@inproceedings{bb358000,
AUTHOR = "Dubinski, J. and Kowalczuk, A. and Boenisch, F. and Dziedzic, A.",
TITLE = "CDI: Copyrighted Data Identification in Diffusion Models",
BOOKTITLE = CVPR25,
YEAR = "2025",
PAGES = "18674-18684",
BIBSOURCE = "http://www.visionbib.com/bibliography/char994.html#TT352224"}
@inproceedings{bb358001,
AUTHOR = "Liu, R.H. and Chen, H.Z. and Zhao, B. and Chen, K.J. and Zhang, W.M.",
TITLE = "Graph-Embedded Structure-Aware Perceptual Hashing for Neural Network
Protection and Piracy Detection",
BOOKTITLE = CVPR25,
YEAR = "2025",
PAGES = "20169-20178",
BIBSOURCE = "http://www.visionbib.com/bibliography/char994.html#TT352225"}
@inproceedings{bb358002,
AUTHOR = "Liu, Z.G. and Shuai, C. and Fan, S.J. and Dong, Z. and Hu, J. and Ba, Z.J. and Ren, K.",
TITLE = "Harnessing Frequency Spectrum Insights for Image Copyright Protection
Against Diffusion Models",
BOOKTITLE = CVPR25,
YEAR = "2025",
PAGES = "18653-18662",
BIBSOURCE = "http://www.visionbib.com/bibliography/char994.html#TT352226"}
@inproceedings{bb358003,
AUTHOR = "Sun, M. and Wang, R. and Zhu, Z.X. and Jing, L.H. and Guo, Y.F.",
TITLE = "EntropyMark: Towards More Harmless Backdoor Watermark via
Entropy-based Constraint for Open-source Dataset Copyright Protection",
BOOKTITLE = CVPR25,
YEAR = "2025",
PAGES = "30692-30701",
BIBSOURCE = "http://www.visionbib.com/bibliography/char994.html#TT352227"}
@inproceedings{bb358004,
AUTHOR = "Gui, D. and Guo, X. and Zhou, W.G. and Lu, Y.",
TITLE = "I2VGuard: Safeguarding Images against Misuse in Diffusion-based
Image-to-Video Models",
BOOKTITLE = CVPR25,
YEAR = "2025",
PAGES = "12595-12604",
BIBSOURCE = "http://www.visionbib.com/bibliography/char994.html#TT352228"}
@inproceedings{bb358005,
AUTHOR = "Xu, R. and Hu, M.Y. and Lei, D.R. and Li, Y.X. and Lowe, D. and Gorevski, A. and Wang, M.Y. and Ching, E. and Deng, A.",
TITLE = "InvisMark: Invisible and Robust Watermarking for AI-generated Image
Provenance",
BOOKTITLE = WACV25,
YEAR = "2025",
PAGES = "909-918",
BIBSOURCE = "http://www.visionbib.com/bibliography/char994.html#TT352229"}
@inproceedings{bb358006,
AUTHOR = "Min, R. and Li, S. and Chen, H.Y. and Cheng, M.",
TITLE = "A Watermark-conditioned Diffusion Model for IP Protection",
BOOKTITLE = ECCV24,
YEAR = "2024",
PAGES = "LXIX: 104-120",
BIBSOURCE = "http://www.visionbib.com/bibliography/char994.html#TT352230"}
@inproceedings{bb358007,
AUTHOR = "Shah, H. and Mittal, K. and Rajwade, A.",
TITLE = "Group Testing for Accurate and Efficient Range-based Near Neighbor
Search for Plagiarism Detection",
BOOKTITLE = ECCV24,
YEAR = "2024",
PAGES = "XXXII: 313-329",
BIBSOURCE = "http://www.visionbib.com/bibliography/char994.html#TT352231"}
@inproceedings{bb358008,
AUTHOR = "Nicollier, L. and Pic, M.M. and Meinhardt Llopis, E. and Facciolo, G.",
TITLE = "A New Fingerprinting Technique for Engraved Binary Matrix
Authentication",
BOOKTITLE = ICIP24,
YEAR = "2024",
PAGES = "3250-3256",
BIBSOURCE = "http://www.visionbib.com/bibliography/char994.html#TT352232"}
@inproceedings{bb358009,
AUTHOR = "Cui, Q. and Meng, R.H. and Xu, C.H. and Chang, C.H.",
TITLE = "Steganographic Passport: An Owner and User Verifiable Credential for
Deep Model IP Protection Without Retraining",
BOOKTITLE = CVPR24,
YEAR = "2024",
PAGES = "12302-12311",
BIBSOURCE = "http://www.visionbib.com/bibliography/char994.html#TT352233"}
@inproceedings{bb358010,
AUTHOR = "Zhu, P.F. and Takahashi, T. and Kataoka, H.",
TITLE = "Watermark-embedded Adversarial Examples for Copyright Protection
against Diffusion Models",
BOOKTITLE = CVPR24,
YEAR = "2024",
PAGES = "24420-24430",
BIBSOURCE = "http://www.visionbib.com/bibliography/char994.html#TT352234"}
@inproceedings{bb358011,
AUTHOR = "Golatkar, A. and Achille, A. and Zancato, L. and Wang, Y.X. and Swaminathan, A. and Soatto, S.",
