Image Authentication Using Distributed Source Coding
We present a novel approach using distributed source coding for image authentication. The key idea is to provide a Slepian-Wolf encoded quantized image projection as authentication data. This version can be correctly decoded with the help of an authentic image as side information. Distributed source...
Uloženo v:
| Vydáno v: | IEEE transactions on image processing Ročník 21; číslo 1; s. 273 - 283 |
|---|---|
| Hlavní autoři: | , , |
| Médium: | Journal Article |
| Jazyk: | angličtina |
| Vydáno: |
New York, NY
IEEE
01.01.2012
Institute of Electrical and Electronics Engineers |
| Témata: | |
| ISSN: | 1057-7149, 1941-0042, 1941-0042 |
| On-line přístup: | Získat plný text |
| Tagy: |
Přidat tag
Žádné tagy, Buďte první, kdo vytvoří štítek k tomuto záznamu!
|
| Abstract | We present a novel approach using distributed source coding for image authentication. The key idea is to provide a Slepian-Wolf encoded quantized image projection as authentication data. This version can be correctly decoded with the help of an authentic image as side information. Distributed source coding provides the desired robustness against legitimate variations while detecting illegitimate modification. The decoder incorporating expectation maximization algorithms can authenticate images which have undergone contrast, brightness, and affine warping adjustments. Our authentication system also offers tampering localization by using the sum-product algorithm. |
|---|---|
| AbstractList | We present a novel approach using distributed source coding for image authentication. The key idea is to provide a Slepian-Wolf encoded quantized image projection as authentication data. This version can be correctly decoded with the help of an authentic image as side information. Distributed source coding provides the desired robustness against legitimate variations while detecting illegitimate modification. The decoder incorporating expectation maximization algorithms can authenticate images which have undergone contrast, brightness, and affine warping adjustments. Our authentication system also offers tampering localization by using the sum-product algorithm. We present a novel approach using distributed source coding for image authentication. The key idea is to provide a Slepian-Wolf encoded quantized image projection as authentication data. This version can be correctly decoded with the help of an authentic image as side information. Distributed source coding provides the desired robustness against legitimate variations while detecting illegitimate modification. The decoder incorporating expectation maximization algorithms can authenticate images which have undergone contrast, brightness, and affine warping adjustments. Our authentication system also offers tampering localization by using the sum-product algorithm.We present a novel approach using distributed source coding for image authentication. The key idea is to provide a Slepian-Wolf encoded quantized image projection as authentication data. This version can be correctly decoded with the help of an authentic image as side information. Distributed source coding provides the desired robustness against legitimate variations while detecting illegitimate modification. The decoder incorporating expectation maximization algorithms can authenticate images which have undergone contrast, brightness, and affine warping adjustments. Our authentication system also offers tampering localization by using the sum-product algorithm. |
