Friedman, The Trustworthy Digital Camera, Restoring Credibility To The Photographic Image, IEEE Transactions on Consumer Electronics, vol. 39, No. 4, pp. 905-910, Nov. 1993. |
Hsu, et al., Hidden Signatures In Images, Proceedings of the 1996 IEEE International Conference in Image Processing, ICIP '96, vol. 3, pp. 223-226, 1996. |
Kundur, et al., Towards a Telltale Watermarking Technique for Tampering Proofing. |
Lin, et al., An Image Authenticator Surviving DCT-Based Variable Quantization Table Compressions. |
Lin, et al., A Watermark-Based Robust Image Authentication Method Using Wavelets, Advent Report, Columbia University, Apr. 1998. |
Lin, et al., Generating Robust Digital Signature For Image/Video Authentication, Multimedia and Security Workshop at ACM Multimedia '98, Bristol, U.K., Sep. 1998. |
Lin, et al., A Robust Image Authentication Method Surviving LPEG Lossy Compression, SPIE Storage and Retrieval of Image/Video Databases, San Jose, CA, Jan. 1998. |
Matsui, et al., Video-Stenography: How To Secretly Embed a Signature in a Picture, IMA Intellectual Property Project Proceedings, vol. 1, Issue 1, pp. 187-206, Jan. 1994. |
Schneider, et al., A Robust Content Based Digital Signature For Image Authentication, 3rd IEEE International Conference on Image Processing, vol. 3, pp. 227-230, 1996. |
Schyndel, et al., A Digital Watermark, IEEE Conference Publication. |
Wong, A Public Key Watermark For Image Verification and Authentication. |