Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
17 | Alexander Becher, Zinaida Benenson, Maximillian Dornseif |
Tampering with Motes: Real-World Physical Attacks on Wireless Sensor Networks. |
SPC |
2006 |
DBLP DOI BibTeX RDF |
|
17 | Alexander Becher, Zinaida Benenson, Maximillian Dornseif |
Tampering with Motes: Real-World Attacks on Wireless Sensor Networks. |
Sicherheit |
2006 |
DBLP BibTeX RDF |
|
17 | Gilbert L. Peterson |
Forensic Analysis of Digital Image Tampering. |
IFIP Int. Conf. Digital Forensics |
2005 |
DBLP BibTeX RDF |
|
17 | Ronald F. DeMara, Adam J. Rocke |
Mitigation of network tampering using dynamic dispatch of mobile agents. |
Comput. Secur. |
2004 |
DBLP DOI BibTeX RDF |
|
17 | Rosario Gennaro, Anna Lysyanskaya, Tal Malkin, Silvio Micali, Tal Rabin |
Algorithmic Tamper-Proof (ATP) Security: Theoretical Foundations for Security against Hardware Tampering. |
TCC |
2004 |
DBLP DOI BibTeX RDF |
|
17 | Frédéric Deguillaume, Sviatoslav Voloshynovskiy, Thierry Pun |
Secure hybrid robust watermarking resistant against tampering and copy attack. |
Signal Process. |
2003 |
DBLP DOI BibTeX RDF |
|
17 | Gleb Naumovich, Nasir D. Memon |
Preventing Piracy, Reverse Engineering, and Tampering. |
Computer |
2003 |
DBLP DOI BibTeX RDF |
|
17 | Jun Yang 0002, Youtao Zhang, Lan Gao |
Fast Secure Processor for Inhibiting Software Piracy and Tampering. |
MICRO |
2003 |
DBLP DOI BibTeX RDF |
|
17 | Mario Blaum, Jehoshua Bruck, Kurt Rubin, Wilfried Lenth |
A Coding Approach for Detection of Tampering in Write-Once Optical Disks. |
IEEE Trans. Computers |
1998 |
DBLP DOI BibTeX RDF |
|
17 | Ingemar J. Cox, Jean-Paul M. G. Linnartz |
Some general methods for tampering with watermarks. |
IEEE J. Sel. Areas Commun. |
1998 |
DBLP DOI BibTeX RDF |
|
17 | Massimo Cotrozzi, David Vincenzetti |
ATP - Anti-Tampering Program. |
USENIX Security Symposium |
1993 |
DBLP BibTeX RDF |
|
17 | Yvo Desmedt, Jean-Jacques Quisquater |
Public-Key Systems Based on the Difficulty of Tampering (Is There a Difference Between DES and RSA?). |
CRYPTO |
1986 |
DBLP DOI BibTeX RDF |
|
17 | Subhash C. Kak |
How to Detect Tampering of Data. |
Inf. Process. Lett. |
1985 |
DBLP DOI BibTeX RDF |
|
11 | N. V. Narendra Kumar, Harshit J. Shah, R. K. Shyamasundar |
Can we certify systems for freedom from malware. |
ICSE (2) |
2010 |
DBLP DOI BibTeX RDF |
|
11 | Ruirui C. Huang, G. Edward Suh |
IVEC: off-chip memory integrity protection for both security and reliability. |
ISCA |
2010 |
DBLP DOI BibTeX RDF |
security, fault tolerance, reliability, error detection, error correction, memory systems |
11 | Chin-Feng Lee, Kuo-Nan Chen, Chin-Chen Chang 0001, Meng-Cheng Tsai |
A Block Feature Correlation Based Image Watermarking for Tamper Detection Using Linear Equation. |
IAS |
2009 |
DBLP DOI BibTeX RDF |
|
11 | Weiping Wang 0003, Jinhong Xu, Jianxin Wang 0001 |
Detection and location of malicious nodes based on source coding and multi-path transmission in WSN. |
HPCC |
2009 |
DBLP DOI BibTeX RDF |
|
11 | Mengqi Zeng, Dawu Gu, Fangyong Hou, Yuanyuan Zhang 0002, Tao Cheng |
Design and Implementation of Self-securing Disk. |
NAS |
2009 |
DBLP DOI BibTeX RDF |
|
11 | Shucai Xiao, Jung-Min Park 0001, Yanzhu Ye |
Tamper Resistance for Software Defined Radio Software. |
COMPSAC (1) |
2009 |
DBLP DOI BibTeX RDF |
|
11 | David J. Boyd |
TLS client handshake with a payment card. |
