23.3.9 Watermarks for Copyright, Ownership Protection, Authentication, Verification, Forgery

Chapter Contents (Back)
Watermark. Copyright Protection. Ownership Protection. Authentication. See also Video Copy, Video Duplicate Detection. Usually the more specific papers.

Katoh, M.[Mitsutaka], Ohmae, K.[Kouichi], Sonoda, S.[Shinya], Yanagida, M.[Masahito], Senga, M.[Masanori],
Image processing device and method for identifying an input image, and copier scanner and printer including same,
US_Patent5,845,008, Dec 1, 1998
WWW Version. BibRef 9812
And: US_Patent6,289,125, Sep 11, 2001
WWW Version. preprint a pattern, detect and do not copy. BibRef

Brassil, J.T., Low, S., Maxemchuk, N.F.,
Copyright protection for the electronic distribution of text documents,
PIEEE(87), No. 7, July 1999, pp. 1181-1196.
IEEE DOI Link 9907
BibRef

Brzakovic, D., Vujovic, N.,
Authentication of Random Patterns by Finding a Match in an Image Database,
IVC(14), No. 7, July 1996, pp. 485-499.
WWW Version. 9607
Find an exact match of a random texture. Apply to authentication of documents where random fibers are embedded. BibRef

Oruanaidh-Ruanaidh, J.J.K., Dowling, W.J., Boland, F.M.,
Watermarking Digital Images for Copyright Protection,
VISP(143), No. 4, August 1996, pp. 250-256. 9611
BibRef
Earlier:
Phase watermarking of digital images,
ICIP96(III: 239-242).
IEEE DOI Link 9610
BibRef

Barni, M.[Mauro], Bartolini, F.[Franco], Cappellini, V.[Vito], Piva, A.[Alessandro],
Copyright Protection of Digital Images by Embedded Unperceivable Marks,
IVC(16), No. 12-13, 24 August 1998, pp. 897-906.
WWW Version. BibRef 9808

Low, S.H., Maxemchuk, N.F., Lapone, A.M.,
Document Identification for Copyright Protection Using Centroid Detection,
Commun(46), No. 3, March 1998, pp. 372-383. 9804
BibRef

Brassil, J.T., Low, S.H., Maxemchuk, N.F., O'Gorman, L.,
Marking text features of document images to deter illicit dissemination,
ICPR94(B:315-319).
IEEE DOI Link 9410
BibRef

Barnett, R., Pearson, D.,
Attack Operators for Digitally Watermarked Images,
VISP(145), No. 4, August 1998, pp. 271-279. 9810
BibRef

Memon, N.[Nasir], Wong, P.W.[Ping Wah],
Protecting Digital Media Content,
CACM(41), No. 7, July 1998, pp. 35-43. Adding visible and invisible watermarks BibRef 9807

Memon, N., Wong, P.W.[Ping Wah],
A buyer-seller watermarking protocol,
IP(10), No. 4, April 2001, pp. 643-649.
IEEE DOI Link 0104
BibRef

Wong, P.W.[Ping Wah], Memon, N.,
Secret and public key image watermarking schemes for image authentication and ownership verification,
IP(10), No. 10, October 2001, pp. 1593-1601.
IEEE DOI Link 0111
BibRef

Holliman, M., Memon, N.,
Counterfeiting Attacks on Oblivious Block-wise Independent Invisible Watermarking Schemes,
IP(9), No. 3, March 2000, pp. 432-441.
IEEE DOI Link 0003
BibRef

Wong, P.W.[Ping Wah],
A public key watermark for image verification and authentication,
ICIP98(I: 455-459).
IEEE DOI Link 9810
BibRef

Chen, T.S., Chang, C.C., Hwang, M.S.,
A Virtual Image Cryptosystem Based upon Vector Quantization,
IP(7), No. 10, October 1998, pp. 1485-1488.
IEEE DOI Link BibRef 9810

Augot, D., Boucqueau, J.M., Delaigle, J.F., Fontaine, C., Goray, E.,
Secure delivery of images over open networks,
PIEEE(87), No. 7, July 1999, pp. 1251-1266.
IEEE DOI Link 9907
BibRef

Low, S.H., Maxemchuk, N.F.,
Capacity of Text Marking Channel,
SPLetters(7), No. 12, December 2000, pp. 345-347.
IEEE Top Reference. 0011
BibRef
Earlier: A2, A1:
Marking Text Documents,
ICIP97(III: 13).
IEEE DOI Link BibRef

Burgett, S., Koch, E., Zhao, J.,
Copyright Labeling of Digitized Image Data,
CommunMag(36), No. 3, March 1998, pp. 94-100. 9804
BibRef

Garg, G.[Gaurav], Sharma, P.K.[Pramod Kumar], Chaudhury, S.[Santanu],
Image based document authentication using DCT,
PRL(22), No. 6-7, May 2001, pp. 725-729.
Elsevier DOI Link 0105
BibRef

Bartolini, F., Tefas, A., Barni, M., Pitas, I.,
Image authentication techniques for surveillance applications,
PIEEE(89), No. 10, October 2001, pp. 1403-1418.
IEEE DOI Link 0110
BibRef

Lu, C.S.[Chun-Shien], Liao, H.Y.M.,
Multipurpose watermarking for image authentication and protection,
IP(10), No. 10, October 2001, pp. 1579-1592.
IEEE DOI Link 0111
BibRef

Dittmann, J.[Jana], Steinebach, M.[Martin], Wohlmacher, P.[Petra], Ackermann, R.[Ralf],
Digital Watermarks Enabling E-Commerce Strategies: Conditional and User Specific Access to Services and Resources,
JASP(2002), No. 2, 2002, pp. 174-184. 0202
BibRef

Liu, H.J.[Hua-Jian], Steinebach, M.[Martin],
Digital Watermarking for Image Authentication with Localization,
ICIP06(1973-1976).
IEEE DOI Link 0610
BibRef

Merkel, R.[Ronny], Kraetzer, C.[Christian], Altschaffel, R.[Robert], Clausing, E.[Eric], Schott, M.[Maik], Dittmann, J.[Jana],
Fingerprint Forensics Application Protocol: Semi-automated Modeling and Verification of Watermark-Based Communication Using CASPER and FDR,
IWDW11(321-335).
Springer DOI Link 1208
BibRef

Wang, Y.W.[Yi-Wei], Doherty, J.F., van Dyck, R.E.,
A wavelet-based watermarking algorithm for ownership verification of digital images,
IP(11), No. 2, February 2002, pp. 77-88.
IEEE DOI Link 0202
BibRef

Lu, C.S.[Chun-Shien], Liao, H.Y.M., Kutter, M.,
Denoising and copy attacks resilient watermarking by exploiting prior knowledge at detector,
IP(11), No. 3, March 2002, pp. 280-292.
IEEE DOI Link 0203
BibRef

Desset, C.[Claude], Macq, B.[Benoît], Vandendorpe, L.[Luc],
Block error-correcting codes for systems with a very high BER: Theoretical analysis and application to the protection of watermarks,
SP:IC(17), No. 5, May 2002, pp. 409-421.
WWW Version. 0206
BibRef

Celik, M.U., Sharma, G., Saber, E., Tekalp, A.M.[A. Murat],
Hierarchical watermarking for secure image authentication with localization,
IP(11), No. 6, June 2002, pp. 585-595.
IEEE DOI Link 0207
BibRef
Earlier:
A Hierarchical Image Authentication Watermark with Improved Localization and Security,
ICIP01(II: 502-505).
IEEE DOI Link 0108
BibRef

Altun, H.O., Sharma, G., Bocko, M.F.,
Optimum Watermark Design by Vector Space Projections,
ICIP06(1413-1416).
IEEE DOI Link 0610
BibRef

Altun, H.O., Sharma, G., Celik, M.U., Bocko, M.F.,
Semifragile Hierarchical Watermarking in a Set Theoretic Framework,
ICIP05(I: 1001-1004).
IEEE DOI Link 0512
BibRef

Gunsel, B.[Bilge], Uludag, U.[Umut], Tekalp, A.M.[A. Murat],
Robust watermarking of fingerprint images,
PR(35), No. 12, December 2002, pp. 2739-2747.
WWW Version. 0209
BibRef

Zhang, X.P.[Xin-Peng], Wang, S.Z.[Shuo-Zhong],
Watermarking scheme capable of resisting attacks based on availability of inserter,
SP(82), No. 11, November 2002, pp. 1801-1804.
HTML Version. 0210
BibRef

Zhang, X.P.[Xin-Peng], Wang, S.Z.[Shuo-Zhong],
Watermarking Scheme Capable of Resisting Sensitivity Attack,
SPLetters(14), No. 2, February 2007, pp. 125-128.
IEEE DOI Link 0703
BibRef

