, Neural network watermarking, Ownership verification BibRef

Wang, H.[Heng], Wang, H.X.[Hong-Xia], Xia, J.H.[Jing-Hong], Zhang, F.[Fei],
Robust Watermarking Against Camera Shooting for PowerPoint Presentation,
SPLetters(31), 2024, pp. 1264-1268.
IEEE DOI 2405
Watermarking, Discrete cosine transforms, Cameras, Layout, Visualization, Robustness, Smart phones, Document watermarking, robustness BibRef

Xia, X.J.[Xiao-Jie], Wang, L.[Liuan], Sun, J.[Jun], Nakagawa, A.[Akira],
Towards Generated Image Provenance Analysis via Conceptual-Similar-Guided-SLIP Retrieval,
SPLetters(31), 2024, pp. 1419-1423.
IEEE DOI 2405
Image retrieval, Feature extraction, Self-supervised learning, Visualization, Training, Task analysis, Refining, cross-modal BibRef

Ding, K.M.[Kai-Meng], Wang, Y.Y.[Ying-Ying], Wang, C.[Chishe], Ma, J.[Ji],
A New Subject-Sensitive Hashing Algorithm Based on Multi-PatchDrop and Swin-Unet for the Integrity Authentication of HRRS Image,
IJGI(13), No. 9, 2024, pp. 336.
DOI Link 2410
BibRef

Huang, X.[Xinyi], Wang, H.X.[Hong-Xia],
Robust text watermarking based on average skeleton mass of characters against cross-media attacks,
JVCIR(104), 2024, pp. 104300.
Elsevier DOI 2411
Robust watermarking, Cross-media transmission, Document image BibRef

Wang, L.[Lianyu], Wang, M.[Meng], Fu, H.Z.[Hua-Zhu], Zhang, D.Q.[Dao-Qiang],
Say No to Freeloader: Protecting Intellectual Property of Your Deep Model,
PAMI(46), No. 12, December 2024, pp. 11073-11086.
IEEE DOI 2411
Predictive models, Watermarking, Authorization, Adaptation models, Protection, IP networks, Computational modeling, Deep learning, domain transfer BibRef

Zhu, L.[Liuhao], Fang, Y.X.[Yi-Xiang], Zhao, Y.[Yi], Peng, Y.[Yi], Wang, J.X.[Jun-Xiang], Ni, J.Q.[Jiang-Qun],
Lite Localization Network and DUE-Based Watermarking for Color Image Copyright Protection,
CirSysVideo(34), No. 10, October 2024, pp. 9311-9325.
IEEE DOI 2411
Watermarking, Distortion, Noise, Location awareness, Decoding, Robustness, Transforms, Digital watermarking, DNN BibRef

Dey, A.[Ashis], Chowdhuri, P.[Partha], Pal, P.[Pabitra], Nandi, U.[Utpal],
A robust watermarking approach for medical image authentication using dual image and quorum function,
JVCIR(104), 2024, pp. 104299.
Elsevier DOI 2411
Watermarking, Dual image, AD interpolation, Imperceptibility, Quorum function BibRef

Alexan, W.[Wassim], Mamdouh, E.[Eyad], Aboshousha, A.[Amr], Alsahafi, Y.S.[Youssef S.], Gabr, M.[Mohamed], Hosny, K.M.[Khalid M.],
Stegocrypt: A robust tri-stage spatial steganography algorithm using TLM encryption and DNA coding for securing digital images,
IET-IPR(18), No. 13, 2024, pp. 4189-4206.
DOI Link 2411
DNA, image processing, steganography BibRef

Huang, H.[Hong], Han, Z.[ZhiGuang],
Multi-image encryption and authentication using computational ghost imaging and singular value decomposition,
IET-IPR(18), No. 13, 2024, pp. 3878-3891.
DOI Link 2411
image coding, image processing, image reconstruction BibRef


Nicollier, L.[Léo], Pic, M.M.[Marc Michel], Meinhardt-Llopis, E.[Enric], Facciolo, G.[Gabriele],
A New Fingerprinting Technique for Engraved Binary Matrix Authentication,
ICIP24(3250-3256)
IEEE DOI 2411
Apply to engravings. Printing, Industries, Statistical analysis, Lighting, Euclidean distance, Fingerprint recognition, deep learning BibRef

Cui, Q.[Qi], Meng, R.[Ruohan], Xu, C.H.[Chao-Hui], Chang, C.H.[Chip-Hong],
Steganographic Passport: An Owner and User Verifiable Credential for Deep Model IP Protection Without Retraining,
CVPR24(12302-12311)
IEEE DOI 2410
Training, Technological innovation, Law, Licenses, Robustness, IP networks BibRef

Zhu, P.F.[Pei-Fei], Takahashi, T.[Tsubasa], Kataoka, H.[Hirokatsu],
Watermark-embedded Adversarial Examples for Copyright Protection against Diffusion Models,
CVPR24(24420-24430)
IEEE DOI 2410
Training, Image synthesis, Perturbation methods, Force, Watermarking, Copyright protection, Generative adversarial networks, copyright protection BibRef

Golatkar, A.[Aditya], Achille, A.[Alessandro], Zancato, L.[Luca], Wang, Y.X.[Yu-Xiang], Swaminathan, A.[Ashwin], Soatto, S.[Stefano],
CPR: Retrieval Augmented Generation for Copyright Protection,
CVPR24(12374-12384)
IEEE DOI 2410
Training, Adaptation models, Image synthesis, Merging, Text to image, Copyright protection, Diffusion models BibRef