TITLE = "CPR: Retrieval Augmented Generation for Copyright Protection",
BOOKTITLE = CVPR24,
YEAR = "2024",
PAGES = "12374-12384",
BIBSOURCE = "http://www.visionbib.com/bibliography/char994.html#TT352235"}
@inproceedings{bb358012,
AUTHOR = "Peng, B.Y. and Qu, S.Q. and Wu, Y. and Zou, T.P. and He, L.H. and Knoll, A. and Chen, G. and Jiang, C.J.",
TITLE = "MAP: MAsk-Pruning for Source-Free Model Intellectual Property
Protection",
BOOKTITLE = CVPR24,
YEAR = "2024",
PAGES = "23585-23594",
BIBSOURCE = "http://www.visionbib.com/bibliography/char994.html#TT352236"}
@inproceedings{bb358013,
AUTHOR = "Jiang, Z.Y. and Fang, M. and Gong, N.Z.Q.",
TITLE = "IPCert: Provably Robust Intellectual Property Protection for Machine
Learning",
BOOKTITLE = AROW23,
YEAR = "2023",
PAGES = "3614-3623",
BIBSOURCE = "http://www.visionbib.com/bibliography/char994.html#TT352237"}
@inproceedings{bb358014,
AUTHOR = "Luo, Z.Y. and Guo, Q. and Cheung, K.C. and See, S. and Wan, R.J.",
TITLE = "CopyRNeRF: Protecting the CopyRight of Neural Radiance Fields",
BOOKTITLE = ICCV23,
YEAR = "2023",
PAGES = "22344-22354",
BIBSOURCE = "http://www.visionbib.com/bibliography/char994.html#TT352238"}
@inproceedings{bb358015,
AUTHOR = "Wang, L.Y. and Wang, M. and Zhang, D.Q. and Fu, H.Z.",
TITLE = "Model Barrier: A Compact Un-Transferable Isolation Domain for Model
Intellectual Property Protection",
BOOKTITLE = CVPR23,
YEAR = "2023",
PAGES = "20475-20484",
BIBSOURCE = "http://www.visionbib.com/bibliography/char994.html#TT352239"}
@inproceedings{bb358016,
AUTHOR = "Chen, Y.M. and Tian, J. and Chen, X.Y. and Zhou, J.T.",
TITLE = "Effective Ambiguity Attack Against Passport-based DNN Intellectual
Property Protection Schemes through Fully Connected Layer
Substitution",
BOOKTITLE = CVPR23,
YEAR = "2023",
PAGES = "8123-8132",
BIBSOURCE = "http://www.visionbib.com/bibliography/char994.html#TT352240"}
@inproceedings{bb358017,
AUTHOR = "Chen, J.B. and Liu, X.W. and Liang, S.Y. and Jia, X.J. and Xun, Y.",
TITLE = "Universal Watermark Vaccine: Universal Adversarial Perturbations for
Watermark Protection",
BOOKTITLE = AML23,
YEAR = "2023",
PAGES = "2322-2329",
BIBSOURCE = "http://www.visionbib.com/bibliography/char994.html#TT352241"}
@inproceedings{bb358018,
AUTHOR = "Wang, X.J. and Jin, Y.X.",
TITLE = "A high-capacity text watermarking method based on geometric
micro-distortion",
BOOKTITLE = "ICPR22",
YEAR = "2022",
PAGES = "1749-1755",
BIBSOURCE = "http://www.visionbib.com/bibliography/char994.html#TT352242"}
@inproceedings{bb358019,
AUTHOR = "Li, Y. and Zhang, W.M. and Fang, H. and Yang, X. and Ma, Z. and Yu, N.H.",
TITLE = "Font Watermarking Network for Text Images",
BOOKTITLE = ICIP22,
YEAR = "2022",
PAGES = "486-490",
BIBSOURCE = "http://www.visionbib.com/bibliography/char994.html#TT352243"}
@inproceedings{bb358020,
AUTHOR = "Zou, Z.H. and Gong, B.Q. and Wang, L.Q.",
TITLE = "Anti-Neuron Watermarking: Protecting Personal Data Against Unauthorized
Neural Networks",
BOOKTITLE = ECCV22,
YEAR = "2022",
PAGES = "XIII:449-465",
BIBSOURCE = "http://www.visionbib.com/bibliography/char994.html#TT352244"}
@inproceedings{bb358021,
AUTHOR = "Jeong, Y. and Kim, D. and Ro, Y. and Kim, P. and Choi, J.W.",
TITLE = "FingerprintNet: Synthesized Fingerprints for Generated Image Detection",
BOOKTITLE = ECCV22,
YEAR = "2022",
PAGES = "XIV:76-94",
BIBSOURCE = "http://www.visionbib.com/bibliography/char994.html#TT352245"}
@inproceedings{bb358022,
AUTHOR = "Ying, Q.C. and Zhou, H. and Zeng, X.H. and Xu, H.S. and Qian, Z.X. and Zhang, X.P.",
TITLE = "Hiding Images Into Images with Real-World Robustness",
BOOKTITLE = ICIP22,
YEAR = "2022",
PAGES = "111-115",
BIBSOURCE = "http://www.visionbib.com/bibliography/char994.html#TT352246"}
