Image Authentication Using Distributed Source Coding

We present a novel approach using distributed source coding for image authentication. The key idea is to provide a Slepian-Wolf encoded quantized image projection as authentication data. This version can be correctly decoded with the help of an authentic image as side information. Distributed source...

Celý popis

Uloženo v:
Podrobná bibliografie
Vydáno v:IEEE transactions on image processing Ročník 21; číslo 1; s. 273 - 283
Hlavní autoři: Yao-Chung Lin, Varodayan, David, Girod, Bernd
Médium: Journal Article
Jazyk:angličtina
Vydáno: New York, NY IEEE 01.01.2012
Institute of Electrical and Electronics Engineers
Témata:
ISSN:1057-7149, 1941-0042, 1941-0042
On-line přístup:Získat plný text
Tagy: Přidat tag
Žádné tagy, Buďte první, kdo vytvoří štítek k tomuto záznamu!
Abstract We present a novel approach using distributed source coding for image authentication. The key idea is to provide a Slepian-Wolf encoded quantized image projection as authentication data. This version can be correctly decoded with the help of an authentic image as side information. Distributed source coding provides the desired robustness against legitimate variations while detecting illegitimate modification. The decoder incorporating expectation maximization algorithms can authenticate images which have undergone contrast, brightness, and affine warping adjustments. Our authentication system also offers tampering localization by using the sum-product algorithm.
AbstractList We present a novel approach using distributed source coding for image authentication. The key idea is to provide a Slepian-Wolf encoded quantized image projection as authentication data. This version can be correctly decoded with the help of an authentic image as side information. Distributed source coding provides the desired robustness against legitimate variations while detecting illegitimate modification. The decoder incorporating expectation maximization algorithms can authenticate images which have undergone contrast, brightness, and affine warping adjustments. Our authentication system also offers tampering localization by using the sum-product algorithm.
We present a novel approach using distributed source coding for image authentication. The key idea is to provide a Slepian-Wolf encoded quantized image projection as authentication data. This version can be correctly decoded with the help of an authentic image as side information. Distributed source coding provides the desired robustness against legitimate variations while detecting illegitimate modification. The decoder incorporating expectation maximization algorithms can authenticate images which have undergone contrast, brightness, and affine warping adjustments. Our authentication system also offers tampering localization by using the sum-product algorithm.We present a novel approach using distributed source coding for image authentication. The key idea is to provide a Slepian-Wolf encoded quantized image projection as authentication data. This version can be correctly decoded with the help of an authentic image as side information. Distributed source coding provides the desired robustness against legitimate variations while detecting illegitimate modification. The decoder incorporating expectation maximization algorithms can authenticate images which have undergone contrast, brightness, and affine warping adjustments. Our authentication system also offers tampering localization by using the sum-product algorithm.