Peng, B.Y.[Bo-Yang], Qu, S.Q.[San-Qing], Wu, Y.[Yong], Zou, T.[Tianpei], He, L.[Lianghua], Knoll, A.[Alois], Chen, G.[Guang], Jiang, C.J.[Chang-Jun],
MAP: MAsk-Pruning for Source-Free Model Intellectual Property Protection,
CVPR24(23585-23594)
IEEE DOI Code:
WWW Link. 2410
Measurement, Degradation, Training, Accuracy, Neural networks, Training data, Intellectual property, intellectual property, source free domain adaptation BibRef

Jiang, Z.Y.[Zheng-Yuan], Fang, M.[Minghong], Gong, N.Z.Q.[Neil Zhen-Qiang],
IPCert: Provably Robust Intellectual Property Protection for Machine Learning,
AROW23(3614-3623)
IEEE DOI 2401
BibRef

Luo, Z.Y.[Zi-Yuan], Guo, Q.[Qing], Cheung, K.C.[Ka Chun], See, S.[Simon], Wan, R.J.[Ren-Jie],
CopyRNeRF: Protecting the CopyRight of Neural Radiance Fields,
ICCV23(22344-22354)
IEEE DOI Code:
WWW Link. 2401
BibRef

Wang, L.Y.[Lian-Yu], Wang, M.[Meng], Zhang, D.Q.[Dao-Qiang], Fu, H.Z.[Hua-Zhu],
Model Barrier: A Compact Un-Transferable Isolation Domain for Model Intellectual Property Protection,
CVPR23(20475-20484)
IEEE DOI 2309
BibRef

Chen, Y.M.[Yi-Ming], Tian, J.[Jinyu], Chen, X.Y.[Xiang-Yu], Zhou, J.T.[Jian-Tao],
Effective Ambiguity Attack Against Passport-based DNN Intellectual Property Protection Schemes through Fully Connected Layer Substitution,
CVPR23(8123-8132)
IEEE DOI 2309
BibRef

Chen, J.B.[Jian-Bo], Liu, X.W.[Xin-Wei], Liang, S.Y.[Si-Yuan], Jia, X.J.[Xiao-Jun], Xun, Y.[Yuan],
Universal Watermark Vaccine: Universal Adversarial Perturbations for Watermark Protection,
AML23(2322-2329)
IEEE DOI 2309
BibRef

Wang, X.J.[Xing-Jun], Jin, Y.X.[Yu-Xin],
A high-capacity text watermarking method based on geometric micro-distortion,
ICPR22(1749-1755)
IEEE DOI 2212
Layout, Watermarking, Copyright protection, Distortion, Robustness, Faces BibRef

Li, Y.[Yinan], Zhang, W.M.[Wei-Ming], Fang, H.[Han], Yang, X.[Xi], Ma, Z.[Zehua], Yu, N.H.[Neng-Hai],
Font Watermarking Network for Text Images,
ICIP22(486-490)
IEEE DOI 2211
Perturbation methods, Watermarking, Manuals, digital watermark, glyph perturbation, document protection, deep learning BibRef

Zou, Z.H.[Zi-Hang], Gong, B.Q.[Bo-Qing], Wang, L.Q.[Li-Qiang],
Anti-Neuron Watermarking: Protecting Personal Data Against Unauthorized Neural Networks,
ECCV22(XIII:449-465).
Springer DOI 2211
BibRef

Jeong, Y.[Yonghyun], Kim, D.[Doyeon], Ro, Y.[Youngmin], Kim, P.[Pyounggeon], Choi, J.W.[Jong-Won],
FingerprintNet: Synthesized Fingerprints for Generated Image Detection,
ECCV22(XIV:76-94).
Springer DOI 2211
BibRef

Ying, Q.C.[Qi-Chao], Zhou, H.[Hang], Zeng, X.H.[Xian-Han], Xu, H.S.[Hai-Sheng], Qian, Z.X.[Zhen-Xing], Zhang, X.P.[Xin-Peng],
Hiding Images Into Images with Real-World Robustness,
ICIP22(111-115)
IEEE DOI 2211
Training, Image coding, Perturbation methods, Transform coding, Copyright protection, Visual effects, Robustness, image hiding, generative adversarial networks BibRef

Andriushchenko, M.[Maksym], Li, X.Y.R.[Xiao-Yang Rebecca], Oxholm, G.[Geoffrey], Gittings, T.[Thomas], Bui, T.[Tu], Flammarion, N.[Nicolas], Collomosse, J.[John],
ARIA: Adversarially Robust Image Attribution for Content Provenance,
WMF22(33-43)
IEEE DOI 2210
Training, Location awareness, Heating systems, Visualization, Perturbation methods, Computational modeling, Fingerprint recognition BibRef

Xie, M.Y.[Ming-Yang], Kulshrestha, M.[Manav], Wang, S.J.[Shao-Jie], Yang, J.H.[Jing-Han], Chakrabarti, A.[Ayan], Zhang, N.[Ning], Vorobeychik, Y.[Yevgeniy],
PROVES: Establishing Image Provenance using Semantic Signatures,
WACV22(3017-3026)
IEEE DOI 2202
Training, Visualization, Image synthesis, Weapons, Semantics, Generative adversarial networks, Adversarial Attack and Defense Methods BibRef

