180 related articles for article (PubMed ID: 18267429)
1. A statistical watermark detection technique without using original images for resolving rightful ownerships of digital images.
Zeng W; Liu B
IEEE Trans Image Process; 1999; 8(11):1534-48. PubMed ID: 18267429
[TBL] [Abstract][Full Text] [Related]
2. DCT-domain watermarking techniques for still images: detector performance analysis and a new structure.
Hernández JR; Amado M; Pérez-González F
IEEE Trans Image Process; 2000; 9(1):55-68. PubMed ID: 18255372
[TBL] [Abstract][Full Text] [Related]
3. Secret and public key image watermarking schemes for image authentication and ownership verification.
Wong PW; Memon N
IEEE Trans Image Process; 2001; 10(10):1593-601. PubMed ID: 18255501
[TBL] [Abstract][Full Text] [Related]
4. A buyer-seller watermarking protocol.
Memon N; Wong PW
IEEE Trans Image Process; 2001; 10(4):643-9. PubMed ID: 18249653
[TBL] [Abstract][Full Text] [Related]
5. Robust copyright protection using multiple ownership watermarks.
Li XW; Lee IK
Opt Express; 2015 Feb; 23(3):3035-46. PubMed ID: 25836164
[TBL] [Abstract][Full Text] [Related]
6. A wavelet-based watermarking algorithm for ownership verification of digital images.
Wang Y; Doherty JF; Van Dyck RE
IEEE Trans Image Process; 2002; 11(2):77-88. PubMed ID: 18244614
[TBL] [Abstract][Full Text] [Related]
7. Enhancing image watermarking methods with/without reference images by optimization on second-order statistics.
Tzeng J; Hwang WL; Chern IL
IEEE Trans Image Process; 2002; 11(7):771-82. PubMed ID: 18244673
[TBL] [Abstract][Full Text] [Related]
8. A robust semi-fragile watermarking system using Pseudo-Zernike moments and dual tree complex wavelet transform for social media content authentication.
Agilandeeswari L; Prabukumar M; Alenizi FA
Multimed Tools Appl; 2023 Apr; ():1-53. PubMed ID: 37362657
[TBL] [Abstract][Full Text] [Related]
9. Hidden digital watermarks in images.
Hsu CT; Wu JL
IEEE Trans Image Process; 1999; 8(1):58-68. PubMed ID: 18262865
[TBL] [Abstract][Full Text] [Related]
10. Circularly symmetric watermark embedding in 2-D DFT domain.
Solachidis V; Pitas L
IEEE Trans Image Process; 2001; 10(11):1741-53. PubMed ID: 18255515
[TBL] [Abstract][Full Text] [Related]
11. A perceptually tuned watermarking scheme for color images.
Chou CH; Liu KC
IEEE Trans Image Process; 2010 Nov; 19(11):2966-82. PubMed ID: 20529748
[TBL] [Abstract][Full Text] [Related]
12. Watermark Compression in Medical Image Watermarking Using Lempel-Ziv-Welch (LZW) Lossless Compression Technique.
Badshah G; Liew SC; Zain JM; Ali M
J Digit Imaging; 2016 Apr; 29(2):216-25. PubMed ID: 26429361
[TBL] [Abstract][Full Text] [Related]
13. Hologram-based watermarking capable of surviving print-scan process.
Wang S; Huang S; Zhang X; Wu W
Appl Opt; 2010 Mar; 49(7):1170-8. PubMed ID: 20197815
[TBL] [Abstract][Full Text] [Related]
14. Rotation, scale, and translation resilient watermarking for images.
Lin CY; Wu M; Bloom JA; Cox IJ; Miller ML; Lui YM
IEEE Trans Image Process; 2001; 10(5):767-82. PubMed ID: 18249666
[TBL] [Abstract][Full Text] [Related]
15. Geometrically invariant watermarking using feature points.
Bas P; Chassery JM; Macq B
IEEE Trans Image Process; 2002; 11(9):1014-28. PubMed ID: 18249723
[TBL] [Abstract][Full Text] [Related]
16. Imperceptible reversible watermarking of radiographic images based on quantum noise masking.
Pan W; Bouslimi D; Karasad M; Cozic M; Coatrieux G
Comput Methods Programs Biomed; 2018 Jul; 160():119-128. PubMed ID: 29728239
[TBL] [Abstract][Full Text] [Related]
17. Robust image watermarking scheme against geometric attacks using a computer-generated hologram.
Li J
Appl Opt; 2010 Nov; 49(32):6302-12. PubMed ID: 21068862
[TBL] [Abstract][Full Text] [Related]
18. A class of authentication digital watermarks for secure multimedia communication.
Xie L; Arce GR
IEEE Trans Image Process; 2001; 10(11):1754-64. PubMed ID: 18255516
[TBL] [Abstract][Full Text] [Related]
19. A vision-based masking model for spread-spectrum image watermarking.
Kutter M; Winkler S
IEEE Trans Image Process; 2002; 11(1):16-25. PubMed ID: 18244609
[TBL] [Abstract][Full Text] [Related]
20. Pinpoint authentication watermarking based on a chaotic system.
Ni R; Ruan Q; Zhao Y
Forensic Sci Int; 2008 Jul; 179(1):54-62. PubMed ID: 18541396
[TBL] [Abstract][Full Text] [Related]
[Next] [New Search]