| Author | Varodayan, David Girod, Bernd Yao-Chung Lin |
| Author_xml | – sequence: 1 surname: Yao-Chung Lin fullname: Yao-Chung Lin email: yclin79@stanfordalumni.org organization: Dept. of Electr. Eng., Stanford Univ., Stanford, CA, USA – sequence: 2 givenname: David surname: Varodayan fullname: Varodayan, David email: varodayan@hp.com organization: Hewlett-Packard Labs., Palo Alto, CA, USA – sequence: 3 givenname: Bernd surname: Girod fullname: Girod, Bernd email: bgirod@stanford.edu organization: Dept. of Electr. Eng., Stanford Univ., Stanford, CA, USA |
| BackLink | http://pascal-francis.inist.fr/vibad/index.php?action=getRecordDetail&idt=25473122$$DView record in Pascal Francis https://www.ncbi.nlm.nih.gov/pubmed/21609882$$D View this record in MEDLINE/PubMed |
| BookMark | eNp9kE1LAzEQhoMoaqt3QZC9iKetmWyyuzlK_SoUFGzPIZtMa2S7q0n24L93a1sFD55mmHnegXkGZL9pGyTkDOgIgMrr2eR5xCjAiIEoBIg9cgySQ0opZ_t9T0WRFsDlERmE8EYpcAH5ITlikFNZluyY8MlKLzG56eIrNtEZHV3bJPPgmmVy60L0ruoi2uSl7bzBZNzafnNCDha6Dni6rUMyv7-bjR_T6dPDZHwzTU3Gy5ja3AjUwpSaW2kzySpWMiwtK6ktqhKsEJrnLGPCVsb0I4FmgSiZ1lZWmGdDcrW5--7bjw5DVCsXDNa1brDtgpLAOMtkIXvyYkt21Qqtevdupf2n2j3aA5dbQAej64XXjXHhlxO8yICtuXzDGd-G4HGhjIvfUqLXrlZA1dq86s2rtXm1Nd8H6Z_g7vY_kfNNxCHiDy6KgsmMZl--AIz6 |
| CODEN | IIPRE4 |
| CitedBy_id | crossref_primary_10_1017_ATSIP_2012_2 crossref_primary_10_1109_JSAIT_2024_3393429 crossref_primary_10_3233_JIFS_169902 crossref_primary_10_3390_e23080983 crossref_primary_10_1049_el_2012_2470 crossref_primary_10_1016_j_sigpro_2015_04_013 crossref_primary_10_1007_s11042_017_5130_y crossref_primary_10_1007_s11042_015_2722_2 crossref_primary_10_1007_s11277_015_2594_9 crossref_primary_10_1109_TIT_2017_2688348 crossref_primary_10_1007_s41870_020_00477_x crossref_primary_10_1016_j_dsp_2017_08_009 crossref_primary_10_1049_iet_ipr_2015_0779 crossref_primary_10_1016_j_image_2019_115642 crossref_primary_10_1007_s11042_017_5569_x crossref_primary_10_1016_j_ijleo_2019_04_074 crossref_primary_10_1109_TIP_2014_2372473 crossref_primary_10_1016_j_jisa_2016_09_001 crossref_primary_10_1080_01611194_2019_1582117 |
| Cites_doi | 10.1016/j.imavis.2004.02.006 10.1109/TIT.1986.1057194 10.1109/ICIP.1998.723518 10.1109/TIP.2009.2028251 10.1109/TMM.2003.811621 10.1109/TIP.2006.881948 10.1109/18.910572 10.1109/ICASSP.2003.1199107 10.1109/MMCS.1999.778542 10.1016/j.sigpro.2006.03.012 10.1109/ICIP.2007.4379535 10.1109/30.826378 10.1109/18.720540 10.1109/TIT.1973.1055037 10.1109/MSP.2008.931079 10.1117/12.371217 10.1109/ICCIT.2008.12 10.1109/PCS.2009.5167462 10.1109/TSP.2005.855406 10.1109/ICASSP.2001.941335 10.1109/ICIP.2003.1246725 10.1109/ICICS.2005.1689139 10.1109/TIFS.2006.873601 10.1109/HIS.2009.204 10.1109/ICIP.2000.899541 10.1109/TIT.1987.1057383 10.1109/MMSP.1998.738950 10.1109/MMCS.1999.778274 10.1109/76.905982 10.1109/MUE.2009.42 10.1109/ICDCSW.2003.1203613 10.1109/ICIP.1996.560429 10.1109/ICIP.1996.560425 10.1117/12.807352 10.1145/1161366.1161378 10.1109/ITCC.2000.844203 10.1109/ISDA.2008.66 10.1109/ICIP.1996.560423 10.1109/LCOMM.2002.804244 10.1109/TIT.1976.1055638 10.1109/TSP.2005.855414 10.1109/6046.923823 10.1145/357744.357893 |