Author Varodayan, David
Girod, Bernd
Yao-Chung Lin
Author_xml – sequence: 1
  surname: Yao-Chung Lin
  fullname: Yao-Chung Lin
  email: yclin79@stanfordalumni.org
  organization: Dept. of Electr. Eng., Stanford Univ., Stanford, CA, USA
– sequence: 2
  givenname: David
  surname: Varodayan
  fullname: Varodayan, David
  email: varodayan@hp.com
  organization: Hewlett-Packard Labs., Palo Alto, CA, USA
– sequence: 3
  givenname: Bernd
  surname: Girod
  fullname: Girod, Bernd
  email: bgirod@stanford.edu
  organization: Dept. of Electr. Eng., Stanford Univ., Stanford, CA, USA
BackLink http://pascal-francis.inist.fr/vibad/index.php?action=getRecordDetail&idt=25473122$$DView record in Pascal Francis
https://www.ncbi.nlm.nih.gov/pubmed/21609882$$D View this record in MEDLINE/PubMed
BookMark eNp9kE1LAzEQhoMoaqt3QZC9iKetmWyyuzlK_SoUFGzPIZtMa2S7q0n24L93a1sFD55mmHnegXkGZL9pGyTkDOgIgMrr2eR5xCjAiIEoBIg9cgySQ0opZ_t9T0WRFsDlERmE8EYpcAH5ITlikFNZluyY8MlKLzG56eIrNtEZHV3bJPPgmmVy60L0ruoi2uSl7bzBZNzafnNCDha6Dni6rUMyv7-bjR_T6dPDZHwzTU3Gy5ja3AjUwpSaW2kzySpWMiwtK6ktqhKsEJrnLGPCVsb0I4FmgSiZ1lZWmGdDcrW5--7bjw5DVCsXDNa1brDtgpLAOMtkIXvyYkt21Qqtevdupf2n2j3aA5dbQAej64XXjXHhlxO8yICtuXzDGd-G4HGhjIvfUqLXrlZA1dq86s2rtXm1Nd8H6Z_g7vY_kfNNxCHiDy6KgsmMZl--AIz6
CODEN IIPRE4
CitedBy_id crossref_primary_10_1017_ATSIP_2012_2
crossref_primary_10_1109_JSAIT_2024_3393429
crossref_primary_10_3233_JIFS_169902
crossref_primary_10_3390_e23080983
crossref_primary_10_1049_el_2012_2470
crossref_primary_10_1016_j_sigpro_2015_04_013
crossref_primary_10_1007_s11042_017_5130_y
crossref_primary_10_1007_s11042_015_2722_2
crossref_primary_10_1007_s11277_015_2594_9
crossref_primary_10_1109_TIT_2017_2688348
crossref_primary_10_1007_s41870_020_00477_x
crossref_primary_10_1016_j_dsp_2017_08_009
crossref_primary_10_1049_iet_ipr_2015_0779
crossref_primary_10_1016_j_image_2019_115642
crossref_primary_10_1007_s11042_017_5569_x
crossref_primary_10_1016_j_ijleo_2019_04_074
crossref_primary_10_1109_TIP_2014_2372473
crossref_primary_10_1016_j_jisa_2016_09_001
crossref_primary_10_1080_01611194_2019_1582117
Cites_doi 10.1016/j.imavis.2004.02.006
10.1109/TIT.1986.1057194
10.1109/ICIP.1998.723518
10.1109/TIP.2009.2028251
10.1109/TMM.2003.811621
10.1109/TIP.2006.881948
10.1109/18.910572
10.1109/ICASSP.2003.1199107
10.1109/MMCS.1999.778542
10.1016/j.sigpro.2006.03.012
10.1109/ICIP.2007.4379535
10.1109/30.826378
10.1109/18.720540
10.1109/TIT.1973.1055037
10.1109/MSP.2008.931079
10.1117/12.371217
10.1109/ICCIT.2008.12
10.1109/PCS.2009.5167462
10.1109/TSP.2005.855406
10.1109/ICASSP.2001.941335
10.1109/ICIP.2003.1246725
10.1109/ICICS.2005.1689139
10.1109/TIFS.2006.873601
10.1109/HIS.2009.204
10.1109/ICIP.2000.899541
10.1109/TIT.1987.1057383
10.1109/MMSP.1998.738950
10.1109/MMCS.1999.778274
10.1109/76.905982
10.1109/MUE.2009.42
10.1109/ICDCSW.2003.1203613
10.1109/ICIP.1996.560429
10.1109/ICIP.1996.560425
10.1117/12.807352
10.1145/1161366.1161378
10.1109/ITCC.2000.844203
10.1109/ISDA.2008.66
10.1109/ICIP.1996.560423
10.1109/LCOMM.2002.804244
10.1109/TIT.1976.1055638
10.1109/TSP.2005.855414
10.1109/6046.923823