IPDPS |
2009 |
DBLP DOI BibTeX RDF |
|
11 | Levente Kovács, Ákos Utasi, Zoltán Szlávik, Laszlo Havasi, István Petrás, Tamás Szirányi |
Digital Video Event Detector Framework for Surveillance Applications. |
AVSS |
2009 |
DBLP DOI BibTeX RDF |
|
11 | Tong Liu, Jiya Jiang, Ying Li |
Research on File Content Tamper-proofing System for Distribution Environment. |
WKDD |
2009 |
DBLP DOI BibTeX RDF |
|
11 | Vasily Desnitsky, Igor V. Kotenko |
Design of Entrusting Protocols for Software Protection. |
IF&GIS |
2009 |
DBLP DOI BibTeX RDF |
Security protocol design, Remote entrusting, Protocol analysis and verification, Attacks, Software protection |
11 | Nils Ole Tippenhauer, Kasper Bonne Rasmussen, Christina Pöpper, Srdjan Capkun |
Attacks on public WLAN-based positioning systems. |
MobiSys |
2009 |
DBLP DOI BibTeX RDF |
localization attacks, public wlan localization |
11 | Dan Boneh, David Mandell Freeman, Jonathan Katz, Brent Waters |
Signing a Linear Subspace: Signature Schemes for Network Coding. |
Public Key Cryptography |
2009 |
DBLP DOI BibTeX RDF |
|
11 | Mariusz H. Jakubowski, Chit Wei Saw, Ramarathnam Venkatesan |
Tamper-Tolerant Software: Modeling and Implementation. |
IWSEC |
2009 |
DBLP DOI BibTeX RDF |
|
11 | Sascha Zmudzinski, Martin Steinebach |
Perception-Based Audio Authentication Watermarking in the Time-Frequency Domain. |
Information Hiding |
2009 |
DBLP DOI BibTeX RDF |
|
11 | Mainak Banga, Michael S. Hsiao |
A Novel Sustained Vector Technique for the Detection of Hardware Trojans. |
VLSI Design |
2009 |
DBLP DOI BibTeX RDF |
|
11 | Rajat Subhra Chakraborty, Francis G. Wolff, Somnath Paul, Christos A. Papachristou, Swarup Bhunia |
MERO: A Statistical Approach for Hardware Trojan Detection. |
CHES |
2009 |
DBLP DOI BibTeX RDF |
|
11 | Oly Mistry, Anil Gürsel, Sandip Sen |
Comparing trust mechanisms for monitoring aggregator nodes in sensor networks. |
AAMAS (2) |
2009 |
DBLP BibTeX RDF |
sensor networks, learning, data integrity, reputation |
11 | Saraju P. Mohanty, Bharat K. Bhargava |
Invisible watermarking based on creation and robust insertion-extraction of image adaptive watermarks. |
ACM Trans. Multim. Comput. Commun. Appl. |
2008 |
DBLP DOI BibTeX RDF |
invisible watermarking, Watermarking, image, copyright protection, content protection |
11 | Luc Bouganim, François Dang Ngoc, Philippe Pucheral |
Dynamic access-control policies on XML encrypted data. |
ACM Trans. Inf. Syst. Secur. |
2008 |
DBLP DOI BibTeX RDF |
ubiquitous data management, Access-control, smartcard, data confidentiality |
11 | Katharine Chang, Kang G. Shin |
Distributed Authentication of Program Integrity Verification in Wireless Sensor Networks. |
ACM Trans. Inf. Syst. Secur. |
2008 |
DBLP DOI BibTeX RDF |
Distributed authentication, node revocation, program integrity verification, wireless sensor networks |
11 | Alan Shieh, Andrew C. Myers, Emin Gün Sirer |
A stateless approach to connection-oriented protocols. |
ACM Trans. Comput. Syst. |
2008 |
DBLP DOI BibTeX RDF |
Stateless interfaces, stateless protocols |
11 | Jing-Ming Guo, Soo-Chang Pei, Hua Lee |
Paired Subimage Matching Watermarking Method on Ordered Dither Images and Its High-Quality Progressive Coding. |
IEEE Trans. Multim. |
2008 |
DBLP DOI BibTeX RDF |
|
11 | Ashwin Swaminathan, Min Wu 0001, K. J. Ray Liu |
Digital Image Forensics via Intrinsic Fingerprints. |
