메뉴 건너뛰기




Volumn 86, Issue 6, 1998, Pages 1064-1087

Multimedia data-embedding and watermarking technologies

Author keywords

Copyright protection; Data embedding; Steganography; Watermarking

Indexed keywords

ALGORITHMS; COPYRIGHTS; DATA RECORDING; IMAGE ANALYSIS; IMAGE CODING; IMAGING TECHNIQUES; INFORMATION SERVICES; SECURITY OF DATA;

EID: 0032095654     PISSN: 00189219     EISSN: None     Source Type: Journal    
DOI: 10.1109/5.687830     Document Type: Article
Times cited : (803)

References (99)
  • 1
    • 0012085074 scopus 로고    scopus 로고
    • Information hiding
    • R. Anderson, Ed., Tokyo, Japan: Springer
    • R. Anderson, Ed., "Information hiding," in Lecture Notes in Computer Science. Tokyo, Japan: Springer, 1996.
    • (1996) Lecture Notes in Computer Science.
  • 2
    • 0030384775 scopus 로고    scopus 로고
    • Techniques for data hiding
    • W. Bender, D. Gruhl, N. Morimoto, and A. Lu, "Techniques for data hiding," IBM Syst. J., vol. 35, nos. 3 and 4, pp. 313-336, 1996.
    • (1996) IBM Syst. J. , vol.35 , Issue.3-4 , pp. 313-336
    • Bender, W.1    Gruhl, D.2    Morimoto, N.3    Lu, A.4
  • 3
    • 85008047913 scopus 로고    scopus 로고
    • Protecting ownership rights through digital watermarking
    • July
    • H. Berghel and L. O'Gorman, "Protecting ownership rights through digital watermarking," IEEE Computer Mag., pp. 101-103, July 1996.
    • (1996) IEEE Computer Mag. , pp. 101-103
    • Berghel, H.1    O'Gorman, L.2
  • 4
    • 0029694397 scopus 로고    scopus 로고
    • Digital watermarks for audio signals
    • Piscataway, NJ: IEEE Press
    • L. Boney, A. Tewfik, and K. Hamdy, "Digital watermarks for audio signals," in Proceedings of Multimedia'96. Piscataway, NJ: IEEE Press, 1996, pp. 473-480.
    • (1996) Proceedings of Multimedia'96. , pp. 473-480
    • Boney, L.1    Tewfik, A.2    Hamdy, K.3
  • 6
    • 0029394108 scopus 로고
    • Electronic marking and identification techniques to discourage document copying
    • Oct.
    • J. Brassil, S. Low, N. Maxemchuk, and L. O'Gorman, "Electronic marking and identification techniques to discourage document copying," IEEE J. Select. Areas Commun., vol. 13, pp. 1495-1504, Oct. 1995.
    • (1995) IEEE J. Select. Areas Commun. , vol.13 , pp. 1495-1504
    • Brassil, J.1    Low, S.2    Maxemchuk, N.3    O'Gorman, L.4
  • 8
    • 33646936122 scopus 로고    scopus 로고
    • Protecting publically-available images with a visible image watermark
    • Jan. 15
    • _, "Protecting publically-available images with a visible image watermark," IBM Research Rep. TC-20336(89918), Jan. 15, 1996.
    • (1996) IBM Research Rep. TC-20336(89918)
  • 10
    • 0002152920 scopus 로고
    • Assuring ownership rights for digital images
    • H. H. Breggemann and W. Gerhardt-Häckl, Eds. Vieweg, Germany
    • G. Caronni, "Assuring ownership rights for digital images," in Reliable IT Systems, H. H. Breggemann and W. Gerhardt-Häckl, Eds. Vieweg, Germany, 1995.
    • (1995) Reliable IT Systems
    • Caronni, G.1
  • 11
    • 0030409375 scopus 로고    scopus 로고
    • A content-based approach to image signature generation and authentication
    • M. Schneider and S.-F. Chang, "A content-based approach to image signature generation and authentication," in Proc. ICIP'96, vol. III, pp. 227-230.
    • Proc. ICIP'96 , vol.3 , pp. 227-230
    • Schneider, M.1    Chang, S.-F.2
  • 14
    • 0031362116 scopus 로고    scopus 로고
    • Secure spread spectrum watermarking for multimedia
    • see also Proc. ICIP'96, vol. III, pp. 243-246
    • I. Cox, J. Kilian, T. Leighton, and T. Shamoon, "Secure spread spectrum watermarking for multimedia," IEEE Trans. Image Processing, vol. 6, no. 12, pp. 1673-1687, 1997; see also Proc. ICIP'96, vol. III, pp. 243-246.
    • (1997) IEEE Trans. Image Processing , vol.6 , Issue.12 , pp. 1673-1687
    • Cox, I.1    Kilian, J.2    Leighton, T.3    Shamoon, T.4