Yao, H.[Heng], Wang, S.Z.[Shuo-Zhong], Zhao, Y.[Yan], Zhang, X.P.[Xin-Peng],
Detecting Image Forgery Using Perspective Constraints,
SPLetters(19), No. 3, March 2012, pp. 123-126.
IEEE DOI Link 1202
BibRef

Radhakrishnan, R., Memon, N.,
On the security of the digest function in the SARI image authentication system,
CirSysVideo(12), No. 11, November 2002, pp. 1030-1033.
IEEE Top Reference. 0301
BibRef
Earlier:
On the security of the SARI image authentication system,
ICIP01(III: 971-974).
IEEE DOI Link 0108
BibRef

Baudry, S.[Séverine], Nguyen, P.[Philippe], Maître, H.[Henri],
Optimal decoding for watermarks subject to geometrical attacks,
SP:IC(18), No. 4, April 2003, pp. 297-307.
WWW Version. 0304
BibRef

Eskicioglu, A.M.[Ahmet M.], Town, J.[John], Delp, E.J.[Edward J.],
Security of digital entertainment content from creation to consumption,
SP:IC(18), No. 4, April 2003, pp. 237-262.
WWW Version. 0304
BibRef

Kim, B.S.[Bum-Soo], Choi, J.G.[Jae-Gark], Park, C.H.[Chul-Hyun], Won, J.U.[Jong-Un], Kwak, D.M.[Dong-Min], Oh, S.K.[Sang-Keun], Koh, C.R.[Chang-Rim], Park, K.H.[Kil-Houm],
Robust digital image watermarking method against geometrical attacks,
RealTimeImg(9), No. 2, April 2003, pp. 139-149.
WWW Version. 0304
BibRef

Li, X.L.[Xue-Long],
Watermarking in secure image retrieval,
PRL(24), No. 14, October 2003, pp. 2431-2434.
WWW Version. 0307
BibRef

Zheng, D.[Dong], Zhao, J.Y.[Ji-Ying], El Saddik, A.,
RST-invariant digital image watermarking based on log-polar mapping and phase correlation,
CirSysVideo(13), No. 8, August 2003, pp. 753-765.
IEEE Abstract. 0309
BibRef

Zheng, D.[Dong], Liu, Y.[Yan], Zhao, J.Y.[Ji-Ying], El Saddik, A.[Abdulmotaleb],
A survey of RST invariant image watermarking algorithms,
Surveys(39), No. 2, July 2007, pp. 5.
WWW Version. 0805
Survey, Watermarks. BibRef

Liu, Y.[Yan], Zhao, J.Y.[Ji-Ying],
Rotation, scaling, translation invariant image watermarking based on radon transform,
CRV04(225-232).
IEEE Abstract. 0408
BibRef

Wu, M.[Min],
Joint security and robustness enhancement for quantization based data embedding,
CirSysVideo(13), No. 8, August 2003, pp. 831-841.
IEEE Abstract. 0309
BibRef
And:
Joint security and robustness enhancement for quantization embedding,
ICIP03(II: 483-486).
IEEE Abstract. 0312
BibRef

Izquierdo, E., Guerra, V.,
An ill-posed operator for secure image authentication,
CirSysVideo(13), No. 8, August 2003, pp. 842-852.
IEEE Abstract. 0309
BibRef

Tsai, P.[Piyu], Hu, Y.C.[Yu-Chen], Chang, C.C.[Chin-Chen],
Using set partitioning in hierarchical trees to authenticate digital images,
SP:IC(18), No. 9, October 2003, pp. 813-822.
WWW Version. 0310
BibRef

Chang, C.C.[Chin-Chen], Tsai, P.[Piyu], Lin, C.C.[Chia-Chen],
SVD-based digital image watermarking scheme,
PRL(26), No. 10, 15 July 2005, pp. 1577-1586.
WWW Version. 0506
BibRef

Wang, S.H.[Shih-Hao], Lin, Y.P.[Yuan-Pei],
Wavelet tree quantization for copyright protection watermarking,
IP(13), No. 2, February 2004, pp. 154-165.
IEEE DOI Link 0404
BibRef

Kim, Y.W.[Young-Won], Oh, I.S.[Il-Seok],
Watermarking text document images using edge direction histograms,
PRL(25), No. 11, August 2004, pp. 1243-1251.
WWW Version. 0409
BibRef

Kim, Y.W.[Young-Won], Moon, K.A.[Kyung-Ae], Oh, I.S.[Il-Seok],
A text watermarking algorithm based on word classification and inter-word space statistics,
ICDAR03(775-779).
IEEE Abstract. 0311
BibRef

Kim, H.Y.[Hae Yong], Afif, A.[Amir],
A secure authentication watermarking for halftone and binary images,
IJIST(14), No. 4, 2004, pp. 147-152.
DOI Link 0408
BibRef

Seo, J.S.[Jin S.], Haitsma, J.[Jaap], Kalker, T.[Ton], Yoo, C.D.[Chang D.],
A robust image fingerprinting system using the Radon transform,
SP:IC(19), No. 4, April 2004, pp. 325-339.
WWW Version. 0405
BibRef

Roy, S.[Sujoy], Sun, Q.[Qibin], Kalker, T.[Ton],
Performance analysis of locality preserving image hash,
ICIP08(1268-1271).
IEEE DOI Link 0810
BibRef

Li, Q.M.[Qi-Ming], Roy, S.[Sujoy],
On the security of non-forgeable robust hash functions,
ICIP08(3124-3127).
IEEE DOI Link 0810
BibRef

Ni, R.R.[Rong-Rong], Ruan, Q.Q.[Qiu-Qi], Cheng, H.D.,
Secure semi-blind watermarking based on iteration mapping and image features,
PR(38), No. 3, March 2005, pp. 357-368.
WWW Version. 0412
BibRef

Lei, C.L.[Chin-Laung], Yu, P.L.[Pei-Ling], Tsai, P.L.[Pan-Lung], Chan, M.H.[Ming-Hwa],
An efficient and anonymous buyer-seller watermarking protocol,
IP(13), No. 12, December 2004, pp. 1618-1626.
IEEE DOI Link 0412
BibRef

Wu, Y., Deng, R.H.,
Security of an Ill-Posed Operator for Image Authentication,
CirSysVideo(15), No. 1, January 2005, pp. 161-163.
IEEE Abstract. 0501
BibRef

Pei, S.C., Guo, J.M., Lee, H.,
Novel Robust Watermarking Technique in Dithering Halftone Images,
SPLetters(12), No. 4, April 2005, pp. 333-336.
IEEE Abstract. 0501
BibRef

El-Taweel, G.S., Onsi, H.M., Samy, M., Darwish, M.G.,
Secure and Non-Blind Watermarking Scheme for Color Images,
GVIP(SI1), 2005, pp. xx-yy
HTML Version. BibRef 0500

Chen, T.H.[Tzung-Her], Tsai, D.S.[Du-Shiau],
Owner-customer right protection mechanism using a watermarking scheme and a watermarking protocol,
PR(39), No. 8, August 2006, pp. 1530-1541.
WWW Version. 0606
Visual cryptography; Digital signature; Digital timestamp BibRef

Tsai, D.S.[Du-Shiau], Chen, T.H.[Tzung-Her], Horng, G.[Gwoboa],
A cheating prevention scheme for binary visual cryptography with homogeneous secret images,
PR(40), No. 8, August 2007, pp. 2356-2366.
WWW Version. 0704
Visual cryptography; Cheating; Cheating prevention; Genetic algorithm BibRef

Chen, Y.C.[Yu-Chi], Tsai, D.S.[Du-Shiau], Horng, G.[Gwoboa],
A new authentication based cheating prevention scheme in Naor-Shamir’s visual cryptography,
JVCIR(23), No. 8, November 2012, pp. 1225-1233.
Elsevier DOI Link 1211
Secret sharing; Visual cryptography; Visual secret sharing; Human vision system; Cheating; Cheating prevention; Authentication; Security BibRef

Maret, Y.[Yannick], DuFaux, F.[Frédéric], Ebrahimi, T.[Touradj],
Adaptive image replica detection based on support vector classifiers,
SP:IC(21), No. 8, September 2006, pp. 688-703.
WWW Version. 0609
Image replica detection; Features extraction; SVM Dimensionality reduction; Copyright infringement detection BibRef

Zhao, Q.[Qijun], Lu, H.T.[Hong-Tao],
PCA-based web page watermarking,
PR(40), No. 4, April 2007, pp. 1334-1341.
WWW Version. 0701
Principal component analysis (PCA); Watermark; HTML; Web page; Tamper-proof BibRef

Zhao, Q.[Qijun], Lu, H.T.[Hong-Tao],
A PCA-based watermarking scheme for tamper-proof of web pages,
PR(38), No. 8, August 2005, pp. 1321-1323.
WWW Version. 0505
BibRef