Sharma, S.[Sunpreet], Zou, J.J.[Ju Jia], Fang, G.[Gu],
A Novel Signature Watermarking Scheme for Identity Protection,
DICTA20(1-5)
IEEE DOI 2201
Digital images, Watermarking, Transforms, Discrete wavelet transforms, Watermark, Cybersecurity, Wavelets, DWT, Identity BibRef

Gruber, S.[Sebastian], Neumayr, B.[Bernd], Fabianek, C.[Christoph], Gringinger, E.[Eduard], Schuetz, C.G.[Christoph Georg], Schrefl, M.[Michael],
Towards Informed Watermarking of Personal Health Sensor Data for Data Leakage Detection,
IWDW20(109-124).
Springer DOI 2103
BibRef

Tohidi, F.[Faranak], Paul, M.[Manoranjan], Hooshmandasl, M.R.[Mohammad Reza], Chakraborty, S.[Subrata], Pradhan, B.[Biswajeet],
Block-wise Authentication and Recovery Scheme for Medical Images Focusing on Content Complexity,
PSIVT19(86-99).
Springer DOI 2003
BibRef

Du, L.[Ling], Wang, Y.J.[Yi-Jing], Ho, A.T.S.[Anthony T. S.],
Multi-attack Reference Hashing Generation for Image Authentication,
IWDW19(407-420).
Springer DOI 2003
BibRef

Kuribayashi, M.[Minoru], Wong, K.[Kok_Sheik],
Improved DM-QIM Watermarking Scheme for PDF Document,
IWDW19(171-183).
Springer DOI 2003
BibRef

Korus, P.[Pawel], Memon, N.[Nasir],
Content Authentication for Neural Imaging Pipelines: End-To-End Optimization of Photo Provenance in Complex Distribution Channels,
CVPR19(8613-8621).
IEEE DOI 2002
BibRef

Hachani, M.[Meha], Zaid, A.O.[Azza Ouled],
Digital Signature Based Control Integrity for JPEG HDR Images,
CAIP19(II:449-458).
Springer DOI 1909
BibRef

Cardamone, N.[Nicolò], d'Amore, F.[Fabrizio],
DWT and QR Code Based Watermarking for Document DRM,
IWDW18(137-150).
Springer DOI 1905
BibRef

Loc, C.V.[Cu Vinh], Nguyen, T.[Trac], Burie, J.C.[Jean-Christophe], xo Ogier, J.M.[Jean-Marc],
A robust watermarking approach for security issue of binary documents using fully convolutional networks,
IJDAR(23), No. 3, September 2020, pp. ages 219-239.
Springer DOI 2008
BibRef
Earlier: A1, A3, A4, Only:
Document Images Watermarking for Security Issue using Fully Convolutional Networks,
ICPR18(1091-1096)
IEEE DOI 1812
Watermarking, Distortion, Transforms, Image segmentation, Convolution, Feature extraction, Image edge detection BibRef

Kim, E.J.[Eun-Jin], Yu, J.M.[Jeong-Min],
A Consortium Blockchain System for Verifying Digital Contents on Traditional Costumes,
EuroMed18(I:437-446).
Springer DOI 1811
BibRef

Ejeta, T.G.[Tekachew Gobena], Kim, H.J.[Hyoung Joong],
Website Fingerprinting Attack on Psiphon and Its Forensic Analysis,
IWDW17(42-51).
Springer DOI 1708
BibRef

Uehira, K.[Kazutake], Suzuki, M.[Masahiro], Silapasuphakornwong, P.[Piyarat], Torii, H.[Hideyuki], Takashima, Y.[Youichi],
Copyright Protection for 3D Printing by Embedding Information Inside 3D-Printed Objects,
IWDW16(370-378).
Springer DOI 1703
BibRef

Sulema, Y.,
Image protection method based on binary operations,
WSSIP16(1-4)
IEEE DOI 1608
image coding BibRef

Yang, P.P.[Peng-Peng], Li, R.[Ruihan], Ni, R.R.[Rong-Rong], Zhao, Y.[Yao],
Recaptured Image Forensics Based on Quality Aware and Histogram Feature,
IWDW17(31-41).
Springer DOI 1708
BibRef
Earlier: A1, A3, A4, Only:
Recapture Image Forensics Based on Laplacian Convolutional Neural Networks,
IWDW16(119-128).
Springer DOI 1703
BibRef

Qiao, X.M.[Xiu-Mei], Ni, R.R.[Rong-Rong], Zhao, Y.[Yao],
Superpixel-Based Watermarking Scheme for Image Authentication and Recovery,
IWDW14(160-173).
Springer DOI 1602
BibRef

Cui, C.C.[Chen-Chen], Ni, R.R.[Rong-Rong], Zhao, Y.[Yao],
Robust Zero Watermarking for 3D Triangular Mesh Models Based on Spherical Integral Invariants,
IWDW17(318-330).
Springer DOI 1708
BibRef

Lin, C.C.[Chia-Chen], Huang, Y.H.[Yue-Hong], Tai, W.L.[Wei-Liang],
A Novel Hybrid Image Authentication Scheme for AMBTC-Compressed Images,
IWDW14(433-443).
Springer DOI 1602
BibRef