10.1145/357744.357893
ContentType Journal Article
Copyright 2015 INIST-CNRS
Copyright_xml – notice: 2015 INIST-CNRS
DBID 97E
RIA
RIE
AAYXX
CITATION
IQODW
CGR
CUY
CVF
ECM
EIF
NPM
7X8
DOI 10.1109/TIP.2011.2157515
DatabaseName IEEE All-Society Periodicals Package (ASPP) 2005–Present
IEEE All-Society Periodicals Package (ASPP) 1998–Present
IEEE Electronic Library (IEL)
CrossRef
Pascal-Francis
Medline
MEDLINE
MEDLINE (Ovid)
MEDLINE
MEDLINE
PubMed
MEDLINE - Academic
DatabaseTitle CrossRef
MEDLINE
Medline Complete
MEDLINE with Full Text
PubMed
MEDLINE (Ovid)
MEDLINE - Academic
DatabaseTitleList MEDLINE
MEDLINE - Academic

Database_xml – sequence: 1
  dbid: NPM
  name: PubMed
  url: http://www.ncbi.nlm.nih.gov/entrez/query.fcgi?db=PubMed
  sourceTypes: Index Database
– sequence: 2
  dbid: RIE
  name: IEEE Electronic Library (IEL)
  url: https://ieeexplore.ieee.org/
  sourceTypes: Publisher
– sequence: 3
  dbid: 7X8
  name: MEDLINE - Academic
  url: https://search.proquest.com/medline
  sourceTypes: Aggregation Database
DeliveryMethod fulltext_linktorsrc
Discipline Applied Sciences
Engineering
EISSN 1941-0042
EndPage 283
ExternalDocumentID 21609882
25473122
10_1109_TIP_2011_2157515
5772930
Genre orig-research
Journal Article
GroupedDBID ---
-~X
.DC
0R~
29I
4.4
53G
5GY
5VS
6IK
97E
AAJGR
AARMG
AASAJ
AAWTH
ABAZT
ABFSI
ABQJQ
ABVLG
ACGFO
ACGFS
ACIWK
AENEX
AETIX
AGQYO
AGSQL
AHBIQ
AI.
AIBXA
AKJIK
AKQYR
ALLEH
ALMA_UNASSIGNED_HOLDINGS
ASUFR
ATWAV
BEFXN
BFFAM
BGNUA
BKEBE
BPEOZ
CS3
DU5
E.L
EBS
EJD
F5P
HZ~
H~9
ICLAB
IFIPE
IFJZH
IPLJI
JAVBF
LAI
M43
MS~
O9-
OCL
P2P
RIA
RIE
RNS
TAE
TN5
VH1
AAYXX
CITATION
IQODW
RIG
AAYOK
CGR
CUY
CVF
ECM
EIF
NPM
PKN
Z5M
7X8
ID FETCH-LOGICAL-c348t-d6c5ea5c8a4d9d392b282e8d280d7b81d55a462325dbccd7b5ecfee92aad9be63
IEDL.DBID RIE
ISICitedReferencesCount 24
ISICitedReferencesURI http://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=Summon&SrcAuth=ProQuest&DestLinkType=CitingArticles&DestApp=WOS_CPL&KeyUT=000298325500023&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D
ISSN 1057-7149
1941-0042
IngestDate Sun Sep 28 06:40:28 EDT 2025
Wed Feb 19 01:48:08 EST 2025
Mon Jul 21 09:14:54 EDT 2025
Sat Nov 29 03:20:46 EST 2025
Tue Nov 18 22:35:39 EST 2025
Tue Aug 26 16:57:30 EDT 2025
IsDoiOpenAccess false
IsOpenAccess true
IsPeerReviewed true
IsScholarly true
Issue 1
Keywords image authentication
Image projection
sum-product algorithm
Source coding
Warping
Authentication
Distributed source signal
Robustness
Decoding
Localization
EM algorithm
Distributed source coding
Language English
License https://ieeexplore.ieee.org/Xplorehelp/downloads/license-information/IEEE.html
CC BY 4.0
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-c348t-d6c5ea5c8a4d9d392b282e8d280d7b81d55a462325dbccd7b5ecfee92aad9be63
Notes ObjectType-Article-1
SourceType-Scholarly Journals-1
ObjectType-Feature-2
content type line 23
PMID 21609882
PQID 912423979
PQPubID 23479
PageCount 11
ParticipantIDs pascalfrancis_primary_25473122
ieee_primary_5772930
proquest_miscellaneous_912423979
crossref_citationtrail_10_1109_TIP_2011_2157515
pubmed_primary_21609882
crossref_primary_10_1109_TIP_2011_2157515
PublicationCentury 2000
PublicationDate 2012-Jan.
2012-1-00
2012
2012-Jan
20120101
PublicationDateYYYYMMDD 2012-01-01
PublicationDate_xml – month: 01
  year: 2012
  text: 2012-Jan.
