Image authentication techniques for surveillance applications, Proceedings of the IEEE, vol.89, issue.10, 2004. ,
DOI : 10.1109/5.959338
A Survey of Watermarking Algorithms for Image Authentication, EURASIP Journal on Advances in Signal Processing, vol.2002, issue.6, pp.613-621, 2002. ,
DOI : 10.1155/S1110865702204047
PICO: Privacy through Invertible Cryptographic Obscuration, Computer Vision for Interactive and Intelligent Environment (CVIIE'05), 2005. ,
DOI : 10.1109/CVIIE.2005.16
A robust image authentication method distinguishing JPEG compression from malicious manipulation, IEEE Trans. On Circuits and Systems of Video Technology, vol.11, issue.2, pp.153-168, 2001. ,
A new semi-fragile image authentication framework combining ECC and PKI infrastructure, p.2, 2002. ,
Watermarking of Digital Video Stream for Source Authentication, IJCSI International Journal of Computer Science Issues, vol.7, issue.4 1, 2010. ,
Utilisation des wifibots, 2007. ,
Image authentication for digital image evidence, Forensic Science Journal, vol.5, pp.1-11, 2006. ,
A Noval Security Mechanism for Image Authentication and Copyright Protection, International Journal of Computer Applications, 2010. ,
A New Approach against Color Attacks of Watermarked Images, 2008 International Conference on Intelligent Information Hiding and Multimedia Signal Processing, pp.969-972, 2008. ,
DOI : 10.1109/IIH-MSP.2008.134