Stole, S.[Svorad], Soukup, D.[Daniel], Huber-Mork, R.[Reinhold],
Invariant characterization of DOVID security features using a photometric descriptor,
ICIP15(3422-3426)
IEEE DOI 1511
computational imaging. Diffractive Optically Variable Image Devices. For security documents, money, passports, etc. BibRef

Zhao, B.[Bo],
Model-based iterative reconstruction for magnetic resonance fingerprinting,
ICIP15(3392-3396)
IEEE DOI 1511
Bloch equation BibRef

Kuribayashi, M.[Minoru], Schaathun, H.G.[Hans Georg],
Image fingerprinting system based on collusion secure code and watermarking method,
ICIP15(2120-2124)
IEEE DOI 1511
OFDM-based watermarking BibRef

Naveen, C., Gupta, T.V.S., Satpute, V.R., Gandhi, A.S.,
A simple and efficient approach for medical image security using chaos on EZW,
ICAPR15(1-6)
IEEE DOI 1511
image coding BibRef

Chetan, K.R., Nirmala, S.,
A novel intelligent robust watermarking scheme for protecting information in document images,
ICAPR15(1-6)
IEEE DOI 1511
document image processing BibRef

Shin, J.[Jinse], Kim, D.S.[Dong-Sung], Ruland, C.[Christoph],
Content based image authentication using HOG feature descriptor,
ICIP14(5292-5296)
IEEE DOI 1502
Authentication BibRef

Hoang, B.A.M.[Bao An Mai], Sawaya, W.[Wadih], Bas, P.[Patrick],
Image model and printed document authentication: A theoretical analysis,
ICIP14(5377-5381)
IEEE DOI 1502
Authentication BibRef

Sun, J.H.[Jia-Hao], Lin, Y.H.[Yu-Hsun], Wu, J.L.[Ja-Ling],
Secure Client Side Watermarking with Limited Key Size,
MMMod15(I: 13-24).
Springer DOI 1501
BibRef

Chen, C.[Chao], Li, H.D.[Hao-Dong], Luo, W.Q.[Wei-Qi], Yang, R.[Rui], Huang, J.W.[Ji-Wu],
Anti-forensics of JPEG Detectors via Adaptive Quantization Table Replacement,
ICPR14(672-677)
IEEE DOI 1412
Detectors BibRef

Hoang, A.T.[Anh-Tu], Nguyen-Son, H.Q.[Hoang-Quoc], Tran, M.T.[Minh-Triet], Echizen, I.[Isao],
Detecting Traitors in Re-publishing Updated Datasets,
IWDW13(205-220).
Springer DOI 1407
BibRef

Tian, H.W.[Hua-Wei], Zhao, Y.[Yao], Ni, R.R.[Rong-Rong], Qin, L.M.[Lun-Ming], Li, X.L.[Xue-Long],
LDFT-Based Watermarking Resilient to Local Desynchronization Attacks,
Cyber(43), No. 6, 2013, pp. 2190-2201.
IEEE DOI 1312
feature extraction BibRef

Gebhardt, J., Goldstein, M., Shafait, F., Dengel, A.R.,
Document Authentication Using Printing Technique Features and Unsupervised Anomaly Detection,
ICDAR13(479-483)
IEEE DOI 1312
authorisation BibRef

Bertrand, R., Gomez-Kramer, P., Ramos Terrades, O., Franco, P., Ogier, J.M.,
A System Based on Intrinsic Features for Fraudulent Document Detection,
ICDAR13(106-110)
IEEE DOI 1312
document image processing BibRef

Imran, M.[Muhammad], Ghafoor, A.[Abdul], Khokher, M.R.[Muhammad Rizwan],
A robust non-blind color image watermarking scheme,
ICARCV12(1392-1396).
IEEE DOI 1304
BibRef

Liu, F.[Fang], Cheng, L.M.[Lee-Ming],
Perceptual Image Hashing via Wave Atom Transform,
IWDW11(468-478).
Springer DOI 1208
BibRef

Schrittwieser, S.[Sebastian], Kieseberg, P.[Peter], Echizen, I.[Isao], Wohlgemuth, S.[Sven], Sonehara, N.[Noboru], Weippl, E.[Edgar],
An Algorithm for k-Anonymity-Based Fingerprinting,
IWDW11(439-452).
Springer DOI 1208
BibRef

Yamada, T.[Takayuki], Gohshi, S.[Seiichi], Echizen, I.[Isao],
Countermeasure of re-recording prevention against attack with short wavelength pass filter,
ICIP11(2753-2756).
IEEE DOI 1201
BibRef

Praveen, R.G.[R. Gnana], Madhavaraj, A., Karthik, K.[Kannan],
A code and domain independent traitor tracing system based on the eigen-decomposition of fingerprinted images,
ICIIP11(1-6).
IEEE DOI 1112
BibRef

Shakeri, M.[Mahsa], Jamzad, M.[Mansour],
A Robust Zero-Watermark Copyright Protection Scheme Based on DWT and Image Normalization,
PSIVT11(II: 359-370).
Springer DOI 1111
BibRef

Bruna, A.R., Messina, G., Battiato, S.,
Crop Detection through Blocking Artefacts Analysis,
CIAP11(I: 650-659).
Springer DOI 1109
Actually not a watermark, analysis to detect cropping. BibRef