Yang, H.J.[Hui-Juan], Kot, A.C.[Alex C.],
Pattern-Based Data Hiding for Binary Image Authentication by Connectivity-Preserving,
MultMed(9), No. 3, April 2007, pp. 475-486.
IEEE DOI Link 0905
BibRef
Earlier:
A General Data Hiding Framework and Multi-level Signature for Binary Images,
DW07(188-202).
Springer DOI Link 0712
BibRef

Liu, J.[Jun], Yang, H.J.[Hui-Juan], Kot, A.C.,
Relationships And Unification of Binary Images Data-Hiding Methods,
ICIP05(I: 981-984).
IEEE DOI Link 0512
BibRef

Lin, C.H., Chan, D.Y., Su, H., Hsieh, W.S.,
Histogram-oriented watermarking algorithm: colour image watermarking scheme robust against geometric attacks and signal processing,
VISP(153), No. 4, August 2006, pp. 483-492.
WWW Version. 0705
BibRef

Lu, C.S.[Chun-Shien], Hsu, C.Y.[Chao-Yung],
Near-Optimal Watermark Estimation and Its Countermeasure: Antidisclosure Watermark for Multiple Watermark Embedding,
CirSysVideo(17), No. 4, April 2007, pp. 454-467.
IEEE DOI Link 0705
BibRef

Cheung, Y.M., Wu, H.T.,
A Sequential Quantization Strategy for Data Embedding and Integrity Verification,
CirSysVideo(17), No. 8, August 2007, pp. 1007-1016.
IEEE DOI Link 0710
BibRef

Wang, S.S.[Shuenn-Shyang], Tsai, S.L.[Sung-Lin],
Automatic image authentication and recovery using fractal code embedding and image inpainting,
PR(41), No. 2, February 2008, pp. 701-712.
WWW Version. 0711
Image processing; Watermarking; Fractal image coding BibRef

Lin, E.I., Eskicioglu, A.M., Lagendijk, R.L., Delp, E.J.,
Advances in Digital Video Content Protection,
PIEEE(93), No. 1, January 2005, pp. 171-183.
IEEE DOI Link 0501
Survey, Authentication. BibRef

Piva, A.[Alessandro], Bartolini, F.[Franco], Caldelli, R.[Roberto],
Self Recovery Authentication Of Images In The Dwt Domain,
IJIG(5), No. 1, January 2005, pp. 149-165. 0501
BibRef

Caldelli, R.[Roberto], Bartolini, F.[Franco], Cappellini, V.[Vito], Piva, A.[Alessandro], Barni, M.[Mauro],
A New Self-Recovery Technique for Image Authentication,
VLBV03(164-171).
HTML Version. 0310
BibRef

Wang, X.Y.[Xiang-Yang], Hou, L.M.[Li-Min], Wu, J.[Jun],
A feature-based robust digital image watermarking against geometric attacks,
IVC(26), No. 7, 2 July 2008, pp. 980-989.
WWW Version. 0804
Image watermarking; Geometric attack; Image feature; Normalization BibRef

Wang, X.Y.[Xiang-Yang], Cui, C.Y.[Chang-Ying],
A novel image watermarking scheme against desynchronization attacks by SVR revision,
JVCIR(19), No. 5, July 2008, pp. 334-342.
WWW Version. 0804
Digital image watermarking; Desynchronization attacks; Support vector regression; Revision; Sum; Variance; Image block; Neighboring pixel BibRef

Lee, C.H.[Choong-Hoon], Lee, H.K.[Heung-Kyu], Suh, Y.H.[Young-Ho],
Image Watermarking Resistant To Combined Geometric And Removal Attacks,
IJIG(5), No. 1, January 2005, pp. 37-65. 0501
BibRef

Feng, W.[Wei], Liu, Z.Q.A.[Zhi-Qi-Ang],
Region-Level Image Authentication Using Bayesian Structural Content Abstraction,
IP(17), No. 12, December 2008, pp. 2413-2424.
IEEE DOI Link 0811
BibRef
Earlier:
Bayesian Structural Content Abstraction for Region-Level Image Authentication,
ICCV05(II: 1042-1047).
IEEE DOI Link 0510
Capture spatial topology of regions and use in description. BibRef

Im, D.H., Lee, H.Y., Ryu, S.J., Lee, H.K.,
Vector Watermarking Robust to Both Global and Local Geometrical Distortions,
SPLetters(15), No. 1, 2008, pp. 789-792.
IEEE DOI Link 0812
BibRef

Vatsa, M.[Mayank], Singh, R.[Richa], Noore, A.[Afzel],
Feature based RDWT watermarking for multimodal biometric system,
IVC(27), No. 3, February 2009, pp. 293-304.
Elsevier DOI Link 0804
Biometrics; Watermarking; RDWT: Redundant Discrete Wavelet Transform; Face recognition; Voice recognition; Multimodal biometrics BibRef

Tsai, M.J.[Min-Jen],
A visible watermarking algorithm based on the content and contrast aware (COCOA) technique,
JVCIR(20), No. 5, July 2009, pp. 323-338.
Elsevier DOI Link 0905
BibRef
Earlier:
Filter bank selection for the ownership verification of wavelet based digital image watermarking,
ICIP04(V: 3415-3418).
IEEE DOI Link 0505
CSF; Human Vision System; NVF; Visible watermarking; Wavelet transform; Copyright protection; Image inpainting; Image recovery BibRef

Ababneh, S.[Sufyan], Ansari, R.[Rashid], Khokhar, A.A.[Ashfaq A.],
Iterative compensation schemes for multimedia content authentication,
JVCIR(20), No. 5, July 2009, pp. 303-311.
Elsevier DOI Link 0905
BibRef
Earlier: A1, A3, A2:
Compensated Signature Embedding Based Multimedia Content Authentication System,
ICIP07(I: 393-396).
IEEE DOI Link 0709
Authentication; Convex sets; POCS; Watermarking; Compensated signature embedding; Image integrity; Multimedia authentication; Signature embedding BibRef

Singhal, N.[Nitin], Lee, Y.Y.[Young-Yoon], Kim, C.S.[Chang-Su], Lee, S.U.[Sang-Uk],
Robust image watermarking using local Zernike moments,
JVCIR(20), No. 6, August 2009, pp. 408-419.
Elsevier DOI Link 0907
Digital image watermarking; Digital right management; Local Zernike moments; Feature point detection; Image normalization; Content-based synchronization; Salient region parameters; Geometric distortions BibRef

Lai, C.H.[Chao-Hung], Wu, J.L.[Jiunn-Lin],
Robust image watermarking against local geometric attacks using multiscale block matching method,
JVCIR(20), No. 6, August 2009, pp. 377-388.
Elsevier DOI Link 0907
Local geometric attack; Stirmark; Deformable mesh model; Image registration; Resynchronization; Multiscale block matching; AM based watermarking BibRef

Farid, H.,
Seeing is not believing,
Spectrum(46), No. 8, August 2009, pp. 44-51.
IEEE DOI Link 0909
Too many things can be done to a picture to believe the picture. Techniques to counter such alterations, or at least to know they happened. BibRef

Bhatnagar, G.[Gaurav], Raman, B.[Balasubramanian],
Robust Reference-watermarking Scheme Using Wavelet Packet Transform and Bidiagonal-singular Value Decomposition,
IJIG(9), No. 3, July 2009, pp. 449-477.
DOI Link 0911
BibRef
Earlier:
Robust Watermarking Scheme Based on Multiresolution Fractional Fourier Transform,
ICCVGIP08(1-8).
IEEE DOI Link 0812
See also New Fractional Random Wavelet Transform for Fingerprint Security, A. BibRef

Bhatnagar, G.[Gaurav], Raman, B.[Balasubramanian], Wu, Q.M.J.[Q. M. Jonathan],
Robust watermarking using fractional wavelet packet transform,
IET-IPR(6), No. 4, 2012, pp. 386-397.
DOI Link 1205
BibRef

Bhatnagar, G.[Gaurav], Wu, Q.M.J.[Q. M. Jonathan], Raman, B.[Balasubramanian],
A Novel Image Encryption Framework Based on Markov Map and Singular Value Decomposition,
ICIAR11(II: 286-296).
Springer DOI Link 1106
See also Real Time Human Visual System Based Framework for Image Fusion. BibRef

Rawat, S.[Sanjay], Raman, B.[Balasubramanian],
A Chaos-based Robust Watermarking Algorithm For Rightful Ownership Protection,
IJIG(11), No. 4, October 2011, pp. 471-493.
DOI Link 1201
BibRef

Awrangjeb, M.[Mohammad], Lu, G.J.[Guo-Jun],
Techniques for efficient and effective transformed image identification,
JVCIR(20), No. 8, November 2009, pp. 511-520.
Elsevier DOI Link 0911
Feature detection; Feature representation; Feature matching; Transformed image identification BibRef