  • 15
    • 84978940128 scopus 로고    scopus 로고
    • Can invisible watermarks resolve rightful ownership?
    • IBM Research Rep. RC20509, July 1996. . See also
    • S. Graver, N. Memon, B.-L. Yeo, and M. Yeung, "Can invisible watermarks resolve rightful ownership?" IBM Research Rep. RC20509, July 1996. (Available WWW: http://www.research.ibm.com:8080.) See also Proc. SPIE Storage and Retrieval for Image and Video Databases V, Feb. 1997, vol. 3022, pp. 310-321.
    • (1997) Proc. SPIE Storage and Retrieval for Image and Video Databases V, Feb. , vol.3022 , pp. 310-321
    • Graver, S.1    Memon, N.2    Yeo, B.-L.3    Yeung, M.4
  • 16
    • 33646917538 scopus 로고    scopus 로고
    • Resolving rightful ownerships with invisible watermarking techniques: Limitations, attacks, and implications
    • Mar.
    • _, "Resolving rightful ownerships with invisible watermarking techniques: Limitations, attacks, and implications," IBM Research Rep. RC 20755, Mar. 1997.
    • (1997) IBM Research Rep. RC 20755
  • 17
    • 0003494104 scopus 로고
    • Dept. of Electrical Engineering, Trinity College, Dublin, Tech. Rep.
    • C. Dautzenberg and F. Boland, "Watermarking images," Dept. of Electrical Engineering, Trinity College, Dublin, Tech. Rep., 1994.
    • (1994) Watermarking Images
    • Dautzenberg, C.1    Boland, F.2
  • 18
    • 84955596411 scopus 로고    scopus 로고
    • Fractal based image steganography
    • in R. Anderson, Ed., Tokyo, Japan: Springer
    • P. Davern and M. Scott, "Fractal based image steganography," in R. Anderson, Ed., Lecture Notes in Computer Science. Tokyo, Japan: Springer, 1996, pp. 279-294.
    • (1996) Lecture Notes in Computer Science , pp. 279-294
    • Davern, P.1    Scott, M.2
  • 19
    • 0017018484 scopus 로고
    • New directions in cryptography
    • W. Diffie and M. Hellman, "New directions in cryptography," IEEE Trans. Inform. Theory, vol. IT-22, pp. 644-654, 1976.
    • (1976) IEEE Trans. Inform. Theory , vol.IT-22 , pp. 644-654
    • Diffie, W.1    Hellman, M.2
  • 20
    • 0031147434 scopus 로고    scopus 로고
    • Spread-spectrum techniques for wireless communications
    • P. Flikkema, "Spread-spectrum techniques for wireless communications," IEEE Trans. Signal Processing, vol. 14, pp. 26-36, May 1997.
    • (1997) IEEE Trans. Signal Processing , vol.14 , pp. 26-36
    • Flikkema, P.1
  • 21
    • 0013086931 scopus 로고    scopus 로고
    • Center for Intelligent Systems & Dept. of Systems Science and Industrial Engineering, State Univ. of New York-Binghamton, preprint
    • J. Fridrich, "Methods for data hiding," Center for Intelligent Systems & Dept. of Systems Science and Industrial Engineering, State Univ. of New York-Binghamton, preprint. (Available: http://ssie.binghamton.edu/jirif/.)
    • Methods for Data Hiding
    • Fridrich, J.1
  • 22
    • 84958492575 scopus 로고
    • The information theoretical significance of spatial and temporal masking in video signals
    • B. Girod, 'The information theoretical significance of spatial and temporal masking in video signals," in Proc. SPIE Human Vision, Visual Processing, and Digital Display, 1989, vol. 1077, pp. 178-187.
    • (1989) Proc. SPIE Human Vision, Visual Processing, and Digital Display , vol.1077 , pp. 178-187
    • Girod, B.1
  • 23
    • 33646945414 scopus 로고    scopus 로고
    • submitted for U.S. patent
    • B. Girod and F. Härtung, submitted for U.S. patent.
    • Girod, B.1    Härtung, F.2
  • 27
    • 33646922934 scopus 로고    scopus 로고
    • D. Gruhl. (1996). Examples of affine embedding. [Online]. Available WWW: http://nif.www.media.mit.edu/ DataHiding/affine/affine.html.
    • (1996) Examples of Affine Embedding
    • Gruhl, D.1
  • 28
    • 0030384775 scopus 로고    scopus 로고
    • Techniques for data hiding
    • D. Gruhl, A. Lu, and W. Bender, 'Techniques for data hiding," IBM Syst. J., vol. 35, nos. 3 and 4, pp. 313-336, 1996.