El-Hadedy, M.[Mohamed], Pitsilis, G.[Georgios], Knapskog, S.J.[Svein J.],
An Efficient Authorship Protection Scheme for Shared Multimedia Content,
ICIG11(914-919).
IEEE DOI 1109
BibRef

Cao, G.[Gang], Zhao, Y.[Yao], Ni, R.[Rongrong],
Forensic estimation of gamma correction in digital images,
ICIP10(2097-2100).
IEEE DOI 1009
BibRef

Gul, G.[Gokhan], Avcibas, I.[Ismail], Kurugollu, F.[Fatih],
SVD based image manipulation detection,
ICIP10(1765-1768).
IEEE DOI 1009
BibRef

Conotter, V.[Valentina], Boato, G.[Giulia], Farid, H.[Hany],
Detecting photo manipulation on signs and billboards,
ICIP10(1741-1744).
IEEE DOI 1009
BibRef

Vazquez-Padin, D.[David], Mosquera, C.[Carlos], Perez-Gonzalez, F.[Fernando],
Two-dimensional statistical test for the presence of almost cyclostationarity on images,
ICIP10(1745-1748).
IEEE DOI 1009
To detect digital forgeries. BibRef

Shariati, S.[Saloomeh], Jacques, L.[Laurent], Standaert, F.X.[Francois-Xavier], Macq, B.[Benoit], Salhi, M.A.[Mohamed Amin], Antoine, P.[Philippe],
Randomly driven fuzzy key extraction of unclonable images,
ICIP10(4329-4332).
IEEE DOI 1009
BibRef

Yamada, T.[Takayuki], Gohshi, S.[Seiichi], Echizen, I.[Isao],
Preventing re-recording based on difference between sensory perceptions of humans and devices,
ICIP10(993-996).
IEEE DOI 1009
BibRef

Lu, W.J.[Wen-Jun], Wu, M.[Min],
Multimedia forensic hash based on visual words,
ICIP10(989-992).
IEEE DOI 1009
BibRef

Koide, M.[Masafumi], Iwamura, K.[Keiichi],
Scalable authentication for various representations of JPEG 2000 images,
ICIP10(985-988).
IEEE DOI 1009
BibRef

Lie, W.N.[Won-Nuiig], Hsu, T.L.[Tze-Liang], Lin, G.S.[Guo-Shiang],
Verification of image content integrity by using dual watermarking on wavelets domain,
ICIP03(II: 487-490).
IEEE Abstract. 0312
BibRef

Kundu, M.K.[Malay Kumar], Das, S.[Sudeb],
Lossless ROI Medical Image Watermarking Technique with Enhanced Security and High Payload Embedding,
ICPR10(1457-1460).
IEEE DOI 1008
BibRef

Zhang, C.[Chi], Zhang, H.B.[Hong-Bin],
Exposing Digital Image Forgeries by Using Canonical Correlation Analysis,
ICPR10(838-841).
IEEE DOI 1008
BibRef

Huang, Y.Z.[Yi-Zhen], Fan, N.[Na],
Learning from interpolated images using neural networks for digital forensics,
CVPR10(177-182).
IEEE DOI 1006
BibRef

Cai, L.[Ling], Xu, Y.[Yiren], He, L.[Lei], Zhao, Y.M.[Yu-Ming], Yang, X.[Xin],
An Effective Segmentation for Noise-Based Image Verification Using Gamma Mixture Models,
ACCV09(III: 21-32).
Springer DOI 0909
For verification, protection. Add noise to make OCR difficult. BibRef

Hsu, C.Y.[Chao-Yung], Lu, C.S.[Chun-Shien], Pei, S.C.[Soo-Chang],
Secure image hashing via minimum distortion estimation,
ICIP09(1281-1284).
IEEE DOI 0911
BibRef

Kang, L.W.[Li-Wei], Lu, C.S.[Chun-Shien], Hsu, C.Y.[Chao-Yung],
Compressive sensing-based image hashing,
ICIP09(1285-1288).
IEEE DOI 0911
BibRef

Laadjel, M., Zebbiche, K., Kurugullu, F., Bouridane, A., Nibouche, O.,
Watermarking for Palmprint Image Protection,
IMVIP09(71-76).
IEEE DOI 0909
BibRef

Cruz-Ramos, C.[Clara], Reyes-Reyes, R.[Rogelio], Nakano-Miyatake, M.[Mariko], Pérez-Meana, H.M.[Héctor M.],
Image Authentication Scheme Based on Self-embedding Watermarking,
CIARP09(1005-1012).
Springer DOI 0911
BibRef

Xing, N.[Nan], Zhu, H.[Hong], Ma, W.Q.[Wen-Qing], Dong, M.[Min],
The Identification Algorithm of Forged Image Based on BP Neural Network,
CISP09(1-4).
IEEE DOI 0910
BibRef

Lv, X.L.[Xiu-Li], Bian, H.Y.[Hong-Yu], Yang, Y.F.[Yu-Fei],
Color Image Watermarking Using Support Vector Regression,
CISP09(1-4).
IEEE DOI 0910
BibRef

Li, Y.[Yang], Du, S.[Sidan],
Biometric Watermarking Based on Affine Parameters Estimation,
CISP09(1-6).
IEEE DOI 0910
BibRef

Ye, T.Y.[Tian-Yu], Ma, Z.F.[Zhao-Feng], Niu, X.X.[Xin-Xin], Yang, Y.X.[Yi-Xian],
A Robust Zero-Watermark Algorithm Based on Singular Value Decomposition for Digital Right Management,
CISP09(1-3).
IEEE DOI 0910
BibRef