Nikolopoulos, S.[Spiros], Zafeiriou, S.P.[Stafanos P.], Nikolaidis, N.D.[Nikos D.], Pitas, I.[Ioannis],
Image replica detection system utilizing R-trees and linear discriminant analysis,
PR(43), No. 3, March 2010, pp. 636-649.
Elsevier DOI Link 1001
Replica detection; Copy image detection; Perceptual hashing; Robust hashing; Fingerprinting; Copyright protection; Content-based monitoring; Linear discriminant analysis (LDA); R-tree indexing BibRef

Tsai, H.M.[Han-Min], Chang, L.W.[Long-Wen],
Secure reversible visible image watermarking with authentication,
SP:IC(25), No. 1, January 2010, pp. 10-17.
Elsevier DOI Link 1001
Visible watermarking; Reversible data embedding; Image authentication; Lagrange multipliers BibRef

Carreras, A.[Anna], Delgado, J.[Jaime], Rodriguez, E.[Eva], Barbosa, V.[Vitor], Andrade, M.[Maria], Arachchi, H.K.[Hemantha Kodikara], Dogan, S.[Safak], Kondoz, A.M.[Ahmed M.],
A Platform for Context-Aware and Digital Rights Management-Enabled Content Adaptation,
MultMedMag(17), No. 2, April-June 2010, pp. 74-89.
IEEE DOI Link 1006
BibRef

Kim, J.W.[Jong-Weon], Kim, N.G.[Nam-Gyu], Lee, D.W.[Dong-Won], Park, S.B.[Sung-Bum], Lee, S.W.[Sang-Won],
Watermarking two dimensional data object identifier for authenticated distribution of digital multimedia contents,
SP:IC(25), No. 8, September 2010, pp. 559-576.
Elsevier DOI Link 1003
Digital object identifier; 2-dimensional barcode; Digital watermarking; Digital multimedia contents; Universal Content Identifier BibRef

Mokhtarian, K., Hefeeda, M.,
Authentication of Scalable Video Streams With Low Communication Overhead,
MultMed(12), No. 7, 2010, pp. 730-742.
IEEE DOI Link 1011
Security of video streams. See also Capacity Management of Seed Servers in Peer-to-Peer Streaming Systems With Scalable Video Streams. BibRef

Huang, T.J.[Tie-Jun], Tian, Y.H.[Yong-Hong], Gao, W.[Wen], Lu, J.[Jian],
Mediaprinting: Identifying Multimedia Content for Digital Rights Management,
Computer(43), No. 12, December 2010, pp. 28-35.
IEEE DOI Link 1101
BibRef

Zhang, X.P.[Xin-Peng], Wang, S.Z.[Shuo-Zhong], Qian, Z.X.[Zhen-Xing], Feng, G.R.[Guo-Rui],
Reference Sharing Mechanism for Watermark Self-Embedding,
IP(20), No. 2, February 2011, pp. 485-495.
IEEE DOI Link 1102
BibRef

Yerushalmy, I.[Ido], Hel-Or, H.[Hagit],
Digital Image Forgery Detection Based on Lens and Sensor Aberration,
IJCV(92), No. 1, March 2011, pp. 71-91.
WWW Version. 1103
BibRef

Tsai, J.S.[Jen-Sheng], Huang, W.B.[Win-Bin], Kuo, Y.H.[Yau-Hwang],
On the Selection of Optimal Feature Region Set for Robust Digital Image Watermarking,
IP(20), No. 3, March 2011, pp. 735-743.
IEEE DOI Link 1103
BibRef

Tsai, J.S.[Jen-Sheng], Huang, W.B.[Win-Bin], Chen, C.L.[Chao-Lieh], Kuo, Y.H.[Yau-Hwang],
A Feature-Based Digital Image Watermarking for Copyright Protection and Content Authentication,
ICIP07(V: 469-472).
IEEE DOI Link 0709
BibRef

Kallel, M.[Mohamed], Bouhlel, M.S.[Mohamed-Salim], Lapayre, J.C.[Jean-Christophe],
Security of the Medical Media Using a Hybrid and Multiple Watermark Technique,
IJIG(11), No. 1, January 2011, pp. 103-115.
DOI Link 1103
BibRef

Lin, G.S.[Guo-Shiang], Chang, M.K.[Min-Kuan], Chen, Y.L.[You-Lin],
A Passive-Blind Forgery Detection Scheme Based on Content-Adaptive Quantization Table Estimation,
CirSysVideo(21), No. 4, April 2011, pp. 421-434.
IEEE DOI Link 1104
BibRef
Earlier:
Image Forgery Detection Based on Quantization Table Estimation,
MVA09(66-).
PDF Version. 0905
BibRef

Kakar, P., Sudha, N., Ser, W.,
Exposing Digital Image Forgeries by Detecting Discrepancies in Motion Blur,
MultMed(13), No. 3, 2011, pp. 443-452.
IEEE DOI Link 1106
BibRef

Tian, L.H.[Li-Hua], Zheng, N.N.[Nan-Ning], Xue, J.R.[Jian-Ru], Li, C.[Ce], Wang, X.F.[Xiao-Feng],
An integrated visual saliency-based watermarking approach for synchronous image authentication and copyright protection,
SP:IC(26), No. 8-9, October 2011, pp. 427-437.
Elsevier DOI Link 1109
Watermarking; Image authentication; Visual saliency; Tamper detection and localization BibRef

Guo, J.M.[Jing-Ming], Liu, Y.F.[Yun-Fu],
Halftone-Image Security Improving Using Overall Minimal-Error Searching,
IP(20), No. 10, October 2011, pp. 2800-2812.
IEEE DOI Link 1110
BibRef
Earlier:
Error-Diffused Image Security Improving Using Overall Minimal-Error Searching,
PSIVT09(550-561).
Springer DOI Link 0901
BibRef

Lin, Y.C.[Yao-Chung], Varodayan, D.[David], Girod, B.[Bernd],
Image Authentication Using Distributed Source Coding,
IP(21), No. 1, January 2012, pp. 273-283.
IEEE DOI Link 1112
BibRef
Earlier:
Image Authentication Based on Distributed Source Coding,
ICIP07(III: 5-8).
IEEE DOI Link 0709
BibRef

Varodayan, D.[David], Lin, Y.C.[Yao-Chung], Girod, B.[Bernd],
Adaptive Distributed Source Coding,
IP(21), No. 5, May 2012, pp. 2630-2640.
IEEE DOI Link 1204
BibRef

Yin, H., Hui, W., Li, H., Lin, C., Zhu, W.,
A Novel Large-Scale Digital Forensics Service Platform for Internet Videos,
MultMed(14), No. 1, January 2012, pp. 178-186.
IEEE DOI Link 1201
BibRef

Wu, L.[Lin], Cao, X.C.[Xiao-Chun], Zhang, W.[Wei], Wang, Y.[Yang],
Detecting image forgeries using metrology,
MVA(23), No. 2, March 2012, pp. 363-373.
WWW Version. 1202
BibRef

Ling, H.F.[He-Fei], Cheng, H.R.[Hong-Rui], Ma, Q.Z.[Qing-Zhen], Zou, F.H.[Fu-Hao], Yan, W.Q.[Wei-Qi],
Efficient Image Copy Detection Using Multiscale Fingerprints,
MultMedMag(19), No. 1, January-March 2012, pp. 60-69.
IEEE DOI Link 1202
BibRef

Jin, C.[Cong],
Adaptive robust image watermark approach based on fuzzy comprehensive evaluation and analytic hierarchy process,
SIViP(6), No. 2, June 2012, pp. 317-324.
WWW Version. 1205
BibRef

Jin, C.[Cong], Jin, S.W.[Shu-Wei],
Adaptive digital image watermark scheme based on Fuzzy Neural Network for copyright protection,
IASP10(599-602).
IEEE DOI Link 1004
BibRef

Rosales-Roldan, L.[Luis], Cedillo-Hernandez, M.[Manuel], Nakano-Miyatake, M.[Mariko], Perez-Meana, H.[Hector], Kurkoski, B.[Brian],
Watermarking-based image authentication with recovery capability using halftoning technique,
SP:IC(28), No. 1, January 2013, pp. 69-83.
Elsevier DOI Link 1301
Watermarking; Content authentication; Recovery capability; Halftoning; IWT; DCT; SSIM criterion BibRef

Ulutas, G.[Guzin], Ulutas, M.[Mustafa], Nabiyev, V.V.[Vasif V.],
Secret image sharing scheme with adaptive authentication strength,
PRL(34), No. 3, 1 February 2013, pp. 283-291.
Elsevier DOI Link 1301
Secret sharing; Steganography; Chaining; Authentication BibRef