PublicationDecade 2010
PublicationPlace New York, NY
PublicationPlace_xml – name: New York, NY
– name: United States
PublicationTitle IEEE transactions on image processing
PublicationTitleAbbrev TIP
PublicationTitleAlternate IEEE Trans Image Process
PublicationYear 2012
Publisher IEEE
Institute of Electrical and Electronics Engineers
Publisher_xml – name: IEEE
– name: Institute of Electrical and Electronics Engineers
References ref13
ref56
ref12
ref15
ref14
ref53
ref52
zhang (ref31) 2009; 2
kailasanathan (ref23) 2001
lin (ref55) 2010
han (ref51) 1998; 44
ref16
ref19
ref18
lin (ref11) 1998
lin (ref54) 2007
ref50
lou (ref24) 2000; 46
ref46
ref45
ref42
ref44
ref49
ref8
ref7
ref9
lukas (ref4) 2003
ref3
ref6
ref5
ref40
oostveen (ref17) 2001
ref35
ref34
ref37
ref36
ref30
ref33
ref32
ref2
ref39
ref38
aaron (ref57) 2004
vetro (ref48) 2009
liang (ref1) 2005; 2
ref26
ref25
ref20
ref22
ref21
sun (ref43) 2002
ref28
ref27
ref29
martinian (ref47) 2005
lin (ref10) 1998
lu (ref41) 2004; 1
References_xml – year: 2004
  ident: ref57
  article-title: Transform-domain Wyner-Ziv codec for video
  publication-title: Proc SPIE Conf Visual Communications and Image Processing
– ident: ref56
  doi: 10.1016/j.imavis.2004.02.006
– ident: ref49
  doi: 10.1109/TIT.1986.1057194
– ident: ref37
  doi: 10.1109/ICIP.1998.723518
– ident: ref44
  doi: 10.1109/TIP.2009.2028251
– ident: ref15
  doi: 10.1109/TMM.2003.811621
– ident: ref36
  doi: 10.1109/TIP.2006.881948
– ident: ref53
  doi: 10.1109/18.910572
– ident: ref30
  doi: 10.1109/ICASSP.2003.1199107
– start-page: 293
  year: 2009
  ident: ref48
  publication-title: Securing Biometric Data
– ident: ref21
  doi: 10.1109/MMCS.1999.778542
– ident: ref46
  doi: 10.1016/j.sigpro.2006.03.012
– ident: ref40
  doi: 10.1109/ICIP.2007.4379535
– volume: 46
  start-page: 31
  year: 2000
  ident: ref24
  article-title: Fault resilient and compression tolerant digital signature for image authentication
  publication-title: IEEE Trans Consumer Electronics
  doi: 10.1109/30.826378
– volume: 1
  start-page: 731
  year: 2004
  ident: ref41
  article-title: Robust mesh-based hashing for copy detection and tracing of images
  publication-title: Proc IEEE Int Conf Multimedia and Expo
– year: 2003
  ident: ref4
  article-title: Estimation of primary quantization matrix in double compressed JPEG images
  publication-title: Digital Forensic Research Workshop
– volume: 44
  start-page: 2300
  year: 1998
  ident: ref51
  article-title: Statistical inference under multiterminal data compression
  publication-title: IEEE Trans Inf Theory
  doi: 10.1109/18.720540
– ident: ref2
  doi: 10.1109/TIT.1973.1055037
– ident: ref3
  doi: 10.1109/MSP.2008.931079
– ident: ref16
  doi: 10.1117/12.371217
– ident: ref27
  doi: 10.1109/ICCIT.2008.12
– year: 2002
  ident: ref43
  article-title: A new semi-fragile image authentication framework combining ECC and PKI infrastructure
  publication-title: Proc IEEE Int Symp Circuits and Syst