| ContentType | Journal Article |
| Copyright | 2015 INIST-CNRS |
| Copyright_xml | – notice: 2015 INIST-CNRS |
| DBID | 97E RIA RIE AAYXX CITATION IQODW CGR CUY CVF ECM EIF NPM 7X8 |
| DOI | 10.1109/TIP.2011.2157515 |
| DatabaseName | IEEE All-Society Periodicals Package (ASPP) 2005–Present IEEE All-Society Periodicals Package (ASPP) 1998–Present IEEE Electronic Library (IEL) CrossRef Pascal-Francis Medline MEDLINE MEDLINE (Ovid) MEDLINE MEDLINE PubMed MEDLINE - Academic |
| DatabaseTitle | CrossRef MEDLINE Medline Complete MEDLINE with Full Text PubMed MEDLINE (Ovid) MEDLINE - Academic |
| DatabaseTitleList | MEDLINE MEDLINE - Academic |
| Database_xml | – sequence: 1 dbid: NPM name: PubMed url: http://www.ncbi.nlm.nih.gov/entrez/query.fcgi?db=PubMed sourceTypes: Index Database – sequence: 2 dbid: RIE name: IEEE Electronic Library (IEL) url: https://ieeexplore.ieee.org/ sourceTypes: Publisher – sequence: 3 dbid: 7X8 name: MEDLINE - Academic url: https://search.proquest.com/medline sourceTypes: Aggregation Database |
| DeliveryMethod | fulltext_linktorsrc |
| Discipline | Applied Sciences Engineering |
| EISSN | 1941-0042 |
| EndPage | 283 |
| ExternalDocumentID | 21609882 25473122 10_1109_TIP_2011_2157515 5772930 |
| Genre | orig-research Journal Article |
| GroupedDBID | --- -~X .DC 0R~ 29I 4.4 53G 5GY 5VS 6IK 97E AAJGR AARMG AASAJ AAWTH ABAZT ABFSI ABQJQ ABVLG ACGFO ACGFS ACIWK AENEX AETIX AGQYO AGSQL AHBIQ AI. AIBXA AKJIK AKQYR ALLEH ALMA_UNASSIGNED_HOLDINGS ASUFR ATWAV BEFXN BFFAM BGNUA BKEBE BPEOZ CS3 DU5 E.L EBS EJD F5P HZ~ H~9 ICLAB IFIPE IFJZH IPLJI JAVBF LAI M43 MS~ O9- OCL P2P RIA RIE RNS TAE TN5 VH1 AAYXX CITATION IQODW RIG AAYOK CGR CUY CVF ECM EIF NPM PKN Z5M 7X8 |
| ID | FETCH-LOGICAL-c348t-d6c5ea5c8a4d9d392b282e8d280d7b81d55a462325dbccd7b5ecfee92aad9be63 |
| IEDL.DBID | RIE |
| ISICitedReferencesCount | 24 |
| ISICitedReferencesURI | http://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=Summon&SrcAuth=ProQuest&DestLinkType=CitingArticles&DestApp=WOS_CPL&KeyUT=000298325500023&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D |
| ISSN | 1057-7149 1941-0042 |
| IngestDate | Sun Sep 28 06:40:28 EDT 2025 Wed Feb 19 01:48:08 EST 2025 Mon Jul 21 09:14:54 EDT 2025 Sat Nov 29 03:20:46 EST 2025 Tue Nov 18 22:35:39 EST 2025 Tue Aug 26 16:57:30 EDT 2025 |
| IsDoiOpenAccess | false |
| IsOpenAccess | true |
| IsPeerReviewed | true |
| IsScholarly | true |
| Issue | 1 |
| Keywords | image authentication Image projection sum-product algorithm Source coding Warping Authentication Distributed source signal Robustness Decoding Localization EM algorithm Distributed source coding |
| Language | English |
| License | https://ieeexplore.ieee.org/Xplorehelp/downloads/license-information/IEEE.html CC BY 4.0 |
| LinkModel | DirectLink |
| MergedId | FETCHMERGED-LOGICAL-c348t-d6c5ea5c8a4d9d392b282e8d280d7b81d55a462325dbccd7b5ecfee92aad9be63 |
| Notes | ObjectType-Article-1 SourceType-Scholarly Journals-1 ObjectType-Feature-2 content type line 23 |
| PMID | 21609882 |
| PQID | 912423979 |
| PQPubID | 23479 |
| PageCount | 11 |