Dirik, A.E., Haas, B.,
Copy detection pattern-based document protection for variable media,
IET-IPR(6), No. 8, 2012, pp. 1102-1113.
DOI Link 1302
BibRef

Jiang, X.H.[Xing-Hao], Wang, W.[Wan], Sun, T.F.[Tan-Feng], Shi, Y.Q., Wang, S.L.[Shi-Lin],
Detection of Double Compression in MPEG-4 Videos Based on Markov Statistics,
SPLetters(20), No. 5, May 2013, pp. 447-450.
IEEE DOI Link 1304
BibRef

Chen, W.[Wen], Shi, Y.Q.[Yun Q.],
Detection of Double MPEG Compression Based on First Digit Statistics,
DW08(16-30).
Springer DOI Link 0811
BibRef

Shi, Y.Q.[Yun Q.],
First Digit Law and Its Application to Digital Forensics,
DW08(448-453).
Springer DOI Link 0811
BibRef

Yamasaki, T.[Toshihiko], Aizawa, K.[Kiyoharu],
SIFT-Based Non-blind Watermarking Robust to Non-linear Geometrical Distortions,
IEICE(E96-D), No. 6, June 2013, pp. 1368-1375.
WWW Version. 1306
BibRef

Yamasaki, T.[Toshihiko], Nakai, Y.[Yasumasa], Aizawa, K.[Kiyoharu],
An object-based non-blind watermarking that is robust to non-linear geometrical distortion attacks,
ICIP09(3669-3672).
IEEE DOI Link 0911
BibRef

Pham, V.Q.[Viet Quoc], Miyaki, T.[Takashi], Yamasaki, T.[Toshihiko], Aizawa, K.[Kiyoharu],
Geometrically Invariant Object-Based Watermarking using SIFT Feature,
ICIP07(V: 473-476).
IEEE DOI Link 0709
BibRef

Zheng, P.[Peijia], Huang, J.W.[Ji-Wu],
Discrete Wavelet Transform and Data Expansion Reduction in Homomorphic Encrypted Domain,
IP(22), No. 6, 2013, pp. 2455-2468.
IEEE DOI Link Haar transforms; Watermarking 1307
BibRef

Sahraee, M.J., Ghofrani, S.,
A robust blind watermarking method using quantization of distance between wavelet coefficients,
SIViP(7), No. 4, July 2013, pp. 799-807.
WWW Version. 1306
BibRef

Agarwal, C.[Charu], Mishra, A.[Anurag], Sharma, A.[Arpita],
Gray-scale image watermarking using GA-BPN hybrid network,
JVCIR(24), No. 7, 2013, pp. 1135-1146.
Elsevier DOI Link 1309
Digital image watermarking BibRef

Horng, S.J.[Shi-Jinn], Rosiyadi, D.[Didi], Li, T.[Tianrui], Takao, T.[Terano], Guo, M.[Minyi], Khan, M.K.[Muhammad Khurram],
A blind image copyright protection scheme for e-government,
JVCIR(24), No. 7, 2013, pp. 1099-1105.
Elsevier DOI Link 1309
Blind BibRef

Qazi, T., Hayat, K., Khan, S.U., Madani, S.A., Khan, I.A., Kolodziej, J., Li, H., Lin, W., Yow, K.C., Xu, C.Z.,
Survey on blind image forgery detection,
IET-PR(7), No. 7, October 2013, pp. 660-670.
DOI Link 1312
Survey, Forgery Detection. image forensics BibRef

Liu, S.C.[Shen-Chuan], Sae-Tang, W.[Wannida], Fujiyoshi, M.[Masaaki], Kiya, H.[Hitoshi],
An Efficient Compression of Amplitude-Only Images for the Image Trading System,
IEICE(E97-D), No. 2, February 2013, pp. 378-379.
WWW Version. 1402
BibRef

Pande, A., Chen, S.[Shaxun], Mohapatra, P., Zambreno, J.,
Hardware Architecture for Video Authentication Using Sensor Pattern Noise,
CirSysVideo(24), No. 1, January 2014, pp. 157-167.
IEEE DOI Link 1402
cameras BibRef

Lee, J.S.[Jung-San], Li, B.[Bo],
Self-Recognized Image Protection Technique that Resists Large-Scale Cropping,
MultMedMag(21), No. 1, January 2014, pp. 60-73.
IEEE DOI Link 1405
data compression BibRef

Xu, Y.Y.[Yan-Yan], Xiong, L.Z.[Li-Zhi], Xu, Z.Q.[Zheng-Quan], Pan, S.M.[Shao-Ming],
A content security protection scheme in JPEG compressed domain,
JVCIR(25), No. 5, 2014, pp. 805-813.
Elsevier DOI Link 1406
Content security BibRef

Xu, Z.Q.[Zheng-Quan], Xiong, L.Z.[Li-Zhi], Xu, Y.Y.[Yan-Yan],
On the provably secure CEW based on orthogonal decomposition,
SP:IC(29), No. 5, 2014, pp. 607-617.
Elsevier DOI Link 1406
Commutative Encryption and Watermarking (CEW) BibRef

Yang, Q.T.[Qun-Ting], Gao, T.G.[Tie-Gang],
An Image Authentication Scheme for Accurate Localization and Restoration,
IWDW13(475-487).
Springer DOI Link 1407
BibRef


Hoang, A.T.[Anh-Tu], Nguyen-Son, H.Q.[Hoang-Quoc], Tran, M.T.[Minh-Triet], Echizen, I.[Isao],
Detecting Traitors in Re-publishing Updated Datasets,
IWDW13(205-220).
Springer DOI Link 1407
BibRef

Lin, X.F.[Xu-Feng], Li, C.T.[Chang-Tsun], Hu, Y.J.[Yong-Jian],
Exposing image forgery through the detection of contrast enhancement,
ICIP13(4467-4471)
IEEE DOI Link 1402
Digital forensics BibRef

Puglisi, G.[Giovanni], Bruna, A.R.[Arcangelo Ranieri], Galvan, F.[Fausto], Battiato, S.[Sebastiano],
First JPEG quantization matrix estimation based on histogram analysis,
ICIP13(4502-4506)
IEEE DOI Link 1402
Double JPEG Compression; Forgery Identification BibRef

Tian, H.W.[Hua-Wei], Zhao, Y.[Yao], Ni, R.R.[Rong-Rong], Qin, L.M.[Lun-Ming], Li, X.L.[Xue-Long],
LDFT-Based Watermarking Resilient to Local Desynchronization Attacks,
Cyber(43), No. 6, 2013, pp. 2190-2201.
IEEE DOI Link 1312
feature extraction BibRef

Gebhardt, J., Goldstein, M., Shafait, F., Dengel, A.R.,
Document Authentication Using Printing Technique Features and Unsupervised Anomaly Detection,
ICDAR13(479-483)
IEEE DOI Link 1312
authorisation BibRef

Bertrand, R., Gomez-Kramer, P., Ramos Terrades, O., Franco, P., Ogier, J.M.,
A System Based on Intrinsic Features for Fraudulent Document Detection,
ICDAR13(106-110)
IEEE DOI Link 1312
document image processing BibRef

Saleh, S.Q.[Sahar Q.], Hussain, M.[Muhammad], Muhammad, G.[Ghulam], Bebis, G.N.[George N.],
Evaluation of Image Forgery Detection Using Multi-scale Weber Local Descriptors,
ISVC13(II:416-424).
Springer DOI Link 1311
BibRef

Cozzolino, D.[Davide], Gargiulo, F.[Francesco],
Multiple Classifier Systems for Image Forgery Detection,
CIAP13(II:259-268).
Springer DOI Link 1309
BibRef

Imran, M.[Muhammad], Ghafoor, A.[Abdul], Khokher, M.R.[Muhammad Rizwan],
A robust non-blind color image watermarking scheme,
ICARCV12(1392-1396).
IEEE DOI Link 1304
BibRef

Hsu, C.Y.[Chao-Yung], Lu, C.S.[Chun-Shien], Pei, S.C.[Soo-Chang],
Content authentication of halftone video via flickering as sparse signal,
ICIP12(265-268).
IEEE DOI Link 1302
BibRef

Cozzolino, D.[Davide], Poggi, G.[Giovanni], Sansone, C.[Carlo], Verdoliva, L.[Luisa],
A Comparative Analysis of Forgery Detection Algorithms,
SSSPR12(693-700).
Springer DOI Link 1211
BibRef

Zach, F.[Fabian], Riess, C.[Christian], Angelopoulou, E.[Elli],
Automated Image Forgery Detection through Classification of Jpeg Ghosts,
DAGM12(185-194).
Springer DOI Link 1209
BibRef