@inproceedings{bb358023,
AUTHOR = "Andriushchenko, M. and Li, X.Y.R. and Oxholm, G. and Gittings, T. and Bui, T. and Flammarion, N. and Collomosse, J.",
TITLE = "ARIA: Adversarially Robust Image Attribution for Content Provenance",
BOOKTITLE = WMF22,
YEAR = "2022",
PAGES = "33-43",
BIBSOURCE = "http://www.visionbib.com/bibliography/char994.html#TT352247"}
@inproceedings{bb358024,
AUTHOR = "Xie, M.Y. and Kulshrestha, M. and Wang, S.J. and Yang, J.H. and Chakrabarti, A. and Zhang, N. and Vorobeychik, Y.",
TITLE = "PROVES: Establishing Image Provenance using Semantic Signatures",
BOOKTITLE = WACV22,
YEAR = "2022",
PAGES = "3017-3026",
BIBSOURCE = "http://www.visionbib.com/bibliography/char994.html#TT352248"}
@inproceedings{bb358025,
AUTHOR = "Sharma, S. and Zou, J.J. and Fang, G.",
TITLE = "A Novel Signature Watermarking Scheme for Identity Protection",
BOOKTITLE = DICTA20,
YEAR = "2020",
PAGES = "1-5",
BIBSOURCE = "http://www.visionbib.com/bibliography/char994.html#TT352249"}
@inproceedings{bb358026,
AUTHOR = "Gruber, S. and Neumayr, B. and Fabianek, C. and Gringinger, E. and Schuetz, C.G. and Schrefl, M.",
TITLE = "Towards Informed Watermarking of Personal Health Sensor Data for Data
Leakage Detection",
BOOKTITLE = IWDW20,
YEAR = "2020",
PAGES = "109-124",
BIBSOURCE = "http://www.visionbib.com/bibliography/char994.html#TT352250"}
@inproceedings{bb358027,
AUTHOR = "Du, L. and Wang, Y.J. and Ho, A.T.S.",
TITLE = "Multi-attack Reference Hashing Generation for Image Authentication",
BOOKTITLE = IWDW19,
YEAR = "2019",
PAGES = "407-420",
BIBSOURCE = "http://www.visionbib.com/bibliography/char994.html#TT352251"}
@inproceedings{bb358028,
AUTHOR = "Kuribayashi, M. and Wong, K.",
TITLE = "Improved DM-QIM Watermarking Scheme for PDF Document",
BOOKTITLE = IWDW19,
YEAR = "2019",
PAGES = "171-183",
BIBSOURCE = "http://www.visionbib.com/bibliography/char994.html#TT352252"}
@inproceedings{bb358029,
AUTHOR = "Korus, P. and Memon, N.",
TITLE = "Content Authentication for Neural Imaging Pipelines: End-To-End
Optimization of Photo Provenance in Complex Distribution Channels",
BOOKTITLE = CVPR19,
YEAR = "2019",
PAGES = "8613-8621",
BIBSOURCE = "http://www.visionbib.com/bibliography/char994.html#TT352253"}
@inproceedings{bb358030,
AUTHOR = "Hachani, M. and Zaid, A.O.",
TITLE = "Digital Signature Based Control Integrity for JPEG HDR Images",
BOOKTITLE = CAIP19,
YEAR = "2019",
PAGES = "II:449-458",
BIBSOURCE = "http://www.visionbib.com/bibliography/char994.html#TT352254"}
@inproceedings{bb358031,
AUTHOR = "Cardamone, N. and d'Amore, F.",
TITLE = "DWT and QR Code Based Watermarking for Document DRM",
BOOKTITLE = IWDW18,
YEAR = "2018",
PAGES = "137-150",
BIBSOURCE = "http://www.visionbib.com/bibliography/char994.html#TT352255"}
@article{bb358032,
AUTHOR = "Loc, C.V. and Nguyen, T. and Burie, J.C. and Ogier, J.M.",
TITLE = "A robust watermarking approach for security issue of binary documents
using fully convolutional networks",
JOURNAL = IJDAR,
VOLUME = "23",
YEAR = "2020",
NUMBER = "3",
MONTH = "September",
PAGES = "ages 219-239",
BIBSOURCE = "http://www.visionbib.com/bibliography/char994.html#TT352256"}
@inproceedings{bb358033,
AUTHOR = "Loc, C.V. and Burie, J.C. and Ogier, J.M.",
TITLE = "Document Images Watermarking for Security Issue using Fully
Convolutional Networks",
BOOKTITLE = ICPR18,
YEAR = "2018",
PAGES = "1091-1096",
BIBSOURCE = "http://www.visionbib.com/bibliography/char994.html#TT352257"}
@inproceedings{bb358034,
AUTHOR = "Kim, E.J. and Yu, J.M.",
TITLE = "A Consortium Blockchain System for Verifying Digital Contents on
Traditional Costumes",
BOOKTITLE = EuroMed18,
YEAR = "2018",
PAGES = "I:437-446",
BIBSOURCE = "http://www.visionbib.com/bibliography/char994.html#TT352258"}
@inproceedings{bb358035,
