Embedding robust labels into images for copyright protection
KnowRight '95 Proceedings of the conference on Intellectual property rights and new technologies
IEEE Transactions on Computers
A Feature Calibration Method For Watermarking Of Document Images
ICDAR '99 Proceedings of the Fifth International Conference on Document Analysis and Recognition
A Secure Data Hiding Scheme for Two-Color Images
ISCC '00 Proceedings of the Fifth IEEE Symposium on Computers and Communications (ISCC 2000)
A Text Watermarking Algorithm based on Word Classification and Inter-word Space Statistics
ICDAR '03 Proceedings of the Seventh International Conference on Document Analysis and Recognition - Volume 2
An Adaptive Data Hiding Technique for Binary Images
ICPR '04 Proceedings of the Pattern Recognition, 17th International Conference on (ICPR'04) Volume 4 - Volume 04
Run length based steganography for binary images
PReMI'05 Proceedings of the First international conference on Pattern Recognition and Machine Intelligence
Alteration-locating authentication watermarking for binary images
IWDW'04 Proceedings of the Third international conference on Digital Watermarking
IEEE Transactions on Signal Processing - Part II
Data hiding in binary image for authentication and annotation
IEEE Transactions on Multimedia
Pattern-Based Data Hiding for Binary Image Authentication by Connectivity-Preserving
IEEE Transactions on Multimedia
Electronic marking and identification techniques to discourage document copying
IEEE Journal on Selected Areas in Communications
Nonlinear multiresolution signal decomposition schemes. II. Morphological wavelets
IEEE Transactions on Image Processing
Interword distance changes represented by sine waves for watermarking text images
IEEE Transactions on Circuits and Systems for Video Technology
Hi-index | 0.00 |
This paper reviews techniques for binary images data hiding and watermarking and proposes a general framework for authentication purposes. Finally, a multi-level signature scheme is presented, which is effective to detect malicious tamperings conducted to an image.