Liu, F.[Fang], Cheng, L.M.[Lee-Ming],
Perceptual Image Hashing via Wave Atom Transform,
IWDW11(468-478).
Springer DOI Link 1208
BibRef

Schrittwieser, S.[Sebastian], Kieseberg, P.[Peter], Echizen, I.[Isao], Wohlgemuth, S.[Sven], Sonehara, N.[Noboru], Weippl, E.[Edgar],
An Algorithm for k-Anonymity-Based Fingerprinting,
IWDW11(439-452).
Springer DOI Link 1208
BibRef

Murali, S., Anami, B.S., Chittapur, G.B.,
Detection of Copy-Create Image Forgery Using Luminance Level Techniques,
NCVPRIPG11(215-218).
IEEE DOI Link 1205
BibRef

Yamada, T.[Takayuki], Gohshi, S.[Seiichi], Echizen, I.[Isao],
Countermeasure of re-recording prevention against attack with short wavelength pass filter,
ICIP11(2753-2756).
IEEE DOI Link 1201
BibRef

Praveen, R.G.[R. Gnana], Madhavaraj, A., Karthik, K.[Kannan],
A code and domain independent traitor tracing system based on the eigen-decomposition of fingerprinted images,
ICIIP11(1-6).
IEEE DOI Link 1112
BibRef

Shakeri, M.[Mahsa], Jamzad, M.[Mansour],
A Robust Zero-Watermark Copyright Protection Scheme Based on DWT and Image Normalization,
PSIVT11(II: 359-370).
Springer DOI Link 1111
BibRef

Al-Hammadi, M.H.[Muneer H.], Muhammad, G.[Ghulam], Hussain, M.[Muhammad], Bebis, G.N.[George N.],
Curvelet Transform and Local Texture Based Image Forgery Detection,
ISVC13(II:503-512).
Springer DOI Link 1311
BibRef

Muhammad, N.[Najah], Hussain, M.[Muhammad], Muhamad, G.[Ghulam], Bebis, G.N.[George N.],
A Non-intrusive Method for Copy-Move Forgery Detection,
ISVC11(II: 516-525).
Springer DOI Link 1109
BibRef

Bruna, A.R., Messina, G., Battiato, S.,
Crop Detection through Blocking Artefacts Analysis,
CIAP11(I: 650-659).
Springer DOI Link 1109
Actually not a watermark, analysis to detect cropping. BibRef

El-Hadedy, M.[Mohamed], Pitsilis, G.[Georgios], Knapskog, S.J.[Svein J.],
An Efficient Authorship Protection Scheme for Shared Multimedia Content,
ICIG11(914-919).
IEEE DOI Link 1109
BibRef

Cao, G.[Gang], Zhao, Y.[Yao], Ni, R.[Rongrong],
Forensic estimation of gamma correction in digital images,
ICIP10(2097-2100).
IEEE DOI Link 1009
BibRef

Gul, G.[Gokhan], Avcibas, I.[Ismail], Kurugollu, F.[Fatih],
SVD based image manipulation detection,
ICIP10(1765-1768).
IEEE DOI Link 1009
BibRef

Conotter, V.[Valentina], Boato, G.[Giulia], Farid, H.[Hany],
Detecting photo manipulation on signs and billboards,
ICIP10(1741-1744).
IEEE DOI Link 1009
BibRef

Vazquez-Padin, D.[David], Mosquera, C.[Carlos], Perez-Gonzalez, F.[Fernando],
Two-dimensional statistical test for the presence of almost cyclostationarity on images,
ICIP10(1745-1748).
IEEE DOI Link 1009
To detect digital forgeries. BibRef

Shariati, S.[Saloomeh], Jacques, L.[Laurent], Standaert, F.X.[Francois-Xavier], Macq, B.[Benoit], Salhi, M.A.[Mohamed Amin], Antoine, P.[Philippe],
Randomly driven fuzzy key extraction of unclonable images,
ICIP10(4329-4332).
IEEE DOI Link 1009
BibRef

Yamada, T.[Takayuki], Gohshi, S.[Seiichi], Echizen, I.[Isao],
Preventing re-recording based on difference between sensory perceptions of humans and devices,
ICIP10(993-996).
IEEE DOI Link 1009
BibRef

Lu, W.J.[Wen-Jun], Wu, M.[Min],
Multimedia forensic hash based on visual words,
ICIP10(989-992).
IEEE DOI Link 1009
BibRef

Li, W.H.[Wei-Hai], Yu, N.H.[Neng-Hai],
Rotation robust detection of copy-move forgery,
ICIP10(2113-2116).
IEEE DOI Link 1009
BibRef

Koide, M.[Masafumi], Iwamura, K.[Keiichi],
Scalable authentication for various representations of JPEG 2000 images,
ICIP10(985-988).
IEEE DOI Link 1009
BibRef

Lie, W.N.[Won-Nuiig], Hsu, T.L.[Tze-Liang], Lin, G.S.[Guo-Shiang],
Verification of image content integrity by using dual watermarking on wavelets domain,
ICIP03(II: 487-490).
IEEE Abstract. 0312
BibRef

Kundu, M.K.[Malay Kumar], Das, S.[Sudeb],
Lossless ROI Medical Image Watermarking Technique with Enhanced Security and High Payload Embedding,
ICPR10(1457-1460).
IEEE DOI Link 1008
BibRef

Zhang, C.[Chi], Zhang, H.B.[Hong-Bin],
Exposing Digital Image Forgeries by Using Canonical Correlation Analysis,
ICPR10(838-841).
IEEE DOI Link 1008
BibRef

Maatouk, M.N.[Mohamed Neji], Bellaj, M.[Majd], Ben Amara, N.E.[Najoua Essoukri],
Watermarking ancient documents schema using wavelet packets and convolutional code,
IPTA10(172-176).
IEEE DOI Link 1007
BibRef

Huang, Y.Z.[Yi-Zhen], Fan, N.[Na],
Learning from interpolated images using neural networks for digital forensics,
CVPR10(177-182).
IEEE DOI Link 1006
BibRef

Cai, L.[Ling], Xu, Y.[Yiren], He, L.[Lei], Zhao, Y.M.[Yu-Ming], Yang, X.[Xin],
An Effective Segmentation for Noise-Based Image Verification Using Gamma Mixture Models,
ACCV09(III: 21-32).
Springer DOI Link 0909
For verification, protection. Add noise to make OCR difficult. BibRef

Polatkan, G.[Gungor], Jafarpour, S.[Sina], Brasoveanu, A.[Andrei], Hughes, S.[Shannon], Daubechies, I.[Ingrid],
Detection of forgery in paintings using supervised learning,
ICIP09(2921-2924).
IEEE DOI Link 0911
Not through watermarks, but forgery detection. BibRef

Hsu, C.Y.[Chao-Yung], Lu, C.S.[Chun-Shien], Pei, S.C.[Soo-Chang],
Secure image hashing via minimum distortion estimation,
ICIP09(1281-1284).
IEEE DOI Link 0911
BibRef

Kang, L.W.[Li-Wei], Lu, C.S.[Chun-Shien], Hsu, C.Y.[Chao-Yung],
Compressive sensing-based image hashing,
ICIP09(1285-1288).
IEEE DOI Link 0911
BibRef

Laadjel, M., Zebbiche, K., Kurugullu, F., Bouridane, A., Nibouche, O.,
Watermarking for Palmprint Image Protection,
IMVIP09(71-76).
IEEE DOI Link 0909
BibRef

Cruz-Ramos, C.[Clara], Reyes-Reyes, R.[Rogelio], Nakano-Miyatake, M.[Mariko], Pérez-Meana, H.[Héctor],
Image Authentication Scheme Based on Self-embedding Watermarking,
CIARP09(1005-1012).
Springer DOI Link 0911
BibRef

Zhang, T.[Ting], Wang, R.D.[Rang-Ding],
Copy-Move Forgery Detection Based on SVD in Digital Image,
CISP09(1-5).
IEEE DOI Link 0910
BibRef

Xing, N.[Nan], Zhu, H.[Hong], Ma, W.Q.[Wen-Qing], Dong, M.[Min],
The Identification Algorithm of Forged Image Based on BP Neural Network,
CISP09(1-4).
IEEE DOI Link 0910
BibRef

Lv, X.L.[Xiu-Li], Bian, H.Y.[Hong-Yu], Yang, Y.F.[Yu-Fei],
Color Image Watermarking Using Support Vector Regression,
CISP09(1-4).
IEEE DOI Link 0910
BibRef

Li, Y.[Yang], Du, S.[Sidan],
Biometric Watermarking Based on Affine Parameters Estimation,
CISP09(1-6).
IEEE DOI Link 0910
BibRef