Kiani, S., Moghaddam, M.E.,
A Fractal Based Image Watermarking for Authentication and Verification,
CISP09(1-5).
IEEE DOI 0910
BibRef

Kuo, C.C.J.[C.C. Jay],
Design of Collusion-Resistant Fingerprinting Systems: Review and New Results,
DW08(469).
Springer DOI 0811
BibRef

Poh, G.S.[Geong Sen], Martin, K.M.[Keith M.],
An Efficient Buyer-Seller Watermarking Protocol Based on Chameleon Encryption,
DW08(433-447).
Springer DOI 0811
BibRef

Williams, D.M.[David M.], Treharne, H.[Helen], Ho, A.T.S.[Anthony T.S.], Waller, A.[Adrian],
Formal Analysis of Two Buyer-Seller Watermarking Protocols,
DW08(278-292).
Springer DOI 0811
BibRef

Zhang, Y.P.[Yong-Ping], Kang, X.G.[Xian-Gui], Zhang, P.[Philipp],
A Practical Print-and-Scan Resilient Watermarking for High Resolution Images,
DW08(103-112).
Springer DOI 0811
BibRef

Poh, G.S.[Geong Sen], Martin, K.M.[Keith M.],
Classification Framework for Fair Content Tracing Protocols,
DW09(252-267).
Springer DOI 0908
BibRef

Delp, E.J.[Edward J.],
Forensic Techniques for Image Source Classification: A Comparative Study,
DW09(3).
Springer DOI 0908
BibRef

Sun, S.[Shewen], Wei, S.[Song], Wang, C.[Cong],
DPCC and QR factorization-based color medical image authentication algorithm,
IASP09(81-84).
IEEE DOI 0904
BibRef

Kim, H.S.[Hung-Sik], Lee, J.K.[Jeong-Kyu], Liu, H.B.[Hai-Bin], Lee, D.W.[Dong-Won],
Video linkage: group based copied video detection,
CIVR08(397-406). 0807
BibRef

Garain, U.[Utpal], Halder, B.[Biswajit],
Machine Authentication of Security Documents,
ICDAR09(718-722).
IEEE DOI 0907
BibRef
Earlier:
On Automatic Authenticity Verification of Printed Security Documents,
ICCVGIP08(706-713).
IEEE DOI 0812
BibRef

Geisselhardt, W.[Walter], Iqbal, T.[Taswar],
High-Capacity Invisible Background Encoding for Digital Authentication of Hardcopy Documents,
DW07(203-221).
Springer DOI 0712
BibRef

Li, Q.M.[Qi-Ming], Memon, N.[Nasir],
Practical Security of Non-Invertible Watermarking Schemes,
ICIP07(IV: 445-448).
IEEE DOI 0709
BibRef

Okada, M.[Mitsuo], Okabe, Y.[Yasuo], Uehara, T.[Tetsutaro],
Semi-blind Fingerprinting Utilizing Ordinary Existing Watermarking Techniques,
DW09(14-28).
Springer DOI 0908
BibRef

Hou, S.H.[Shu-Hui], Uehara, T.[Tetsutaro], Morimura, Y.[Yoshitaka], Minoh, M.[Michihiko],
Fingerprinting Codes for Live Pay-Television Broadcast Via Internet,
MCAM07(252-261).
Springer DOI 0706
BibRef

Hu, C.Y.[Cheng-Yu], Liu, P.T.[Peng-Tao], Li, D.X.[Da-Xing],
A New Type of Proxy Ring Signature Scheme with Revocable Anonymity and No Info Leaked,
MCAM07(262-266).
Springer DOI 0706
BibRef

Chang, S.F.[Shih-Fu],
Blind Passive Media Forensics: Motivation and Opportunity,
MCAM07(57-59).
Springer DOI 0706
BibRef

Li, Q.M.[Qi-Ming], Memon, N.[Nasir],
Security Models of Digital Watermarking,
MCAM07(60-64).
Springer DOI 0706
BibRef

Jin, C.[Cong], Pan, L.G.[Liang-Gang], Su, T.[Ting],
A Blind Watermarking Scheme Based on Visual Model for Copyright Security,
MCAM07(454-463).
Springer DOI 0706
BibRef

Qin, C.[Chuan], Lee, W.B.[Wei-Bin], Zhang, X.P.[Xin-Peng], Wang, S.Z.[Shuo-Zhong],
Copyright Management Using Progressive Image Delivery, Visible Watermarking and Robust Fingerprinting,
ICARCV06(1-4).
IEEE DOI 0612
BibRef

Ni, J.Q.[Jiang-Qun], Zhang, R.Y.[Rong-Yue], Huang, J.W.[Ji-Wu], Wang, C.T.[Chun-Tao], Li, Q.B.[Quan-Bo],
A Rotation-Invariant Secure Image Watermarking Algorithm Incorporating Steerable Pyramid Transform,
DW06(446-460).
Springer DOI 0611
BibRef

Ye, S.M.[Shui-Ming], Sun, Q.B.[Qi-Bin], Chang, E.C.[Ee-Chien],
Error Resilient Image Authentication Using Feature Statistical and Spatial Properties,
DW06(461-472).
Springer DOI 0611
BibRef