| ParticipantIDs | pascalfrancis_primary_25473122 ieee_primary_5772930 proquest_miscellaneous_912423979 crossref_citationtrail_10_1109_TIP_2011_2157515 pubmed_primary_21609882 crossref_primary_10_1109_TIP_2011_2157515 |
| PublicationCentury | 2000 |
| PublicationDate | 2012-Jan. 2012-1-00 2012 2012-Jan 20120101 |
| PublicationDateYYYYMMDD | 2012-01-01 |
| PublicationDate_xml | – month: 01 year: 2012 text: 2012-Jan. |
| PublicationDecade | 2010 |
| PublicationPlace | New York, NY |
| PublicationPlace_xml | – name: New York, NY – name: United States |
| PublicationTitle | IEEE transactions on image processing |
| PublicationTitleAbbrev | TIP |
| PublicationTitleAlternate | IEEE Trans Image Process |
| PublicationYear | 2012 |
| Publisher | IEEE Institute of Electrical and Electronics Engineers |
| Publisher_xml | – name: IEEE – name: Institute of Electrical and Electronics Engineers |
| References | ref13 ref56 ref12 ref15 ref14 ref53 ref52 zhang (ref31) 2009; 2 kailasanathan (ref23) 2001 lin (ref55) 2010 han (ref51) 1998; 44 ref16 ref19 ref18 lin (ref11) 1998 lin (ref54) 2007 ref50 lou (ref24) 2000; 46 ref46 ref45 ref42 ref44 ref49 ref8 ref7 ref9 lukas (ref4) 2003 ref3 ref6 ref5 ref40 oostveen (ref17) 2001 ref35 ref34 ref37 ref36 ref30 ref33 ref32 ref2 ref39 ref38 aaron (ref57) 2004 vetro (ref48) 2009 liang (ref1) 2005; 2 ref26 ref25 ref20 ref22 ref21 sun (ref43) 2002 ref28 ref27 ref29 martinian (ref47) 2005 lin (ref10) 1998 lu (ref41) 2004; 1 |
| References_xml | – year: 2004 ident: ref57 article-title: Transform-domain Wyner-Ziv codec for video publication-title: Proc SPIE Conf Visual Communications and Image Processing – ident: ref56 doi: 10.1016/j.imavis.2004.02.006 – ident: ref49 doi: 10.1109/TIT.1986.1057194 – ident: ref37 doi: 10.1109/ICIP.1998.723518 – ident: ref44 doi: 10.1109/TIP.2009.2028251 – ident: ref15 doi: 10.1109/TMM.2003.811621 – ident: ref36 doi: 10.1109/TIP.2006.881948 – ident: ref53 doi: 10.1109/18.910572 – ident: ref30 doi: 10.1109/ICASSP.2003.1199107 – start-page: 293 year: 2009 ident: ref48 publication-title: Securing Biometric Data – ident: ref21 doi: 10.1109/MMCS.1999.778542 – ident: ref46 doi: 10.1016/j.sigpro.2006.03.012 – ident: ref40 doi: 10.1109/ICIP.2007.4379535 – volume: 46 start-page: 31 year: 2000 ident: ref24 article-title: Fault resilient and compression tolerant digital signature for image authentication publication-title: IEEE Trans Consumer Electronics doi: 10.1109/30.826378 – volume: 1 start-page: 731 year: 2004 ident: ref41 article-title: Robust mesh-based hashing for copy detection and tracing of images publication-title: Proc IEEE Int Conf Multimedia and Expo – year: 2003 ident: ref4 article-title: Estimation of primary quantization matrix in double compressed JPEG images publication-title: Digital Forensic Research Workshop – volume: 44 start-page: 2300 year: 1998 ident: ref51 article-title: Statistical inference under multiterminal data compression publication-title: IEEE Trans Inf Theory doi: 10.1109/18.720540 – ident: ref2 doi: 10.1109/TIT.1973.1055037 – ident: ref3 doi: 10.1109/MSP.2008.931079 – ident: ref16 doi: 10.1117/12.371217 – ident: ref27 doi: 10.1109/ICCIT.2008.12 – year: 2002 ident: ref43 article-title: A new semi-fragile image authentication framework combining ECC and PKI infrastructure publication-title: Proc IEEE Int Symp Circuits and