– ident: ref42
  doi: 10.1109/PCS.2009.5167462
– ident: ref5
  doi: 10.1109/TSP.2005.855406
– year: 2007
  ident: ref54
  article-title: Spatial models for localization of image tampering using distributed source codes
  publication-title: Proc Picture Coding Symp
– ident: ref7
  doi: 10.1109/ICASSP.2001.941335
– ident: ref29
  doi: 10.1109/ICIP.2003.1246725
– volume: 2
  start-page: 105
  year: 2009
  ident: ref31
  article-title: Content based image hashing robust to geometric transformations
  publication-title: Proc Int Symp Electronic Commerce and Security
– ident: ref18
  doi: 10.1109/ICICS.2005.1689139
– year: 2001
  ident: ref23
  article-title: Image authentication surviving acceptable modifications using statistical measures and k-mean segmentation
  publication-title: Workshop on Nonlinear Signal and Image Process
– ident: ref32
  doi: 10.1109/TIFS.2006.873601
– ident: ref34
  doi: 10.1109/HIS.2009.204
– ident: ref28
  doi: 10.1109/ICIP.2000.899541
– ident: ref50
  doi: 10.1109/TIT.1987.1057383
– start-page: 121
  year: 2001
  ident: ref17
  article-title: Visual hashing of video: Applications and techniques
  publication-title: Proc SPIE Conf Apps Digital Image Process
– ident: ref39
  doi: 10.1109/MMSP.1998.738950
– volume: 2
  start-page: 1174
  year: 2005
  ident: ref1
  article-title: Pollution in P2P file sharing systems
  publication-title: Proc IEEE InfoCom
– ident: ref38
  doi: 10.1109/MMCS.1999.778274
– ident: ref12
  doi: 10.1109/76.905982
– year: 2005
  ident: ref47
  article-title: Secure biometrics via syndromes
  publication-title: Allerton Conf Communications Control and Computing
– ident: ref35
  doi: 10.1109/MUE.2009.42
– start-page: 49
  year: 1998
  ident: ref10
  article-title: Generating robust digital signature for image/video authentication
  publication-title: ACM Multimedia Multimedia and Security Workshop
– ident: ref13
  doi: 10.1109/ICDCSW.2003.1203613
– ident: ref6
  doi: 10.1109/ICIP.1996.560429
– ident: ref20
  doi: 10.1109/ICIP.1996.560425
– ident: ref52
  doi: 10.1117/12.807352
– ident: ref19
  doi: 10.1145/1161366.1161378
– ident: ref22
  doi: 10.1109/ITCC.2000.844203
– ident: ref26
  doi: 10.1109/ISDA.2008.66
– ident: ref8
  doi: 10.1109/ICIP.1996.560423
– ident: ref45
  doi: 10.1109/LCOMM.2002.804244
– ident: ref9
  doi: 10.1109/TIT.1976.1055638
– year: 1998
  ident: ref11
  article-title: A robust image authentication method surviving JPEG lossy compression
  publication-title: Proc SPIE Conf Storage and Retrieval for Image and Video Database
– ident: ref33
  doi: 10.1109/TSP.2005.855414
– year: 2010
  ident: ref55
  publication-title: Image Authentication Using Distributed Source Coding
– ident: ref25
  doi: 10.1109/6046.923823
– ident: ref14
  doi: 10.1145/357744.357893
SSID ssj0014516
Score 2.199075
Snippet We present a novel approach using distributed source coding for image authentication. The key idea is to provide a Slepian-Wolf encoded quantized image...