IEEE Trans. Inf. Forensics Secur. |
2008 |
DBLP DOI BibTeX RDF |
|
11 | Pedram Hayati, Nastaran Jafari, S. Mohammad Rezaei, Saeed Sarencheh, Vidyasagar M. Potdar |
Modeling Input Validation in UML. |
Australian Software Engineering Conference |
2008 |
DBLP DOI BibTeX RDF |
Software engineering, Unified Modeling Language, Object Constraint Language, Software security, Input validation |
11 | Sufyan Ababneh, Rashid Ansari, Ashfaq A. Khokhar |
Scalable multimedia-content integrity verification with robust hashing. |
EIT |
2008 |
DBLP DOI BibTeX RDF |
|
11 | Kees Goossens, Martijn T. Bennebroek, Jae Young Hur, Muhammad Aqeel Wahlah |
Hardwired Networks on Chip in FPGAs to Unify Functional and Con?guration Interconnects. |
NOCS |
2008 |
DBLP DOI BibTeX RDF |
|
11 | Vassilis E. Fotopoulos, Maria L. Stavrinou, Athanassios N. Skodras |
Medical image authentication and self-correction through an adaptive reversible watermarking technique. |
BIBE |
2008 |
DBLP DOI BibTeX RDF |
|
11 | Brian Rogers, Chenyu Yan, Siddhartha Chhabra, Milos Prvulovic, Yan Solihin |
Single-level integrity and confidentiality protection for distributed shared memory multiprocessors. |
HPCA |
2008 |
DBLP DOI BibTeX RDF |
|
11 | David P. Varodayan, Yao-Chung Lin, Bernd Girod |
Audio authentication based on distributed source coding. |
ICASSP |
2008 |
DBLP DOI BibTeX RDF |
|
11 | Mohaned Juwad, Hamed S. Al-Raweshidy |
Experimental Performance Comparisons between SAODV & AODV. |
Asia International Conference on Modelling and Simulation |
2008 |
DBLP DOI BibTeX RDF |
SAODV, Security, Routing protocols, AODV, test-bed |
11 | Navya Sidharth, Jigang Liu |
Intrusion Resistant SOAP Messaging with IAPF. |
APSCC |
2008 |
DBLP DOI BibTeX RDF |
|
11 | Li Li 0008, Guosun Zeng, Bo Chen |
Trusted Transmission Protocol for Content Security. |
ICYCS |
2008 |
DBLP DOI BibTeX RDF |
|
11 | Dongyan Liu, Wenbo Liu 0001, Gong Zhang 0002 |
An Adaptive Watermarking Scheme Based on Nonsubsampled Contourlet Transform for Color Image Authentication. |
ICYCS |
2008 |
DBLP DOI BibTeX RDF |
|
11 | Maher Ragheb Aburrous, M. Alamgir Hossain, Fadi A. Thabtah, Keshav P. Dahal |
Intelligent Quality Performance Assessment for E-Banking Security using Fuzzy Logic. |
ITNG |
2008 |
DBLP DOI BibTeX RDF |
Direct Internal Attack, Security, Fuzzy Logic, Quality Assessment, E-Banking |
11 | Zhen Zhang, Ying Zhou, Jiquan Kang, Yuan Ren |
Study of Image Splicing Detection. |
ICIC (1) |
2008 |
DBLP DOI BibTeX RDF |
Image splicing detection, Passive-blind forensics, Image quality metrics (IQMs), Image feature, Digital image forensics |
11 | Tobias Heer, Stefan Götz 0001, Oscar García Morchon, Klaus Wehrle |
ALPHA: an adaptive and lightweight protocol for hop-by-hop authentication. |
CoNEXT |
2008 |
DBLP DOI BibTeX RDF |
integrity protection, authentication, hash chains |
11 | Clifford Liem, Yuan Xiang Gu, Harold Johnson |
A compiler-based infrastructure for software-protection. |
PLAS |
2008 |
DBLP DOI BibTeX RDF |
compiler-based techniques, software protection, tamper resistance, code transformation |
11 | Sascha Zmudzinski, Martin Steinebach |
Psycho-acoustic model-based message authentication coding for audio data. |
MM&Sec |
2008 |
DBLP DOI BibTeX RDF |
authentication watermarking, psycho-acoustic modelling, audio fingerprinting, perceptual hash, robust hash |
11 | Nauman Mazhar, Muddassar Farooq |