Lemma, A.[Aweke], Katzenbeisser, S.[Stefan], Celik, M.U.[Mehmet U.], van der Veen, M.[Michiel],
Secure Watermark Embedding Through Partial Encryption,
DW06(433-445).
Springer DOI 0611
BibRef

Kwon, G.R.[Goo-Rak], Lee, K.H.[Kwan-Hee], Nam, S.J.[Sang-Jae], Ko, S.J.[Sung-Jea],
Intellectual Property Rights Management Using Combination Encryption in MPEG-4,
DW06(188-196).
Springer DOI 0611
BibRef

Awrangjeb, M.[Mohammad], Murshed, M.,
Robust Signature-Based Geometric Invariant Copyright Protection,
ICIP06(1961-1964).
IEEE DOI 0610
BibRef

Akhshani, A., Mahmodi, H., Akhavan, A.,
A Novel Block Cipher Based on Hierarchy of One-Dimensional Composition Chaotic Maps,
ICIP06(1993-1996).
IEEE DOI 0610
BibRef

Cho, I.H.[Ik-Hwan], Cho, A.Y.[A-Young], Kim, H.K.[Hae-Kwang], Oh, W.G.[Weon-Geun], Jeong, D.S.[Dong-Seok],
Robust Visual Identifier for Cropped Natural Photos,
ACIVS06(933-943).
Springer DOI 0609
Actually not a watermark, analysis to detect cropping. BibRef

Hsu, C.S.[Ching-Sheng], Tu, S.F.[Shu-Fen], Hou, Y.C.[Young-Chang],
A Statistical Approach for Ownership Identification of Digital Images,
ACIVS06(666-674).
Springer DOI 0609
BibRef

Cheng, S., Wu, Q.A.[Qi-Ang], Castleman, K.R.,
Non-Ubiquitous Digital Watermarking for Record Indexing and Integrity Protection of Medical Images,
ICIP05(II: 1062-1065).
IEEE DOI 0512
BibRef

Doerr, G.J., Dugelay, J.L.,
A Countermeasure to Resist Block Replacement Attacks,
ICIP05(I: 965-968).
IEEE DOI 0512
BibRef

He, D.J.[Da-Jun], Sun, Q.B.[Qi-Bin],
A Practical Print-Scan Resilient Watermarking Scheme,
ICIP05(I: 257-260).
IEEE DOI 0512
BibRef

Tzeng, J.N.[Jeng-Nan], Hwang, W.L.[Wen-Liang], Chern, I.L.[I-Liang],
An Asymmetric Watermarking Method for Copyright Protection Utilizing Dual Bases,
ICIP05(I: 269-272).
IEEE DOI 0512
BibRef

Harmanci, O., Monga, V., Mihcak, M.K.,
Geometrically Invariant Image Watermarking via Robust Perceptual Hashes,
ICIP06(1397-1400).
IEEE DOI 0610
BibRef

Mao, Y.N.[Yi-Nian], Mihcak, M.K.,
Collusion-Resistant Intentional De-Synchronization for Digital Video Fingerprinting,
ICIP05(I: 237-240).
IEEE DOI 0512
BibRef

Krawczyk, S.[Stephen], Jain, A.K.[Anil K.],
Securing Electronic Medical Records Using Biometric Authentication,
AVBPA05(1110).
Springer DOI 0509
BibRef

Monaci, G., Escoda, O.D., Vandergheynst, P.,
Analysis of Multimodal Signals Using Redundant Representations,
ICIP05(III: 145-148).
IEEE DOI 0512
BibRef

Yu, S.S.[Sheng-Sheng], Hu, Y.P.[Yu-Ping], Zhou, J.L.[Jing-Li],
Content-based watermarking scheme for image authentication,
ICARCV04(II: 1083-1087).
IEEE DOI 0412
BibRef

Jost, P., Vandergheynst, P., Frossard, P.,
Redundant image representations in security applications,
ICIP04(IV: 2151-2154).
IEEE DOI 0505
BibRef

Herley, C., Vora, P., Yang, S.,
Detection and deterrence of counterfeiting of valuable documents,
ICIP04(IV: 2423-2426).
IEEE DOI 0505
BibRef

Kim, H.Y.[Hae Yong],
A New Public-Key Authentication Watermarking for Binary Document Images Resistant to Parity Attacks,
ICIP05(II: 1074-1077).
IEEE DOI 0512
BibRef

Kim, H.Y.[Hae Yong], de Queiroz, R.L.,
A public-key authentication watermarking for binary images,
ICIP04(V: 3459-3462).
IEEE DOI 0505
BibRef

Pamboukian, S.V.D., Kim, H.Y.[Hae Yong], de Queiroz, R.L.,
Watermarking JBIG2 Text Region for Image Authentication,
ICIP05(II: 1078-1081).
IEEE DOI 0512
BibRef

Kim, H.Y.[Hae Yong], de Queiroz, R.L.[Ricardo Lopes],
Alteration-Locating Authentication Watermarking for Binary Images,
DW04(125-136).
Springer DOI 0505
BibRef

Patra, J.C., Ang, K.K.[Kah K.], Ang, E.L.[Ee-Luang],
Hierarchical multiple image watermarking for image authentication and ownership verification,
ICIP04(IV: 2661-2664).
IEEE DOI 0505
BibRef