SourceID proquest
pubmed
pascalfrancis
crossref
ieee
SourceType Aggregation Database
Index Database
Enrichment Source
Publisher
StartPage 273
SubjectTerms Algorithms
Applied sciences
Authentication
Brightness
Coding, codes
Cryptography
Decoding
Distributed source coding
EM algorithm
Exact sciences and technology
image authentication
Image coding
Image Enhancement - methods
Image Interpretation, Computer-Assisted - methods
Image processing
Image reconstruction
Information Storage and Retrieval - methods
Information, signal and communications theory
Pattern Recognition, Automated - methods
Reproducibility of Results
Security Measures
Sensitivity and Specificity
Signal and communications theory
Signal processing
Source coding
sum-product algorithm
Telecommunications and information theory
Transform coding
Title Image Authentication Using Distributed Source Coding
URI https://ieeexplore.ieee.org/document/5772930
https://www.ncbi.nlm.nih.gov/pubmed/21609882
https://www.proquest.com/docview/912423979
Volume 21
WOSCitedRecordID wos000298325500023&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
journalDatabaseRights – providerCode: PRVIEE
  databaseName: IEEE Electronic Library (IEL)
  customDbUrl:
  eissn: 1941-0042
  dateEnd: 99991231
  omitProxy: false
  ssIdentifier: ssj0014516
  issn: 1057-7149
  databaseCode: RIE
  dateStart: 19920101
  isFulltext: true
  titleUrlDefault: https://ieeexplore.ieee.org/
  providerName: IEEE
link http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV3da9swED-60oftYW2TrXM_gh_6MqgXR5Ys6XGkLS2UkocM8mZk6QKDLSlN0r-_d7LjrrAV9mZsCYs72fe7D90P4Fx6FHZkuM2-LDKpjM-ccnVGSDmnhfvaYGQtudP392Y2s5MduOjOwiBiLD7Db3wZc_lh6TccKiPnnaBgQQ76O611c1aryxgw4WzMbCqdaYL925RkbofT20nTq5PMmyb7HRsAl7k1RryyRpFehYsj3YrkM2-ILf6NPKMFut7_v7UfwMcWaabfm61xCDu46MF-izrT9pte9eDDHy0J-yBvf9MfJuXIGdcRNQG9NBYWpJfcZJf5sXh-DPqn4yXbvk_w4_pqOr7JWmaFzBfSrLNQeoVOeeNksIEgUk2eF5ogTB50TRBWKScJGAkVau_plkI_R7TCuWBrLIvPsLtYLvALpKHU5GN5a-dyLgntuSL3dUEoC5XNbY4JDLcSrnzbdpzZL35V0f3IbUXqqVg9VaueBL52Mx6alhtvjO2zqLtxrZQTGLxSYvdcMNXySIgE0q1WK_qeOEniFrjcrCo7YoRptU3gqNH2y-R20xz__aUn8J6WJpr4zCnsrh83eAZ7_mn9c_U4oD07M4O4Z58BM8fk7Q
linkProvider IEEE
linkToHtml http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV3da9swED9CV9j60HbN2npdMz_sZTCvjizF0mPJFhKahT5k0DcjSxcotEnJR__-3smOt8A22JuxJSzuZN_vPnQ_gE_SoTBdzW32ZZZIpV1ilS0TQsopLdyVGgNryTifTPTdnbltwZfmLAwihuIz_MqXIZfvF27DoTJy3gkKZuSgv1JSim51WqvJGTDlbMhtqjzJCfhvk5KpuZqObqtunWTgcrLgoQVwLzVaix17FAhWuDzSrkhCs4ra4u_YM9igwdH_rf4YDmusGV9Xm-MttHB-Akc17ozrr3p1Age_NSVsgxw90j8m5tgZVxJVIb04lBbE37jNLjNk8fwQ9o_7C7Z-7-Dn4Pu0P0xqboXEZVKvE99zCq1y2kpvPIGkknwv1F7o1OclgVilrCRoJJQvnaNbCt0M0QhrvSmxl53C3nwxx3OIfS8nL8sZM5MzSXjPZqkrM8JZqExqUozgaivhwtWNx5n_4qEIDkhqClJPweopavVE8LmZ8VQ13fjH2DaLuhlXSzmCzo4Sm-eCyZa7QkQQb7Va0BfFaRI7x8VmVZguY0yTmwjOKm3_mlxvmvd_fulHeD2c_hgX49Hk5gLe0DJFFa35AHvr5QYvYd89r-9Xy07YuS_eTOdM
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Image+Authentication+Using+Distributed+Source+Coding&rft.jtitle=IEEE+transactions+on+image+processing&rft.au=LIN%2C+Yao-Chung&rft.au=VARODAYAN%2C+David&rft.au=GIROD%2C+Bernd&rft.date=2012&rft.pub=Institute+of+Electrical+and+Electronics+Engineers&rft.issn=1057-7149&rft.volume=21&rft.issue=1&rft.spage=273&rft.epage=283&rft_id=info:doi/10.1109%2FTIP.2011.2157515&rft.externalDBID=n%2Fa&rft.externalDocID=25473122
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1057-7149&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1057-7149&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1057-7149&client=summon