    • (1996) IBM Syst. J. , vol.35 , Issue.3-4 , pp. 313-336
    • Gruhl, D.1    Lu, A.2    Bender, W.3
  • 30
    • 84898214331 scopus 로고    scopus 로고
    • Copyright protection in video delivery networks by watermarking of pre-compressed video
    • S. Fdida and M. Morganti, Eds. Tokyo, Japan: Springer
    • _, "Copyright protection in video delivery networks by watermarking of pre-compressed video," in Multimedia Applications, Services and Techniques-ECMAST'97, Lecture Notes in Computer Science, S. Fdida and M. Morganti, Eds. Tokyo, Japan: Springer, 1997, vol. 1242, pp. 423-436.
    • (1997) Multimedia Applications, Services and Techniques-ECMAST'97, Lecture Notes in Computer Science , vol.1242 , pp. 423-436
  • 32
    • 33646899976 scopus 로고    scopus 로고
    • Digital watermarking of uncompressed and compressed video
    • to appear in
    • _, "Digital watermarking of uncompressed and compressed video," Signal Processing, to appear in 1997.
    • (1997) Signal Processing
  • 40
    • 33646900284 scopus 로고
    • Information technology-Coding of moving pictures and associated audio for digital storage up to about 1.5 Mbits/s
    • "Information technology-Coding of moving pictures and associated audio for digital storage up to about 1.5 Mbits/s," ISO/IEC IS 11172, 1993.
    • (1993) ISO/IEC IS , pp. 11172
  • 41
    • 0027684995 scopus 로고
    • Signal compression based on models of human perception
    • Oct.
    • N. Jayant, J. Johnston, and R. Safranek, "Signal compression based on models of human perception," Proc. IEEE, vol. 81, pp. 1385-1422, Oct. 1993.
    • (1993) Proc. IEEE , vol.81 , pp. 1385-1422
    • Jayant, N.1    Johnston, J.2    Safranek, R.3
  • 42
    • 0006480295 scopus 로고
    • Wideband coding-Perceptual considerations for speech and music
    • S. Furui and M. Sondhi, Eds. New York: Marcel Dekker
    • J. Johnston and K. Brandenburg, "Wideband coding-Perceptual considerations for speech and music," in Advances in Speech Signal Processing, S. Furui and M. Sondhi, Eds. New York: Marcel Dekker, 1992.
    • (1992) Advances in Speech Signal Processing
    • Johnston, J.1    Brandenburg, K.2
  • 45
    • 0037878198 scopus 로고    scopus 로고
    • M. Kuhn. (1997). StirMark, [Online]. Available WWW: http://www.cl.carn.ac.uk/-fapp2/ watermarking/image.watermarking/stirmark.
    • (1997) StirMark
    • Kuhn, M.1
  • 48
    • 0019266099 scopus 로고
    • Contrast masking in human vision
    • Dec.
    • G. Legge and J. Foley, "Contrast masking in human vision," J. Opt. Soc. Amer., vol. 70, no. 12, pp. 1458-1471, Dec. 1990.
    • (1990) J. Opt. Soc. Amer. , vol.70 , Issue.12 , pp. 1458-1471
    • Legge, G.1    Foley, J.2
  • 49
    • 61849153506 scopus 로고
    • Document marking and identification using both line and word shifting
    • Boston, MA, Apr.
    • S. Low, N. Maxemchuk, J. Brassil, and L. O'Gorman, "Document marking and identification using both line and word shifting," in Proc. Infocom'95, Boston, MA, Apr. 1995. (Available WWW: http://www.research.att.com:80/ lateinfo/projects/ecom.html.)
    • (1995) Proc. Infocom'95
    • Low, S.1    Maxemchuk, N.2    Brassil, J.3    O'Gorman, L.4
  • 52
    • 85027148221 scopus 로고    scopus 로고
    • Digital signature of color images using amplitude modulation
    • M. Kutter, F. Jordan, and F. Bossen, "Digital signature of color images using amplitude modulation," in Proc. SPIE-EI97, 1997, pp. 518-526.
    • (1997) Proc. SPIE-EI97 , pp. 518-526
    • Kutter, M.1    Jordan, F.2    Bossen, F.3
  • 55
    • 0000370347 scopus 로고
    • Video-steganography: How to embed a signature in a picture
    • Jan.
    • _, "Video-steganography: How to embed a signature in a picture," in Proc. IMA Intellectual Property, Jan. 1994, vol. 1, no. 1, pp. 187-206.
    • (1994) Proc. IMA Intellectual Property , vol.1 , Issue.1 , pp. 187-206
  • 56
    • 0028496330 scopus 로고