AUTHOR = "Ejeta, T.G. and Kim, H.J.",
TITLE = "Website Fingerprinting Attack on Psiphon and Its Forensic Analysis",
BOOKTITLE = IWDW17,
YEAR = "2017",
PAGES = "42-51",
BIBSOURCE = "http://www.visionbib.com/bibliography/char994.html#TT352259"}
@inproceedings{bb358036,
AUTHOR = "Uehira, K. and Suzuki, M. and Silapasuphakornwong, P. and Torii, H. and Takashima, Y.",
TITLE = "Copyright Protection for 3D Printing by Embedding Information Inside
3D-Printed Objects",
BOOKTITLE = IWDW16,
YEAR = "2016",
PAGES = "370-378",
BIBSOURCE = "http://www.visionbib.com/bibliography/char994.html#TT352260"}
@inproceedings{bb358037,
AUTHOR = "Sulema, Y.",
TITLE = "Image protection method based on binary operations",
BOOKTITLE = WSSIP16,
YEAR = "2016",
PAGES = "1-4",
BIBSOURCE = "http://www.visionbib.com/bibliography/char994.html#TT352261"}
@inproceedings{bb358038,
AUTHOR = "Yang, P.P. and Li, R. and Ni, R.R. and Zhao, Y.",
TITLE = "Recaptured Image Forensics Based on Quality Aware and Histogram Feature",
BOOKTITLE = IWDW17,
YEAR = "2017",
PAGES = "31-41",
BIBSOURCE = "http://www.visionbib.com/bibliography/char994.html#TT352262"}
@inproceedings{bb358039,
AUTHOR = "Yang, P.P. and Ni, R.R. and Zhao, Y.",
TITLE = "Recapture Image Forensics Based on Laplacian Convolutional Neural
Networks",
BOOKTITLE = IWDW16,
YEAR = "2016",
PAGES = "119-128",
BIBSOURCE = "http://www.visionbib.com/bibliography/char994.html#TT352263"}
@inproceedings{bb358040,
AUTHOR = "Qiao, X.M. and Ni, R.R. and Zhao, Y.",
TITLE = "Superpixel-Based Watermarking Scheme for Image Authentication and
Recovery",
BOOKTITLE = IWDW14,
YEAR = "2014",
PAGES = "160-173",
BIBSOURCE = "http://www.visionbib.com/bibliography/char994.html#TT352264"}
@inproceedings{bb358041,
AUTHOR = "Cui, C.C. and Ni, R.R. and Zhao, Y.",
TITLE = "Robust Zero Watermarking for 3D Triangular Mesh Models Based on
Spherical Integral Invariants",
BOOKTITLE = IWDW17,
YEAR = "2017",
PAGES = "318-330",
BIBSOURCE = "http://www.visionbib.com/bibliography/char994.html#TT352265"}
@inproceedings{bb358042,
AUTHOR = "Lin, C.C. and Huang, Y.H. and Tai, W.L.",
TITLE = "A Novel Hybrid Image Authentication Scheme for AMBTC-Compressed Images",
BOOKTITLE = IWDW14,
YEAR = "2014",
PAGES = "433-443",
BIBSOURCE = "http://www.visionbib.com/bibliography/char994.html#TT352266"}
@inproceedings{bb358043,
AUTHOR = "Stole, S. and Soukup, D. and Huber Mork, R.",
TITLE = "Invariant characterization of DOVID security features using a
photometric descriptor",
BOOKTITLE = ICIP15,
YEAR = "2015",
PAGES = "3422-3426",
BIBSOURCE = "http://www.visionbib.com/bibliography/char994.html#TT352267"}
@inproceedings{bb358044,
AUTHOR = "Zhao, B.",
TITLE = "Model-based iterative reconstruction for magnetic resonance
fingerprinting",
BOOKTITLE = ICIP15,
YEAR = "2015",
PAGES = "3392-3396",
BIBSOURCE = "http://www.visionbib.com/bibliography/char994.html#TT352268"}
@inproceedings{bb358045,
AUTHOR = "Kuribayashi, M. and Schaathun, H.G.",
TITLE = "Image fingerprinting system based on collusion secure code and
watermarking method",
BOOKTITLE = ICIP15,
YEAR = "2015",
PAGES = "2120-2124",
BIBSOURCE = "http://www.visionbib.com/bibliography/char994.html#TT352269"}
@inproceedings{bb358046,
AUTHOR = "Chetan, K.R. and Nirmala, S.",
TITLE = "A novel intelligent robust watermarking scheme for protecting
information in document images",
BOOKTITLE = ICAPR15,
YEAR = "2015",
PAGES = "1-6",
BIBSOURCE = "http://www.visionbib.com/bibliography/char994.html#TT352270"}
@inproceedings{bb358047,
AUTHOR = "Shin, J. and Kim, D.S. and Ruland, C.",
TITLE = "Content based image authentication using HOG feature descriptor",
BOOKTITLE = ICIP14,
YEAR = "2014",
PAGES = "5292-5296",
BIBSOURCE = "http://www.visionbib.com/bibliography/char994.html#TT352271"}
@inproceedings{bb358048,
