Login / Signup
Two-Layer Binary Image Authentication With Tampering Localization.
Huijuan Yang
Alex C. Kot
Published in:
ICASSP (2) (2006)
Keyphrases
</>
image authentication
tamper detection
authentication scheme
jpeg compression
public key
watermarking scheme
semi fragile watermarking
tampering detection
copyright protection
image content
digital watermarking
semi fragile
digital images
watermarking algorithm
data hiding
image representation
image retrieval