Syst – ident: ref42 doi: 10.1109/PCS.2009.5167462 – ident: ref5 doi: 10.1109/TSP.2005.855406 – year: 2007 ident: ref54 article-title: Spatial models for localization of image tampering using distributed source codes publication-title: Proc Picture Coding Symp – ident: ref7 doi: 10.1109/ICASSP.2001.941335 – ident: ref29 doi: 10.1109/ICIP.2003.1246725 – volume: 2 start-page: 105 year: 2009 ident: ref31 article-title: Content based image hashing robust to geometric transformations publication-title: Proc Int Symp Electronic Commerce and Security – ident: ref18 doi: 10.1109/ICICS.2005.1689139 – year: 2001 ident: ref23 article-title: Image authentication surviving acceptable modifications using statistical measures and k-mean segmentation publication-title: Workshop on Nonlinear Signal and Image Process – ident: ref32 doi: 10.1109/TIFS.2006.873601 – ident: ref34 doi: 10.1109/HIS.2009.204 – ident: ref28 doi: 10.1109/ICIP.2000.899541 – ident: ref50 doi: 10.1109/TIT.1987.1057383 – start-page: 121 year: 2001 ident: ref17 article-title: Visual hashing of video: Applications and techniques publication-title: Proc SPIE Conf Apps Digital Image Process – ident: ref39 doi: 10.1109/MMSP.1998.738950 – volume: 2 start-page: 1174 year: 2005 ident: ref1 article-title: Pollution in P2P file sharing systems publication-title: Proc IEEE InfoCom – ident: ref38 doi: 10.1109/MMCS.1999.778274 – ident: ref12 doi: 10.1109/76.905982 – year: 2005 ident: ref47 article-title: Secure biometrics via syndromes publication-title: Allerton Conf Communications Control and Computing – ident: ref35 doi: 10.1109/MUE.2009.42 – start-page: 49 year: 1998 ident: ref10 article-title: Generating robust digital signature for image/video authentication publication-title: ACM Multimedia Multimedia and Security Workshop – ident: ref13 doi: 10.1109/ICDCSW.2003.1203613 – ident: ref6 doi: 10.1109/ICIP.1996.560429 – ident: ref20 doi: 10.1109/ICIP.1996.560425 – ident: ref52 doi: 10.1117/12.807352 – ident: ref19 doi: 10.1145/1161366.1161378 – ident: ref22 doi: 10.1109/ITCC.2000.844203 – ident: ref26 doi: 10.1109/ISDA.2008.66 – ident: ref8 doi: 10.1109/ICIP.1996.560423 – ident: ref45 doi: 10.1109/LCOMM.2002.804244 – ident: ref9 doi: 10.1109/TIT.1976.1055638 – year: 1998 ident: ref11 article-title: A robust image authentication method surviving JPEG lossy compression publication-title: Proc SPIE Conf Storage and Retrieval for Image and Video Database – ident: ref33 doi: 10.1109/TSP.2005.855414 – year: 2010 ident: ref55 publication-title: Image Authentication Using Distributed Source Coding – ident: ref25 doi: 10.1109/6046.923823 – ident: ref14 doi: 10.1145/357744.357893 |
| SSID | ssj0014516 |
| Score | 2.199075 |
| Snippet | We present a novel approach using distributed source coding for image authentication. The key idea is to provide a Slepian-Wolf encoded quantized image... |
| SourceID | proquest pubmed pascalfrancis crossref ieee |
| SourceType | Aggregation Database Index Database Enrichment Source Publisher |
| StartPage | 273 |