AUTHOR = "Hoang, B.A.M. and Sawaya, W. and Bas, P.",
TITLE = "Image model and printed document authentication:
A theoretical analysis",
BOOKTITLE = ICIP14,
YEAR = "2014",
PAGES = "5377-5381",
BIBSOURCE = "http://www.visionbib.com/bibliography/char994.html#TT352272"}
@inproceedings{bb358049,
AUTHOR = "Sun, J.H. and Lin, Y.H. and Wu, J.L.",
TITLE = "Secure Client Side Watermarking with Limited Key Size",
BOOKTITLE = MMMod15,
YEAR = "2015",
PAGES = "I: 13-24",
BIBSOURCE = "http://www.visionbib.com/bibliography/char994.html#TT352273"}
@inproceedings{bb358050,
AUTHOR = "Chen, C. and Li, H.D. and Luo, W.Q. and Yang, R. and Huang, J.W.",
TITLE = "Anti-forensics of JPEG Detectors via Adaptive Quantization Table
Replacement",
BOOKTITLE = ICPR14,
YEAR = "2014",
PAGES = "672-677",
BIBSOURCE = "http://www.visionbib.com/bibliography/char994.html#TT352274"}
@inproceedings{bb358051,
AUTHOR = "Hoang, A.T. and Nguyen Son, H.Q. and Tran, M.T. and Echizen, I.",
TITLE = "Detecting Traitors in Re-publishing Updated Datasets",
BOOKTITLE = IWDW13,
YEAR = "2013",
PAGES = "205-220",
BIBSOURCE = "http://www.visionbib.com/bibliography/char994.html#TT352275"}
@article{bb358052,
AUTHOR = "Tian, H.W. and Zhao, Y. and Ni, R.R. and Qin, L.M. and Li, X.L.",
TITLE = "LDFT-Based Watermarking Resilient to Local Desynchronization Attacks",
JOURNAL = Cyber,
VOLUME = "43",
YEAR = "2013",
NUMBER = "6",
PAGES = "2190-2201",
BIBSOURCE = "http://www.visionbib.com/bibliography/char994.html#TT352276"}
@inproceedings{bb358053,
AUTHOR = "Gebhardt, J. and Goldstein, M. and Shafait, F. and Dengel, A.R.",
TITLE = "Document Authentication Using Printing Technique Features and
Unsupervised Anomaly Detection",
BOOKTITLE = ICDAR13,
YEAR = "2013",
PAGES = "479-483",
BIBSOURCE = "http://www.visionbib.com/bibliography/char994.html#TT352277"}
@inproceedings{bb358054,
AUTHOR = "Bertrand, R. and Gomez Kramer, P. and Ramos Terrades, O. and Franco, P. and Ogier, J.M.",
TITLE = "A System Based on Intrinsic Features for Fraudulent Document
Detection",
BOOKTITLE = ICDAR13,
YEAR = "2013",
PAGES = "106-110",
BIBSOURCE = "http://www.visionbib.com/bibliography/char994.html#TT352278"}
@inproceedings{bb358055,
AUTHOR = "Imran, M. and Ghafoor, A. and Khokher, M.R.",
TITLE = "A robust non-blind color image watermarking scheme",
BOOKTITLE = ICARCV12,
YEAR = "2012",
PAGES = "1392-1396",
BIBSOURCE = "http://www.visionbib.com/bibliography/char994.html#TT352279"}
@inproceedings{bb358056,
AUTHOR = "Liu, F. and Cheng, L.M.",
TITLE = "Perceptual Image Hashing via Wave Atom Transform",
BOOKTITLE = IWDW11,
YEAR = "2011",
PAGES = "468-478",
BIBSOURCE = "http://www.visionbib.com/bibliography/char994.html#TT352280"}
@inproceedings{bb358057,
AUTHOR = "Schrittwieser, S. and Kieseberg, P. and Echizen, I. and Wohlgemuth, S. and Sonehara, N. and Weippl, E.",
TITLE = "An Algorithm for k-Anonymity-Based Fingerprinting",
BOOKTITLE = IWDW11,
YEAR = "2011",
PAGES = "439-452",
BIBSOURCE = "http://www.visionbib.com/bibliography/char994.html#TT352281"}
@inproceedings{bb358058,
AUTHOR = "Yamada, T. and Gohshi, S. and Echizen, I.",
TITLE = "Countermeasure of re-recording prevention against attack with short
wavelength pass filter",
BOOKTITLE = ICIP11,
YEAR = "2011",
PAGES = "2753-2756",
BIBSOURCE = "http://www.visionbib.com/bibliography/char994.html#TT352282"}
@inproceedings{bb358059,
AUTHOR = "Praveen, R.G. and Madhavaraj, A. and Karthik, K.",
TITLE = "A code and domain independent traitor tracing system based on the
eigen-decomposition of fingerprinted images",
BOOKTITLE = ICIIP11,
YEAR = "2011",
PAGES = "1-6",
BIBSOURCE = "http://www.visionbib.com/bibliography/char994.html#TT352283"}
@inproceedings{bb358060,
AUTHOR = "Shakeri, M. and Jamzad, M.",