Ye, T.Y.[Tian-Yu], Ma, Z.F.[Zhao-Feng], Niu, X.X.[Xin-Xin], Yang, Y.X.[Yi-Xian],
A Robust Zero-Watermark Algorithm Based on Singular Value Decomposition for Digital Right Management,
CISP09(1-3).
IEEE DOI Link 0910
BibRef

Kiani, S., Moghaddam, M.E.,
A Fractal Based Image Watermarking for Authentication and Verification,
CISP09(1-5).
IEEE DOI Link 0910
BibRef

Kuo, C.C.J.[C.C. Jay],
Design of Collusion-Resistant Fingerprinting Systems: Review and New Results,
DW08(469).
Springer DOI Link 0811
BibRef

Poh, G.S.[Geong Sen], Martin, K.M.[Keith M.],
An Efficient Buyer-Seller Watermarking Protocol Based on Chameleon Encryption,
DW08(433-447).
Springer DOI Link 0811
BibRef

Williams, D.M.[David M.], Treharne, H.[Helen], Ho, A.T.S.[Anthony T.S.], Waller, A.[Adrian],
Formal Analysis of Two Buyer-Seller Watermarking Protocols,
DW08(278-292).
Springer DOI Link 0811
BibRef

Zhang, Y.P.[Yong-Ping], Kang, X.G.[Xian-Gui], Zhang, P.[Philipp],
A Practical Print-and-Scan Resilient Watermarking for High Resolution Images,
DW08(103-112).
Springer DOI Link 0811
BibRef

Zheng, J.B.[Jiang-Bin], Liu, M.[Miao],
A Digital Forgery Image Detection Algorithm Based on Wavelet Homomorphic Filtering,
DW08(152-160).
Springer DOI Link 0811
BibRef

Li, Z.[Zhe], Zheng, J.B.[Jiang-Bin],
Blind Detection of Digital Forgery Image Based on the Local Entropy of the Gradient,
DW08(161-169).
Springer DOI Link 0811
BibRef

Poh, G.S.[Geong Sen], Martin, K.M.[Keith M.],
Classification Framework for Fair Content Tracing Protocols,
DW09(252-267).
Springer DOI Link 0908
BibRef

Delp, E.J.[Edward J.],
Forensic Techniques for Image Source Classification: A Comparative Study,
DW09(3).
Springer DOI Link 0908
BibRef

Sun, S.[Shewen], Wei, S.[Song], Wang, C.[Cong],
DPCC and QR factorization-based color medical image authentication algorithm,
IASP09(81-84).
IEEE DOI Link 0904
BibRef

Kim, H.S.[Hung-Sik], Lee, J.K.[Jeong-Kyu], Liu, H.B.[Hai-Bin], Lee, D.W.[Dong-Won],
Video linkage: group based copied video detection,
CIVR08(397-406). 0807
BibRef

Garain, U.[Utpal], Halder, B.[Biswajit],
Machine Authentication of Security Documents,
ICDAR09(718-722).
IEEE DOI Link 0907
BibRef
Earlier:
On Automatic Authenticity Verification of Printed Security Documents,
ICCVGIP08(706-713).
IEEE DOI Link 0812
BibRef

Geisselhardt, W.[Walter], Iqbal, T.[Taswar],
High-Capacity Invisible Background Encoding for Digital Authentication of Hardcopy Documents,
DW07(203-221).
Springer DOI Link 0712
BibRef

Li, Q.M.[Qi-Ming], Memon, N.[Nasir],
Practical Security of Non-Invertible Watermarking Schemes,
ICIP07(IV: 445-448).
IEEE DOI Link 0709
BibRef

Okada, M.[Mitsuo], Okabe, Y.[Yasuo], Uehara, T.[Tetsutaro],
Semi-blind Fingerprinting Utilizing Ordinary Existing Watermarking Techniques,
DW09(14-28).
Springer DOI Link 0908
BibRef

Hou, S.H.[Shu-Hui], Uehara, T.[Tetsutaro], Morimura, Y.[Yoshitaka], Minoh, M.[Michihiko],
Fingerprinting Codes for Live Pay-Television Broadcast Via Internet,
MCAM07(252-261).
Springer DOI Link 0706
BibRef

Hu, C.Y.[Cheng-Yu], Liu, P.[Pengtao], Li, D.X.[Da-Xing],
A New Type of Proxy Ring Signature Scheme with Revocable Anonymity and No Info Leaked,
MCAM07(262-266).
Springer DOI Link 0706
BibRef

Chang, S.F.[Shih-Fu],
Blind Passive Media Forensics: Motivation and Opportunity,
MCAM07(57-59).
Springer DOI Link 0706
BibRef

Li, Q.M.[Qi-Ming], Memon, N.[Nasir],
Security Models of Digital Watermarking,
MCAM07(60-64).
Springer DOI Link 0706
BibRef

Jin, C.[Cong], Pan, L.G.[Liang-Gang], Su, T.[Ting],
A Blind Watermarking Scheme Based on Visual Model for Copyright Security,
MCAM07(454-463).
Springer DOI Link 0706
BibRef

Qin, C.[Chuan], Lee, W.B.[Wei-Bin], Zhang, X.P.[Xin-Peng], Wang, S.Z.[Shuo-Zhong],
Copyright Management Using Progressive Image Delivery, Visible Watermarking and Robust Fingerprinting,
ICARCV06(1-4).
IEEE DOI Link 0612
BibRef

Ni, J.Q.[Jiang-Qun], Zhang, R.Y.[Rong-Yue], Huang, J.W.[Ji-Wu], Wang, C.T.[Chun-Tao], Li, Q.B.[Quan-Bo],
A Rotation-Invariant Secure Image Watermarking Algorithm Incorporating Steerable Pyramid Transform,
DW06(446-460).
Springer DOI Link 0611
BibRef

Ye, S.M.[Shui-Ming], Sun, Q.[Qibin], Chang, E.C.[Ee-Chien],
Error Resilient Image Authentication Using Feature Statistical and Spatial Properties,
DW06(461-472).
Springer DOI Link 0611
BibRef

Lemma, A.[Aweke], Katzenbeisser, S.[Stefan], Celik, M.U.[Mehmet U.], van der Veen, M.[Michiel],
Secure Watermark Embedding Through Partial Encryption,
DW06(433-445).
Springer DOI Link 0611
BibRef

Kwon, G.R.[Goo-Rak], Lee, K.H.[Kwan-Hee], Nam, S.J.[Sang-Jae], Ko, S.J.[Sung-Jea],
Intellectual Property Rights Management Using Combination Encryption in MPEG-4,
DW06(188-196).
Springer DOI Link 0611
BibRef

Hsu, C.Y.[Chao-Yung], Lu, C.S.[Chun-Shien], Pei, S.C.[Soo-Chang],
Joint Screening Halftoning and Visual Cryptography for Image Protection,
DW06(212-225).
Springer DOI Link 0611
BibRef

Awrangjeb, M.[Mohammad], Murshed, M.,
Robust Signature-Based Geometric Invariant Copyright Protection,
ICIP06(1961-1964).
IEEE DOI Link 0610
BibRef

Akhshani, A., Mahmodi, H., Akhavan, A.,
A Novel Block Cipher Based on Hierarchy of One-Dimensional Composition Chaotic Maps,
ICIP06(1993-1996).
IEEE DOI Link 0610
BibRef

Cho, I.H.[Ik-Hwan], Cho, A.Y.[A-Young], Kim, H.K.[Hae-Kwang], Oh, W.G.[Weon-Geun], Jeong, D.S.[Dong-Seok],
Robust Visual Identifier for Cropped Natural Photos,
ACIVS06(933-943).
Springer DOI Link 0609
Actually not a watermark, analysis to detect cropping. BibRef

Hsu, C.S.[Ching-Sheng], Tu, S.F.[Shu-Fen], Hou, Y.C.[Young-Chang],
A Statistical Approach for Ownership Identification of Digital Images,
ACIVS06(666-674).
Springer DOI Link 0609
BibRef

Luo, W.Q.[Wei-Qi], Huang, J.W.[Ji-Wu], Qiu, G.P.[Guo-Ping],
A Novel Method for Block Size Forensics Based on Morphological Operations,
DW08(229-239).
Springer DOI Link 0811
BibRef
Earlier:
Robust Detection of Region-Duplication Forgery in Digital Image,
ICPR06(IV: 746-749).
IEEE DOI Link 0609
BibRef

Cheng, S., Wu, Q.A.[Qi-Ang], Castleman, K.R.,
Non-Ubiquitous Digital Watermarking for Record Indexing and Integrity Protection of Medical Images,
ICIP05(II: 1062-1065).
IEEE DOI Link 0512
BibRef

Doerr, G.J., Dugelay, J.L.,
A Countermeasure to Resist Block Replacement Attacks,
ICIP05(I: 965-968).
IEEE DOI Link 0512
BibRef