A sense of danger: dendritic cells inspired artificial immune system for manet security. |
GECCO |
2008 |
DBLP DOI BibTeX RDF |
misbehavior detection, mobile ad hoc networks, self organization, artificial immune systems, dendritic cells |
11 | Ronald Cramer, Yevgeniy Dodis, Serge Fehr, Carles Padró, Daniel Wichs |
Detection of Algebraic Manipulation with Applications to Robust Secret Sharing and Fuzzy Extractors. |
EUROCRYPT |
2008 |
DBLP DOI BibTeX RDF |
|
11 | Matthias Jacob, Mariusz H. Jakubowski, Prasad Naldurg, Chit Wei Saw, Ramarathnam Venkatesan |
The Superdiversifier: Peephole Individualization for Software Protection. |
IWSEC |
2008 |
DBLP DOI BibTeX RDF |
|
11 | Patrick P. Tsang, Sean W. Smith |
Secure Cryptographic Precomputation with Insecure Memory. |
ISPEC |
2008 |
DBLP DOI BibTeX RDF |
|
11 | Jan Cappaert, Bart Preneel, Bertrand Anckaert, Matias Madou, Koen De Bosschere |
Towards Tamper Resistant Code Encryption: Practice and Experience. |
ISPEC |
2008 |
DBLP DOI BibTeX RDF |
|
11 | Ge Xiuhui, Tian Hao |
Research on Application of Immune Digital Watermark Algorithm. |
CSSE (3) |
2008 |
DBLP DOI BibTeX RDF |
|
11 | XiaoBing Kang, ShengMin Wei |
Identifying Tampered Regions Using Singular Value Decomposition in Digital Image Forensics. |
CSSE (3) |
2008 |
DBLP DOI BibTeX RDF |
|
11 | Dong Zhou, Hiroshi Inamura |
Towards Trustworthy and Secure Kiosk Computing for Mobile Users. |
EUC (2) |
2008 |
DBLP DOI BibTeX RDF |
|
11 | Mainak Banga, Maheshwar Chandrasekar, Lei Fang 0002, Michael S. Hsiao |
Guided test generation for isolation and detection of embedded trojans in ics. |
ACM Great Lakes Symposium on VLSI |
2008 |
DBLP DOI BibTeX RDF |
trojan |
11 | Jarrod A. Roy, Farinaz Koushanfar, Igor L. Markov |
Circuit CAD Tools as a Security Threat. |
HOST |
2008 |
DBLP DOI BibTeX RDF |
|
11 | Mainak Banga, Michael S. Hsiao |
A Region Based Approach for the Identification of Hardware Trojans. |
HOST |
2008 |
DBLP DOI BibTeX RDF |
|
11 | Chu-Hsing Lin, Wei-Shen Lai, Yen-Lin Huang, Mei-Chun Chou |
I-SEAD: A Secure Routing Protocol for Mobile Ad Hoc Networks. |
MUE |
2008 |
DBLP DOI BibTeX RDF |
SEAD, I-SEAD protocol, Ad hoc networks, simulation experiments, secure routing protocol |
11 | Saar Drimer, Steven J. Murdoch, Ross J. Anderson |
Thinking Inside the Box: System-Level Failures of Tamper Proofing. |
SP |
2008 |
DBLP DOI BibTeX RDF |
Chip and PIN, PIN entry devices, certification, incentives, smartcard, banking, tamper resistance, common criteria, EMV |
11 | Wen-Chao Yang, Che-Yen Wen, Chung-Hao Chen |
Applying Public-Key Watermarking Techniques in Forensic Imaging to Preserve the Authenticity of the Evidence. |
ISI Workshops |
2008 |
DBLP DOI BibTeX RDF |
Integrity, Public-key Cryptography, Digital Image, Credibility, Digital Image Forensic |
11 | Xianfeng Zhao, Ning Li |
Reversible Watermarking with Subliminal Channel. |
Information Hiding |
2008 |
DBLP DOI BibTeX RDF |
|
11 | Niladri B. Puhan, Anthony T. S. Ho |
Secure authentication watermarking for localization against the Holliman-Memon attack. |
Multim. Syst. |
2007 |
DBLP DOI BibTeX RDF |
Fragile authentication, Holliman-Memon attack, Authenticity score, Security, Localization, Digital watermarking |
11 | Yong-Dong Zhang 0001, Sheng Tang, Jin-Tao Li 0001 |
Secure and Incidental Distortion Tolerant Digital Signature for Image Authentication. |
J. Comput. Sci. Technol. |
2007 |