TITLE = "A Robust Zero-Watermark Copyright Protection Scheme Based on DWT and
Image Normalization",
BOOKTITLE = PSIVT11,
YEAR = "2011",
PAGES = "II: 359-370",
BIBSOURCE = "http://www.visionbib.com/bibliography/char994.html#TT352284"}
@inproceedings{bb358061,
AUTHOR = "Bruna, A.R. and Messina, G. and Battiato, S.",
TITLE = "Crop Detection through Blocking Artefacts Analysis",
BOOKTITLE = CIAP11,
YEAR = "2011",
PAGES = "I: 650-659",
BIBSOURCE = "http://www.visionbib.com/bibliography/char994.html#TT352285"}
@inproceedings{bb358062,
AUTHOR = "El Hadedy, M. and Pitsilis, G. and Knapskog, S.J.",
TITLE = "An Efficient Authorship Protection Scheme for Shared Multimedia Content",
BOOKTITLE = ICIG11,
YEAR = "2011",
PAGES = "914-919",
BIBSOURCE = "http://www.visionbib.com/bibliography/char994.html#TT352286"}
@inproceedings{bb358063,
AUTHOR = "Cao, G. and Zhao, Y. and Ni, R.R.",
TITLE = "Forensic estimation of gamma correction in digital images",
BOOKTITLE = ICIP10,
YEAR = "2010",
PAGES = "2097-2100",
BIBSOURCE = "http://www.visionbib.com/bibliography/char994.html#TT352287"}
@inproceedings{bb358064,
AUTHOR = "Gul, G. and Avcibas, I. and Kurugollu, F.",
TITLE = "SVD based image manipulation detection",
BOOKTITLE = ICIP10,
YEAR = "2010",
PAGES = "1765-1768",
BIBSOURCE = "http://www.visionbib.com/bibliography/char994.html#TT352288"}
@inproceedings{bb358065,
AUTHOR = "Conotter, V. and Boato, G. and Farid, H.",
TITLE = "Detecting photo manipulation on signs and billboards",
BOOKTITLE = ICIP10,
YEAR = "2010",
PAGES = "1741-1744",
BIBSOURCE = "http://www.visionbib.com/bibliography/char994.html#TT352289"}
@inproceedings{bb358066,
AUTHOR = "Vazquez Padin, D. and Mosquera, C. and Perez Gonzalez, F.",
TITLE = "Two-dimensional statistical test for the presence of almost
cyclostationarity on images",
BOOKTITLE = ICIP10,
YEAR = "2010",
PAGES = "1745-1748",
BIBSOURCE = "http://www.visionbib.com/bibliography/char994.html#TT352290"}
@inproceedings{bb358067,
AUTHOR = "Shariati, S. and Jacques, L. and Standaert, F.X. and Macq, B. and Salhi, M.A. and Antoine, P.",
TITLE = "Randomly driven fuzzy key extraction of unclonable images",
BOOKTITLE = ICIP10,
YEAR = "2010",
PAGES = "4329-4332",
BIBSOURCE = "http://www.visionbib.com/bibliography/char994.html#TT352291"}
@inproceedings{bb358068,
AUTHOR = "Yamada, T. and Gohshi, S. and Echizen, I.",
TITLE = "Preventing re-recording based on difference between sensory perceptions
of humans and devices",
BOOKTITLE = ICIP10,
YEAR = "2010",
PAGES = "993-996",
BIBSOURCE = "http://www.visionbib.com/bibliography/char994.html#TT352292"}
@inproceedings{bb358069,
AUTHOR = "Lu, W.J. and Wu, M.",
TITLE = "Multimedia forensic hash based on visual words",
BOOKTITLE = ICIP10,
YEAR = "2010",
PAGES = "989-992",
BIBSOURCE = "http://www.visionbib.com/bibliography/char994.html#TT352293"}
@inproceedings{bb358070,
AUTHOR = "Koide, M. and Iwamura, K.",
TITLE = "Scalable authentication for various representations of JPEG 2000 images",
BOOKTITLE = ICIP10,
YEAR = "2010",
PAGES = "985-988",
BIBSOURCE = "http://www.visionbib.com/bibliography/char994.html#TT352294"}
@inproceedings{bb358071,
AUTHOR = "Lie, W.N. and Hsu, T.L. and Lin, G.S.",
TITLE = "Verification of image content integrity by using dual watermarking on
wavelets domain",
BOOKTITLE = ICIP03,
YEAR = "2003",
PAGES = "II: 487-490",
BIBSOURCE = "http://www.visionbib.com/bibliography/char994.html#TT352295"}
@inproceedings{bb358072,
AUTHOR = "Zhang, C. and Zhang, H.B.",
TITLE = "Exposing Digital Image Forgeries by Using Canonical Correlation
Analysis",
BOOKTITLE = ICPR10,
YEAR = "2010",
PAGES = "838-841",
BIBSOURCE = "http://www.visionbib.com/bibliography/char994.html#TT352296"}
@inproceedings{bb358073,
AUTHOR = "Huang, Y.Z. and Fan, N.",
TITLE = "Learning from interpolated images using neural networks for digital
