These tools will no longer be maintained as of December 31, 2024. Archived website can be found here. PubMed4Hh GitHub repository can be found here. Contact NLM Customer Service if you have questions.
246 related articles for article (PubMed ID: 16238064)
1. Ergodic chaotic parameter modulation with application to digital image watermarking. Chen S; Leung H IEEE Trans Image Process; 2005 Oct; 14(10):1590-602. PubMed ID: 16238064 [TBL] [Abstract][Full Text] [Related]
2. Robust image watermarking based on multiband wavelets and empirical mode decomposition. Bi N; Sun Q; Huang D; Yang Z; Huang J IEEE Trans Image Process; 2007 Aug; 16(8):1956-66. PubMed ID: 17688201 [TBL] [Abstract][Full Text] [Related]
3. Multiscale fragile watermarking based on the Gaussian mixture model. Yuan H; Zhang XP IEEE Trans Image Process; 2006 Oct; 15(10):3189-200. PubMed ID: 17022280 [TBL] [Abstract][Full Text] [Related]
4. Wavelet tree quantization for copyright protection watermarking. Wang SH; Lin YP IEEE Trans Image Process; 2004 Feb; 13(2):154-65. PubMed ID: 15376937 [TBL] [Abstract][Full Text] [Related]
5. Analysis and design of watermarking algorithms for improved resistance to compression. Fei C; Kundur D; Kwong RH IEEE Trans Image Process; 2004 Feb; 13(2):126-44. PubMed ID: 15376935 [TBL] [Abstract][Full Text] [Related]
6. Design and statistical analysis of a hash-aided image watermarking system. Cannons J; Moulin P IEEE Trans Image Process; 2004 Oct; 13(10):1393-408. PubMed ID: 15462148 [TBL] [Abstract][Full Text] [Related]
7. Multipurpose image watermarking algorithm based on multistage vector quantization. Lu ZM; Xu DG; Sun SH IEEE Trans Image Process; 2005 Jun; 14(6):822-31. PubMed ID: 15971780 [TBL] [Abstract][Full Text] [Related]
8. An optimal detector structure for the fourier descriptors domain watermarking of 2D vector graphics. Doncel VR; Nikolaidis N; Pitas I IEEE Trans Vis Comput Graph; 2007; 13(5):851-63. PubMed ID: 17622672 [TBL] [Abstract][Full Text] [Related]
10. Blind MPEG-2 video watermarking robust against geometric attacks: a set of approaches in DCT domain. Wang Y; Pearmain A IEEE Trans Image Process; 2006 Jun; 15(6):1536-43. PubMed ID: 16764278 [TBL] [Abstract][Full Text] [Related]
11. A comment on "Asymptotically optimal detection for additive watermarking in the DCT AND DWT domains". Nadarajah S; Kotz S IEEE Trans Image Process; 2007 Apr; 16(4):1182-3. PubMed ID: 17405447 [TBL] [Abstract][Full Text] [Related]
12. Forensic analysis of nonlinear collusion attacks for multimedia fingerprinting. Zhao HV; Wu M; Wang ZJ; Liu KJ IEEE Trans Image Process; 2005 May; 14(5):646-61. PubMed ID: 15887559 [TBL] [Abstract][Full Text] [Related]