He, D.J.[Da-Jun], Sun, Q.[Qibin],
A Practical Print-Scan Resilient Watermarking Scheme,
ICIP05(I: 257-260).
IEEE DOI Link 0512
BibRef

Tzeng, J.N.[Jeng-Nan], Hwang, W.L.[Wen-Liang], Chern, I.L.[I-Liang],
An Asymmetric Watermarking Method for Copyright Protection Utilizing Dual Bases,
ICIP05(I: 269-272).
IEEE DOI Link 0512
BibRef

Harmanci, O., Monga, V., Mihcak, M.K.,
Geometrically Invariant Image Watermarking via Robust Perceptual Hashes,
ICIP06(1397-1400).
IEEE DOI Link 0610
BibRef

Mao, Y.N.[Yi-Nian], Mihcak, M.K.,
Collusion-Resistant Intentional De-Synchronization for Digital Video Fingerprinting,
ICIP05(I: 237-240).
IEEE DOI Link 0512
BibRef

Krawczyk, S.[Stephen], Jain, A.K.[Anil K.],
Securing Electronic Medical Records Using Biometric Authentication,
AVBPA05(1110).
Springer DOI Link 0509
BibRef

Monaci, G., Escoda, O.D., Vandergheynst, P.,
Analysis of Multimodal Signals Using Redundant Representations,
ICIP05(III: 145-148).
IEEE DOI Link 0512
BibRef

Yu, S.S.[Sheng-Sheng], Hu, Y.P.[Yu-Ping], Zhou, J.L.[Jing-Li],
Content-based watermarking scheme for image authentication,
ICARCV04(II: 1083-1087).
IEEE DOI Link 0412
BibRef

Jost, P., Vandergheynst, P., Frossard, P.,
Redundant image representations in security applications,
ICIP04(IV: 2151-2154).
IEEE DOI Link 0505
BibRef

Herley, C., Vora, P., Yang, S.,
Detection and deterrence of counterfeiting of valuable documents,
ICIP04(IV: 2423-2426).
IEEE DOI Link 0505
BibRef

Kim, H.Y.[Hae Yong],
A New Public-Key Authentication Watermarking for Binary Document Images Resistant to Parity Attacks,
ICIP05(II: 1074-1077).
IEEE DOI Link 0512
BibRef

Kim, H.Y.[Hae Yong], de Queiroz, R.L.,
A public-key authentication watermarking for binary images,
ICIP04(V: 3459-3462).
IEEE DOI Link 0505
BibRef

Pamboukian, S.V.D., Kim, H.Y.[Hae Yong], de Queiroz, R.L.,
Watermarking JBIG2 Text Region for Image Authentication,
ICIP05(II: 1078-1081).
IEEE DOI Link 0512
BibRef

Kim, H.Y.[Hae Yong], de Queiroz, R.L.[Ricardo Lopes],
Alteration-Locating Authentication Watermarking for Binary Images,
DW04(125-136).
WWW Version. 0505
BibRef

Patra, J.C., Ang, K.K.[Kah K.], Ang, E.L.[Ee-Luang],
Hierarchical multiple image watermarking for image authentication and ownership verification,
ICIP04(IV: 2661-2664).
IEEE DOI Link 0505
BibRef

Avcibas, I., Bayram, S., Memon, N., Ramkumar, M., Sankur, B.,
A classifier design for detecting image manipulations,
ICIP04(IV: 2645-2648).
IEEE DOI Link 0505
BibRef

Chao, J.H.[Jin-Hui], Suzuki, S., Kim, J.[Jongdae],
Copyright tracing using invariants of contents,
ICIP04(IV: 2183-2186).
IEEE DOI Link 0505
BibRef

Kim, W.G.[Won-Gyum], Suh, Y.H.[Young-Ho],
Short N-Secure Fingerprinting Code for Image,
ICIP04(IV: 2167-2170).
IEEE DOI Link 0505
BibRef

Vinod, P., Bora, P.K.,
A new algorithm for collusion resistant video watermarking,
ICIP04(III: 1581-1584).
IEEE DOI Link 0505
BibRef

Yao, Z.[Zhen], Rajpoot, N.M.,
Radon/ridgelet signature for image authentication,
ICIP04(I: 43-46).
IEEE DOI Link 0505
BibRef

Shaked, D., Baharav, Z., Levy, A., Yen, J., Saw, C.W.[Chit Wei],
Graphical Indicia,
ICIP03(I: 485-488).
IEEE Abstract. 0312
Authenticable graphical barcode. BibRef

Adelsbach, A.[André], Katzenbeisser, S.[Stefan], Sadeghi, A.R.[Ahmad-Reza],
On the Insecurity of Non-invertible Watermarking Schemes for Dispute Resolving,
DW03(355-369).
WWW Version. 0405
BibRef

Lu, C.S.[Chun-Shien], Hsu, C.Y.[Chao-Yong],
Content-Dependent Anti-disclosure Image Watermark,
DW03(61-76).
WWW Version. 0405
BibRef

Johnson, M.[Mark], Ramchandran, K.,
Dither-based secure image hashing using distributed coding,
ICIP03(II: 751-754).
IEEE Abstract. 0312
BibRef

Lefebvre, F., Czyz, J., Macq, B.,
A robust soft hash algorithm for digital image signature,
ICIP03(II: 495-498).
IEEE Abstract. 0312
BibRef

Lee, S.K.[Sang-Kwang], Suh, Y.H.[Young-Ho], Ho, Y.S.[Yo-Sung],
Public Key Watermarking for Reversible Image Authentication,
ICIP06(1409-1412).
IEEE DOI Link 0610
BibRef

Sagetong, P., Zhou, W.S.[Wen-Sheng],
Dynamic wavelet feature-based watermarking for copyright tracking in digital movie distribution systems,
ICIP02(III: 653-656).
IEEE DOI Link 0210
BibRef

Aguzzi, M.[Marco], Albanesi, M.G.[Maria Grazia], Ferretti, M.[Marco],
A Novel Watermarking Algorithm for Image Authentication: Robustness Against Common Attacks and JPEG2000 Compression,
CIAP05(559-567).
Springer DOI Link 0509
BibRef

Albanesi, M.G., Ferretti, M., Guerrini, F.,
A taxonomy for image authentication techniques and its application to the current state of the art,
CIAP01(535-540).
IEEE Top Reference. 0210
BibRef

Yu, G.J.,
Mean Quantization Blind Watermarking for Image Authentication,
ICIP00(Vol III: 706-709).
IEEE DOI Link 0008
BibRef

Herley, C.,
Securing Images Online: A Protection Mechanism That Does Not Involve Watermarking,
ICIP00(Vol III: 660-663).
IEEE DOI Link 0008
BibRef

Hel-Or, H.,
Copyright Labeling of Printed Images,
ICIP00(Vol III: 702-705).
IEEE DOI Link 0008
BibRef

Tsekeridou, S., Nikolaidis, N.D., Sidiropoulos, N.D., Pitas, I.,
Copyright Protection of Still Images Using Self-similar Chaotic Watermarks,
ICIP00(Vol I: 411-414).
IEEE DOI Link 0008
BibRef

O'Ruanaidh, J.J.K.[Joseph J.K.], Csurka, G.[Gabriella],
A Bayesian Approach to Spread Spectrum Watermark Detection and Secure Copyright Protection for Digital Image Libraries,
CVPR99(I: 207-212).
IEEE DOI Link BibRef 9900

Ratakonda, K., Dugad, R., Ahuja, N.,
Digital image watermarking: issues in resolving rightful ownership,
ICIP98(II: 414-418).
IEEE DOI Link 9810
BibRef

Dugad, R., Ratakonda, K., Ahuja, N.,
A new wavelet-based scheme for watermarking images,
ICIP98(II: 419-423).
IEEE DOI Link 9810
BibRef

Braudaway, G.,
Protecting Publicly Available Images with an Invisible Image Watermark,
ICIP97(I: 524-527).
IEEE DOI Link BibRef 9700

Zeng, W., and Liu, B.,
On Resolving Rightful Ownerships of Digital Images by Invisible Watermarks,
ICIP97(I: 552-555).
IEEE DOI Link 9710
BibRef

Yeung, M., and Mintzer, F.,
An Invisible Watermarking Technique for Image Verification,
ICIP97(II: 680-683).
IEEE DOI Link BibRef 9700

Pitas, I.,
A method for signature casting on digital images,
ICIP96(III: 215-218).
IEEE DOI Link 9610
BibRef

Schneider, M., Chang, S.F.[Shih-Fu],
A robust content based digital signature for image authentication,
ICIP96(III: 227-230).
IEEE DOI Link 9610
BibRef

Chapter on OCR, Document Analysis and Character Recognition Systems continues in
Tamper Detection .


Last update:Oct 15, 2014 at 21:10:33