| SubjectTerms | Algorithms Applied sciences Authentication Brightness Coding, codes Cryptography Decoding Distributed source coding EM algorithm Exact sciences and technology image authentication Image coding Image Enhancement - methods Image Interpretation, Computer-Assisted - methods Image processing Image reconstruction Information Storage and Retrieval - methods Information, signal and communications theory Pattern Recognition, Automated - methods Reproducibility of Results Security Measures Sensitivity and Specificity Signal and communications theory Signal processing Source coding sum-product algorithm Telecommunications and information theory Transform coding |
| Title | Image Authentication Using Distributed Source Coding |
| URI | https://ieeexplore.ieee.org/document/5772930 https://www.ncbi.nlm.nih.gov/pubmed/21609882 https://www.proquest.com/docview/912423979 |
| Volume | 21 |
| WOSCitedRecordID | wos000298325500023&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D |
| hasFullText | 1 |
| inHoldings | 1 |
| isFullTextHit | |
| isPrint | |
| journalDatabaseRights | – providerCode: PRVIEE databaseName: IEEE Electronic Library (IEL) customDbUrl: eissn: 1941-0042 dateEnd: 99991231 omitProxy: false ssIdentifier: ssj0014516 issn: 1057-7149 databaseCode: RIE dateStart: 19920101 isFulltext: true titleUrlDefault: https://ieeexplore.ieee.org/ providerName: IEEE |
| link | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV3da9swED-60oftYW2TrXM_gh_6MqgXR5Ys6XGkLS2UkocM8mZk6QKDLSlN0r-_d7LjrrAV9mZsCYs72fe7D90P4Fx6FHZkuM2-LDKpjM-ccnVGSDmnhfvaYGQtudP392Y2s5MduOjOwiBiLD7Db3wZc_lh6TccKiPnnaBgQQ76O611c1aryxgw4WzMbCqdaYL925RkbofT20nTq5PMmyb7HRsAl7k1RryyRpFehYsj3YrkM2-ILf6NPKMFut7_v7UfwMcWaabfm61xCDu46MF-izrT9pte9eDDHy0J-yBvf9MfJuXIGdcRNQG9NBYWpJfcZJf5sXh-DPqn4yXbvk_w4_pqOr7JWmaFzBfSrLNQeoVOeeNksIEgUk2eF5ogTB50TRBWKScJGAkVau_plkI_R7TCuWBrLIvPsLtYLvALpKHU5GN5a-dyLgntuSL3dUEoC5XNbY4JDLcSrnzbdpzZL35V0f3IbUXqqVg9VaueBL52Mx6alhtvjO2zqLtxrZQTGLxSYvdcMNXySIgE0q1WK_qeOEniFrjcrCo7YoRptU3gqNH2y-R20xz__aUn8J6WJpr4zCnsrh83eAZ7_mn9c_U4oD07M4O4Z58BM8fk7Q |
| linkProvider | IEEE |
| linkToHtml | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV3da9swED9CV9j60HbN2npdMz_sZTCvjizF0mPJFhKahT5k0DcjSxcotEnJR__-3smOt8A22JuxJSzuZN_vPnQ_gE_SoTBdzW32ZZZIpV1ilS0TQsopLdyVGgNryTifTPTdnbltwZfmLAwihuIz_MqXIZfvF27DoTJy3gkKZuSgv1JSim51WqvJGTDlbMhtqjzJCfhvk5KpuZqObqtunWTgcrLgoQVwLzVaix17FAhWuDzSrkhCs4ra4u_YM9igwdH_rf4YDmusGV9Xm-MttHB-Akc17ozrr3p1Age_NSVsgxw90j8m5tgZVxJVIb04lBbE37jNLjNk8fwQ9o_7C7Z-7-Dn4Pu0P0xqboXEZVKvE99zCq1y2kpvPIGkknwv1F7o1OclgVilrCRoJJQvnaNbCt0M0QhrvSmxl53C3nwxx3OIfS8nL8sZM5MzSXjPZqkrM8JZqExqUozgaivhwtWNx5n_4qEIDkhqClJPweopavVE8LmZ8VQ13fjH2DaLuhlXSzmCzo4Sm-eCyZa7QkQQb7Va0BfFaRI7x8VmVZguY0yTmwjOKm3_mlxvmvd_fulHeD2c_hgX49Hk5gLe0DJFFa35AHvr5QYvYd89r-9Xy07YuS_eTOdM |
| openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Image+Authentication+Using+Distributed+Source+Coding&rft.jtitle=IEEE+transactions+on+image+processing&rft.au=LIN%2C+Yao-Chung&rft.au=VARODAYAN%2C+David&rft.au=GIROD%2C+Bernd&rft.date=2012&rft.pub=Institute+of+Electrical+and+Electronics+Engineers&rft.issn=1057-7149&rft.volume=21&rft.issue=1&rft.spage=273&rft.epage=283&rft_id=info:doi/10.1109%2FTIP.2011.2157515&rft.externalDBID=n%2Fa&rft.externalDocID=25473122 |
| thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1057-7149&client=summon |
| thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1057-7149&client=summon |
| thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1057-7149&client=summon |