DBLP DOI BibTeX RDF |
PCA (Principal Component Analysis), Hotelling’s T-square statistic, digital signature, image authentication |
11 | Pradeep K. Atrey, Wei-Qi Yan 0001, Mohan S. Kankanhalli |
A scalable signature scheme for video authentication. |
Multim. Tools Appl. |
2007 |
DBLP DOI BibTeX RDF |
Video authentication, Authentication signature, Secret sharing, Digital video |
11 | Jin-Ha Kim, Gyu Sang Choi, Chita R. Das |
An SSL Back-End Forwarding Scheme in Cluster-Based Web Servers. |
IEEE Trans. Parallel Distributed Syst. |
2007 |
DBLP DOI BibTeX RDF |
application server layer, cluster, Web servers, load distribution, user-level communication, Secure Sockets Layer |
11 | Nishkam Ravi, Chandra Narayanaswami, Mandayam T. Raghunath, Marcel-Catalin Rosu |
Securing Pocket Hard Drives. |
IEEE Pervasive Comput. |
2007 |
DBLP DOI BibTeX RDF |
portable storage device, security, mobile computing |
11 | Miao Yu, Hongjie He, Jiashu Zhang |
A digital authentication watermarking scheme for JPEG images with superior localization and security. |
Sci. China Ser. F Inf. Sci. |
2007 |
DBLP DOI BibTeX RDF |
localization accuracy, collage attack, fragile watermarking, JPEG compression |
11 | Micah K. Johnson, Hany Farid |
Exposing Digital Forgeries in Complex Lighting Environments. |
IEEE Trans. Inf. Forensics Secur. |
2007 |
DBLP DOI BibTeX RDF |
|
11 | Weiqi Luo 0001, Zhenhua Qu, Feng Pan, Jiwu Huang |
A survey of passive technology for digital image forensics. |
Frontiers Comput. Sci. China |
2007 |
DBLP DOI BibTeX RDF |
passive/blind forensics, pattern recognition, watermarking, statistics analysis, image authentication |
11 | Marco Bucci, Luca Giancane, Raimondo Luzzi, Alessandro Trifiletti |
A Dynamic and Differential CMOS Lookup Table with Data-Independent Power Consumption for Cryptographic Applications on Chip Cards. |
IEEE Trans. Dependable Secur. Comput. |
2007 |
DBLP DOI BibTeX RDF |
differential logic, dual rail logic, chip-cards, cryptography, differential power analysis, DPA, power analysis |
11 | Yagiz Sutcu, Baris Coskun, Husrev T. Sencar, Nasir D. Memon |
Tamper Detection Based on Regularity of Wavelet Transform Coefficients. |
ICIP (1) |
2007 |
DBLP DOI BibTeX RDF |
|
11 | Erik-Oliver Blaß, Benjamin Fabian, Matthias Fischmann, Seda F. Gürses |
Security. |
Algorithms for Sensor and Ad Hoc Networks |
2007 |
DBLP DOI BibTeX RDF |
|
11 | Yan Zhu 0010, Chang-Tsun Li, Hong-Jia Zhao |
Structural Digital Signature and Semi-Fragile Fingerprinting for Image Authentication in Wavelet Domain. |
IAS |
2007 |
DBLP DOI BibTeX RDF |
|
11 | Babak Mahdian, Stanislav Saic |
On Periodic Properties of Interpolation and Their Application To Image Authentication. |
IAS |
2007 |
DBLP DOI BibTeX RDF |
|
11 | Jaap-Henk Hoepman, Andreas Larsson, Elad Michael Schiller, Philippas Tsigas |
Secure and Self-stabilizing Clock Synchronization in Sensor Networks. |
SSS |
2007 |
DBLP DOI BibTeX RDF |
Secure and Resilient Computer Systems, Sensor-Network Systems, Self-Stabilization, Clock-synchronization |
11 | Bin Zhao, Lanjun Dang, Weidong Kou, Jun Zhang 0010, Zan Li, Kai Fan 0001 |
A Watermarking Scheme in the Encrypted Domain for Watermarking Protocol. |
Inscrypt |
2007 |
DBLP DOI BibTeX RDF |
|
11 | John E. Hopcroft, Daniel Sheldon |
Manipulation-Resistant Reputations Using Hitting Time. |
WAW |
2007 |
DBLP DOI BibTeX RDF |
|
11 | Melek Önen, Refik Molva |