forensics",
BOOKTITLE = CVPR10,
YEAR = "2010",
PAGES = "177-182",
BIBSOURCE = "http://www.visionbib.com/bibliography/char994.html#TT352297"}
@inproceedings{bb358074,
AUTHOR = "Cai, L. and Xu, Y.R. and He, L. and Zhao, Y.M. and Yang, X.",
TITLE = "An Effective Segmentation for Noise-Based Image Verification Using
Gamma Mixture Models",
BOOKTITLE = ACCV09,
YEAR = "2009",
PAGES = "III: 21-32",
BIBSOURCE = "http://www.visionbib.com/bibliography/char994.html#TT352298"}
@inproceedings{bb358075,
AUTHOR = "Hsu, C.Y. and Lu, C.S. and Pei, S.C.",
TITLE = "Secure image hashing via minimum distortion estimation",
BOOKTITLE = ICIP09,
YEAR = "2009",
PAGES = "1281-1284",
BIBSOURCE = "http://www.visionbib.com/bibliography/char994.html#TT352299"}
@inproceedings{bb358076,
AUTHOR = "Kang, L.W. and Lu, C.S. and Hsu, C.Y.",
TITLE = "Compressive sensing-based image hashing",
BOOKTITLE = ICIP09,
YEAR = "2009",
PAGES = "1285-1288",
BIBSOURCE = "http://www.visionbib.com/bibliography/char994.html#TT352300"}
@inproceedings{bb358077,
AUTHOR = "Laadjel, M. and Zebbiche, K. and Kurugullu, F. and Bouridane, A. and Nibouche, O.",
TITLE = "Watermarking for Palmprint Image Protection",
BOOKTITLE = IMVIP09,
YEAR = "2009",
PAGES = "71-76",
BIBSOURCE = "http://www.visionbib.com/bibliography/char994.html#TT352301"}
@inproceedings{bb358078,
AUTHOR = "Cruz Ramos, C. and Reyes Reyes, R. and Nakano Miyatake, M. and Perez Meana, H.M.",
TITLE = "Image Authentication Scheme Based on Self-embedding Watermarking",
BOOKTITLE = CIARP09,
YEAR = "2009",
PAGES = "1005-1012",
BIBSOURCE = "http://www.visionbib.com/bibliography/char994.html#TT352302"}
@inproceedings{bb358079,
AUTHOR = "Xing, N. and Zhu, H. and Ma, W.Q. and Dong, M.",
TITLE = "The Identification Algorithm of Forged Image Based on BP Neural Network",
BOOKTITLE = CISP09,
YEAR = "2009",
PAGES = "1-4",
BIBSOURCE = "http://www.visionbib.com/bibliography/char994.html#TT352303"}
@inproceedings{bb358080,
AUTHOR = "Lv, X.L. and Bian, H.Y. and Yang, Y.F.",
TITLE = "Color Image Watermarking Using Support Vector Regression",
BOOKTITLE = CISP09,
YEAR = "2009",
PAGES = "1-4",
BIBSOURCE = "http://www.visionbib.com/bibliography/char994.html#TT352304"}
@inproceedings{bb358081,
AUTHOR = "Li, Y. and Du, S.",
TITLE = "Biometric Watermarking Based on Affine Parameters Estimation",
BOOKTITLE = CISP09,
YEAR = "2009",
PAGES = "1-6",
BIBSOURCE = "http://www.visionbib.com/bibliography/char994.html#TT352305"}
@inproceedings{bb358082,
AUTHOR = "Ye, T.Y. and Ma, Z.F. and Niu, X.X. and Yang, Y.X.",
TITLE = "A Robust Zero-Watermark Algorithm Based on Singular Value Decomposition
for Digital Right Management",
BOOKTITLE = CISP09,
YEAR = "2009",
PAGES = "1-3",
BIBSOURCE = "http://www.visionbib.com/bibliography/char994.html#TT352306"}
@inproceedings{bb358083,
AUTHOR = "Kiani, S. and Moghaddam, M.E.",
TITLE = "A Fractal Based Image Watermarking for Authentication and Verification",
BOOKTITLE = CISP09,
YEAR = "2009",
PAGES = "1-5",
BIBSOURCE = "http://www.visionbib.com/bibliography/char994.html#TT352307"}
@inproceedings{bb358084,
AUTHOR = "Kuo, C.C.J.",
TITLE = "Design of Collusion-Resistant Fingerprinting Systems:
Review and New Results",
BOOKTITLE = DW08,
YEAR = "2008",
PAGES = "469",
BIBSOURCE = "http://www.visionbib.com/bibliography/char994.html#TT352308"}
@inproceedings{bb358085,
AUTHOR = "Poh, G.S. and Martin, K.M.",
TITLE = "An Efficient Buyer-Seller Watermarking Protocol Based on Chameleon
Encryption",
BOOKTITLE = DW08,
YEAR = "2008",
PAGES = "433-447",
BIBSOURCE = "http://www.visionbib.com/bibliography/char994.html#TT352309"}
@inproceedings{bb358086,
AUTHOR = "Williams, D.M. and Treharne, H. and Ho, A.T.S. and Waller, A.",
TITLE = "Formal Analysis of Two Buyer-Seller Watermarking Protocols",
