Toward a robust image authentication method surviving JPEG lossy compression

被引:0
|
作者
Department of Computer Science, Hsuan Chuang University, Hsinchu, 300, Taiwan [1 ]
机构
来源
J. Inf. Sci. Eng. | 2007年 / 2卷 / 511-524期
关键词
D O I
暂无
中图分类号
学科分类号
摘要
引用
收藏
相关论文
共 50 条
  • [1] Toward a robust image authentication method surviving JPEG lossy compression
    Chen, Chien-Chang
    Lin, Cheng-Shian
    JOURNAL OF INFORMATION SCIENCE AND ENGINEERING, 2007, 23 (02) : 511 - 524
  • [2] A robust image authentication method surviving JPEG lossy compression
    Lin, CY
    Chang, SF
    STORAGE AND RETRIEVAL FOR IMAGE AND VIDEO DATABASES VI, 1997, 3312 : 296 - 307
  • [3] Bi-level image watermiarking for image authentication surviving JPEG lossy compression
    Patra, JC
    Tan, CH
    Ang, EL
    ICIP: 2004 INTERNATIONAL CONFERENCE ON IMAGE PROCESSING, VOLS 1- 5, 2004, : 713 - 716
  • [4] Adversarial robust image steganography against lossy JPEG compression
    Liu, Minglin
    Fan, Hangyu
    Wei, Kangkang
    Luo, Weiqi
    Lu, Wei
    SIGNAL PROCESSING, 2022, 200
  • [5] A robust image authentication method distinguishing JPEG compression from malicious manipulation
    Lin, CY
    Chang, SF
    IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY, 2001, 11 (02) : 153 - 168
  • [6] Watermarking-based image authentication robust to JPEG compression
    Preda, R. O.
    Vizireanu, D. N.
    ELECTRONICS LETTERS, 2015, 51 (23) : 1873 - 1874
  • [7] Comparison on accuracy of image matching between lossy JPEG compression and lossy JPEG 2000 compression
    Matsuoka, Ryuji
    Sone, Mitsuo
    Sudo, Noboru
    Yokotsuka, Hideyo
    Shirai, Naoki
    IMAGE AND SIGNAL PROCESSING FOR REMOTE SENSING XIX, 2013, 8892
  • [8] A Hybrid Image Authentication Method Robust To Jpeg Attacks
    Gencturk, Beste
    Nabiyev, Vasif
    Ulutas, Guzin
    Ulutas, Mustafa
    2014 22ND SIGNAL PROCESSING AND COMMUNICATIONS APPLICATIONS CONFERENCE (SIU), 2014, : 1596 - 1599
  • [9] A robust image authentication method surviving acceptable modifications
    Kim, MA
    Song, GS
    Lee, WH
    COMPUTATIONAL SCIENCE AND ITS APPLICATIONS - ICCSA 2004, PT 1, 2004, 3043 : 722 - 727
  • [10] RIHNet: A Robust Image Hiding Method for JPEG Compression
    Jin, Xin
    Cheng, Zien
    Jiang, Qian
    Wei, Ping
    Dong, Yunyun
    Wu, Liwen
    Miao, Shengfa
    ADVANCED INTELLIGENT COMPUTING TECHNOLOGY AND APPLICATIONS, PT X, ICIC 2024, 2024, 14871 : 29 - 42