Secure Data Aggregation with Multiple Encryption. |
EWSN |
2007 |
DBLP DOI BibTeX RDF |
|
11 | Yuxuan Meng, Bo Meng |
A Digital Signature Scheme in Web-based Negotiation Support System. |
I3E (1) |
2007 |
DBLP DOI BibTeX RDF |
|
11 | Kun Wang, Meng Wu, Pengrui Xia, Subin Shen |
An Incentive-Based Secure Charging Scheme for Integrating Networks. |
CSCWD (Selected Papers) |
2007 |
DBLP DOI BibTeX RDF |
MANET (Ad Hoc), security, cellular network, incentive, charging, Integrating networks |
11 | Mitsuyuki Takatsuka, Masataka Tada, Ryôichi Sasaki |
Proposal of the e-Discovery System for Sanitizing Disclosure Information and for Securing Evidence. |
FGCN (2) |
2007 |
DBLP DOI BibTeX RDF |
|
11 | Matthias Jacob, Mariusz H. Jakubowski, Ramarathnam Venkatesan |
Towards integral binary execution: implementing oblivious hashing using overlapped instruction encodings. |
MM&Sec |
2007 |
DBLP DOI BibTeX RDF |
anti-disassembly, oblivious hashing, overlapped code, obfuscation, tamper-resistance, integrity checking |
11 | Tran Van Lanh, Kai-Sen Chong, Sabu Emmanuel, Mohan S. Kankanhalli |
A Survey on Digital Camera Image Forensic Methods. |
ICME |
2007 |
DBLP DOI BibTeX RDF |
|
11 | Jing-Ming Guo, Jen-Ho Chen |
Watermarking in Halftone Images with Kernels-Alternated Error Diffusion and Haar Wavelet Transform. |
ICME |
2007 |
DBLP DOI BibTeX RDF |
|
11 | Byoung-Koo Kim, Seungyong Yoon, Jintae Oh |
ATPS - Adaptive Threat Prevention System for High-Performance Intrusion Detection and Response. |
APNOMS |
2007 |
DBLP DOI BibTeX RDF |
header lookup, intrusion detection, pattern matching |
11 | Shuihua Han, Chao-Hsien Chu, Shuangyuan Yang |
Content-based Image Authentication: Current Status, Issues, and Challenges. |
ICSC |
2007 |
DBLP DOI BibTeX RDF |
content-based authentication, security, performance trade-off, Image hash |
11 | Austin Rogers, Milena Milenkovic, Aleksandar Milenkovic |
A low overhead hardware technique for software integrity and confidentiality. |
ICCD |
2007 |
DBLP DOI BibTeX RDF |
|
11 | Benjamin P. Turnbull, Jill Slay |
Wireless Forensic Analysis Tools for Use in the Electronic Evidence Collection Process. |
HICSS |
2007 |
DBLP DOI BibTeX RDF |
|
11 | Fawad Ahmed, Mohammed Yakoob Siyal |
A Secure and Robust Wavelet-Based Hashing Scheme for Image Authentication. |
MMM (2) |
2007 |
DBLP DOI BibTeX RDF |
security, discrete wavelet transform, image authentication, Image hashing |
11 | Guorui Li, Jingsha He, Yingfang Fu |
A Group-Based Dynamic Key Management Scheme in Wireless Sensor Networks. |
AINA Workshops (2) |
2007 |
DBLP DOI BibTeX RDF |
|
11 | Xin Cindy Guo, Dimitrios Hatzinakos |
Content Based Image Hashing Via Wavelet and Radon Transform. |
PCM |
2007 |
DBLP DOI BibTeX RDF |
Wavelet Transform, Radon Transform, Image Hashing |
11 | Chia-Chi Wu, Chin-Chen Chang 0001, Shang-Ru Yang |
An Efficient Fragile Watermarking for Web Pages Tamper-Proof. |
APWeb/WAIM Workshops |
2007 |
DBLP DOI BibTeX RDF |
|
11 | Steven Trimberger |
Trusted Design in FPGAs. |
DAC |
2007 |
DBLP DOI BibTeX RDF |
|
11 | Damien Delannay, Benoît Macq |
Watermarking relying on cover signal content to hide synchronization marks. |
IEEE Trans. Inf. Forensics Secur. |
2006 |
DBLP DOI BibTeX RDF |
|
11 | Hua Yuan, Xiao-Ping (Steven) Zhang |
Multiscale Fragile Watermarking Based on the Gaussian Mixture Model. |
IEEE Trans. Image Process. |
2006 |
DBLP DOI BibTeX RDF |
|