Avcibas, I., Bayram, S., Memon, N., Ramkumar, M., Sankur, B.,
A classifier design for detecting image manipulations,
ICIP04(IV: 2645-2648).
IEEE DOI 0505
BibRef

Chao, J.H.[Jin-Hui], Suzuki, S., Kim, J.[Jongdae],
Copyright tracing using invariants of contents,
ICIP04(IV: 2183-2186).
IEEE DOI 0505
BibRef

Kim, W.G.[Won-Gyum], Suh, Y.H.[Young-Ho],
Short N-Secure Fingerprinting Code for Image,
ICIP04(IV: 2167-2170).
IEEE DOI 0505
BibRef

Yao, Z.[Zhen], Rajpoot, N.M.,
Radon/ridgelet signature for image authentication,
ICIP04(I: 43-46).
IEEE DOI 0505
BibRef

Shaked, D., Baharav, Z., Levy, A., Yen, J., Saw, C.W.[Chit Wei],
Graphical Indicia,
ICIP03(I: 485-488).
IEEE Abstract. 0312
Authenticable graphical barcode. BibRef

Adelsbach, A.[André], Katzenbeisser, S.[Stefan], Sadeghi, A.R.[Ahmad-Reza],
On the Insecurity of Non-invertible Watermarking Schemes for Dispute Resolving,
DW03(355-369).
Springer DOI 0405
BibRef

Lu, C.S.[Chun-Shien], Hsu, C.Y.[Chao-Yong],
Content-Dependent Anti-disclosure Image Watermark,
DW03(61-76).
Springer DOI 0405
BibRef

Johnson, M.[Mark], Ramchandran, K.,
Dither-based secure image hashing using distributed coding,
ICIP03(II: 751-754).
IEEE Abstract. 0312
BibRef

Lefebvre, F., Czyz, J., Macq, B.,
A robust soft hash algorithm for digital image signature,
ICIP03(II: 495-498).
IEEE Abstract. 0312
BibRef

Lee, S.K.[Sang-Kwang], Suh, Y.H.[Young-Ho], Ho, Y.S.[Yo-Sung],
Public Key Watermarking for Reversible Image Authentication,
ICIP06(1409-1412).
IEEE DOI 0610
BibRef

Sagetong, P., Zhou, W.S.[Wen-Sheng],
Dynamic wavelet feature-based watermarking for copyright tracking in digital movie distribution systems,
ICIP02(III: 653-656).
IEEE DOI 0210
BibRef

Aguzzi, M.[Marco], Albanesi, M.G.[Maria Grazia], Ferretti, M.[Marco],
A Novel Watermarking Algorithm for Image Authentication: Robustness Against Common Attacks and JPEG2000 Compression,
CIAP05(559-567).
Springer DOI 0509
BibRef

Albanesi, M.G., Ferretti, M., Guerrini, F.,
A taxonomy for image authentication techniques and its application to the current state of the art,
CIAP01(535-540).
IEEE DOI 0210
BibRef

Yu, G.J.,
Mean Quantization Blind Watermarking for Image Authentication,
ICIP00(Vol III: 706-709).
IEEE DOI 0008
BibRef

Herley, C.,
Securing Images Online: A Protection Mechanism That Does Not Involve Watermarking,
ICIP00(Vol III: 660-663).
IEEE DOI 0008
BibRef

Hel-Or, H.,
Copyright Labeling of Printed Images,
ICIP00(Vol III: 702-705).
IEEE DOI 0008
BibRef

Tsekeridou, S., Nikolaidis, N.D., Sidiropoulos, N.D., Pitas, I.,
Copyright Protection of Still Images Using Self-similar Chaotic Watermarks,
ICIP00(Vol I: 411-414).
IEEE DOI 0008
BibRef

O'Ruanaidh, J.J.K.[Joseph J.K.], Csurka, G.[Gabriella],
A Bayesian Approach to Spread Spectrum Watermark Detection and Secure Copyright Protection for Digital Image Libraries,
CVPR99(I: 207-212).
IEEE DOI BibRef 9900

Ratakonda, K., Dugad, R., Ahuja, N.,
Digital image watermarking: issues in resolving rightful ownership,
ICIP98(II: 414-418).
IEEE DOI 9810
BibRef

Dugad, R., Ratakonda, K., Ahuja, N.,
A new wavelet-based scheme for watermarking images,
ICIP98(II: 419-423).
IEEE DOI 9810
BibRef

Braudaway, G.,
Protecting Publicly Available Images with an Invisible Image Watermark,
ICIP97(I: 524-527).
IEEE DOI BibRef 9700

Zeng, W., and Liu, B.,
On Resolving Rightful Ownerships of Digital Images by Invisible Watermarks,
ICIP97(I: 552-555).
IEEE DOI 9710
BibRef

Yeung, M., and Mintzer, F.,
An Invisible Watermarking Technique for Image Verification,
ICIP97(II: 680-683).
IEEE DOI BibRef 9700

Pitas, I.,
A method for signature casting on digital images,
ICIP96(III: 215-218).
IEEE DOI 9610
BibRef

Schneider, M., Chang, S.F.[Shih-Fu],
A robust content based digital signature for image authentication,
ICIP96(III: 227-230).
IEEE DOI 9610
BibRef

Chapter on OCR, Document Analysis and Character Recognition Systems continues in
Forgery Detection for Images .


Last update:Nov 26, 2024 at 16:40:19