BOOKTITLE = DW08,
YEAR = "2008",
PAGES = "278-292",
BIBSOURCE = "http://www.visionbib.com/bibliography/char994.html#TT352310"}
@inproceedings{bb358087,
AUTHOR = "Zhang, Y.P. and Kang, X.G. and Zhang, P.",
TITLE = "A Practical Print-and-Scan Resilient Watermarking for High Resolution
Images",
BOOKTITLE = DW08,
YEAR = "2008",
PAGES = "103-112",
BIBSOURCE = "http://www.visionbib.com/bibliography/char994.html#TT352311"}
@inproceedings{bb358088,
AUTHOR = "Poh, G.S. and Martin, K.M.",
TITLE = "Classification Framework for Fair Content Tracing Protocols",
BOOKTITLE = DW09,
YEAR = "2009",
PAGES = "252-267",
BIBSOURCE = "http://www.visionbib.com/bibliography/char994.html#TT352312"}
@inproceedings{bb358089,
AUTHOR = "Delp, E.J.",
TITLE = "Forensic Techniques for Image Source Classification:
A Comparative Study",
BOOKTITLE = DW09,
YEAR = "2009",
PAGES = "3",
BIBSOURCE = "http://www.visionbib.com/bibliography/char994.html#TT352313"}
@inproceedings{bb358090,
AUTHOR = "Sun, S. and Wei, S. and Wang, C.",
TITLE = "DPCC and QR factorization-based color medical image authentication
algorithm",
BOOKTITLE = IASP09,
YEAR = "2009",
PAGES = "81-84",
BIBSOURCE = "http://www.visionbib.com/bibliography/char994.html#TT352314"}
@inproceedings{bb358091,
AUTHOR = "Kim, H.S. and Lee, J.K. and Liu, H.B. and Lee, D.W.",
TITLE = "Video linkage: group based copied video detection",
BOOKTITLE = CIVR08,
YEAR = "2008",
PAGES = "397-406",
BIBSOURCE = "http://www.visionbib.com/bibliography/char994.html#TT352315"}
@inproceedings{bb358092,
AUTHOR = "Garain, U. and Halder, B.",
TITLE = "Machine Authentication of Security Documents",
BOOKTITLE = ICDAR09,
YEAR = "2009",
PAGES = "718-722",
BIBSOURCE = "http://www.visionbib.com/bibliography/char994.html#TT352316"}
@inproceedings{bb358093,
AUTHOR = "Garain, U. and Halder, B.",
TITLE = "On Automatic Authenticity Verification of Printed Security Documents",
BOOKTITLE = ICCVGIP08,
YEAR = "2008",
PAGES = "706-713",
BIBSOURCE = "http://www.visionbib.com/bibliography/char994.html#TT352317"}
@inproceedings{bb358094,
AUTHOR = "Geisselhardt, W. and Iqbal, T.",
TITLE = "High-Capacity Invisible Background Encoding for Digital Authentication
of Hardcopy Documents",
BOOKTITLE = DW07,
YEAR = "2007",
PAGES = "203-221",
BIBSOURCE = "http://www.visionbib.com/bibliography/char994.html#TT352318"}
@inproceedings{bb358095,
AUTHOR = "Li, Q.M. and Memon, N.",
TITLE = "Practical Security of Non-Invertible Watermarking Schemes",
BOOKTITLE = ICIP07,
YEAR = "2007",
PAGES = "IV: 445-448",
BIBSOURCE = "http://www.visionbib.com/bibliography/char994.html#TT352319"}
@inproceedings{bb358096,
AUTHOR = "Okada, M. and Okabe, Y. and Uehara, T.",
TITLE = "Semi-blind Fingerprinting Utilizing Ordinary Existing Watermarking
Techniques",
BOOKTITLE = DW09,
YEAR = "2009",
PAGES = "14-28",
BIBSOURCE = "http://www.visionbib.com/bibliography/char994.html#TT352320"}
@inproceedings{bb358097,
AUTHOR = "Hou, S.H. and Uehara, T. and Morimura, Y. and Minoh, M.",
TITLE = "Fingerprinting Codes for Live Pay-Television Broadcast Via Internet",
BOOKTITLE = MCAM07,
YEAR = "2007",
PAGES = "252-261",
BIBSOURCE = "http://www.visionbib.com/bibliography/char994.html#TT352321"}
@inproceedings{bb358098,
AUTHOR = "Hu, C.Y. and Liu, P.T. and Li, D.X.",
TITLE = "A New Type of Proxy Ring Signature Scheme with Revocable Anonymity and
No Info Leaked",
BOOKTITLE = MCAM07,
YEAR = "2007",
PAGES = "262-266",
BIBSOURCE = "http://www.visionbib.com/bibliography/char994.html#TT352322"}
@inproceedings{bb358099,
AUTHOR = "Chang, S.F.",
TITLE = "Blind Passive Media Forensics: Motivation and Opportunity",
BOOKTITLE = MCAM07,
YEAR = "2007",
PAGES = "57-59",
BIBSOURCE = "http://www.visionbib.com/bibliography/char994.html#TT352323"}
Last update:Nov 26, 2025 at 20:24:09