    • Electronic document distribution
    • Sept.
    • N. Maxemchuk, "Electronic document distribution," AT&T Tech. J., pp. 73-80, Sept. 1994.
    • (1994) AT&T Tech. J. , pp. 73-80
    • Maxemchuk, N.1
  • 60
    • 0003629991 scopus 로고
    • NIST FIPS Pub. 180-1, Apr.
    • National Institute of Standards and Technology (NIST), Secure Hash Standard, NIST FIPS Pub. 180-1, Apr. 1995.
    • (1995) Secure Hash Standard
  • 61
    • 0027699710 scopus 로고
    • Wideband speech and audio coding
    • Nov.
    • P. Noll, "Wideband speech and audio coding," IEEE Commun. Mag., pp. 34-44, Nov. 1993.
    • (1993) IEEE Commun. Mag. , pp. 34-44
    • Noll, P.1
  • 63
    • 0031339601 scopus 로고    scopus 로고
    • Watermarking three-dimensional models
    • Seattle, WA, Nov. 9-13
    • _, "Watermarking three-dimensional models," in Proc. 5th ACM Int. Multimedia Conf., Seattle, WA, Nov. 9-13, 1997, pp. 261-272.
    • (1997) Proc. 5th ACM Int. Multimedia Conf. , pp. 261-272
  • 64
    • 0029706672 scopus 로고    scopus 로고
    • Embedding a seal into a picture under orthogonal wavelet transform
    • Piscataway, NJ: IEEE Press
    • J. Ohnishi and K. Matsui, "Embedding a seal into a picture under orthogonal wavelet transform," in Proceedings of Multimedia'96. Piscataway, NJ: IEEE Press, 1996., pp. 514-521.
    • (1996) Proceedings of Multimedia'96 , pp. 514-521
    • Ohnishi, J.1    Matsui, K.2
  • 71
    • 33646934169 scopus 로고    scopus 로고
    • Multimedia Communication Lab, Lucent Technologies, Bell Labs, Tech. Memo, Sept. See also Proc. SPIE/IS&T Electronic Imaging'97: Human Vision and Electronic Imaging, Feb. 1997, vol. 3022, pp. 310-321
    • C. Podilchuk and W. Zeng, "Digital image watermarking using visual models," Multimedia Communication Lab, Lucent Technologies, Bell Labs, Tech. Memo, Sept. 1996. See also Proc. SPIE/IS&T Electronic Imaging'97: Human Vision and Electronic Imaging, Feb. 1997, vol. 3022, pp. 310-321.
    • (1996) Digital Image Watermarking Using Visual Models
    • Podilchuk, C.1    Zeng, W.2
  • 72
    • 85018015036 scopus 로고    scopus 로고
    • Perceptual watermarking of still images
    • June
    • _, "Perceptual watermarking of still images," in Proc. IEEE Workshop Multimedia Signal Processing, June 1997, pp. 363-368.
    • (1997) Proc. IEEE Workshop Multimedia Signal Processing , pp. 363-368
  • 76
    • 0012397471 scopus 로고
    • Cryptography
    • J. van Leeuwen, Ed. Cambridge, MA: MIT Press, ch. 13
    • R. Rivest, "Cryptography," in Handbook of Theoretical Computer Science, vol. 1, J. van Leeuwen, Ed. Cambridge, MA: MIT Press, 1990, ch. 13, pp. 717-755. '
    • (1990) Handbook of Theoretical Computer Science , vol.1 , pp. 717-755
    • Rivest, R.1
  • 77
    • 78650922644 scopus 로고
    • The MD4 message digest algorithm
    • Tokyo, Japan: Springer
    • -, 'The MD4 message digest algorithm," in Advances in I Cryptology, CKYPTO'92. Tokyo, Japan: Springer, 1991, pp. 303-311.
    • (1991) Advances in I Cryptology, CKYPTO'92 , pp. 303-311
  • 82
    • 84955564864 scopus 로고    scopus 로고
    • Modulation and information hiding in images
    • R. Anderson, Ed., Information hiding, Tokyo, Japan: Springer
    • J. Smith and B. Comiskey, "Modulation and information hiding in images," in R. Anderson, Ed., "Information hiding," in Lecture Notes in Computer Science. Tokyo, Japan: Springer, 1996, pp. 207-226.
    • (1996) Lecture Notes in Computer Science , pp. 207-226
    • Smith, J.1    Comiskey, B.2
  • 83
    • 0003538515 scopus 로고    scopus 로고
    • Analysis of attacks on image watermarks with randomized coefficients
    • Princeton, NJ, Tech. Rep., May 17
    • H. Stone, "Analysis of attacks on image watermarks with randomized coefficients," NEC Research Institute, Princeton, NJ, Tech. Rep., May 17, 1996. (Available WWW: http://www.neci.nj.nec.com.)
    • (1996) NEC Research Institute
    • Stone, H.1
  • 85
    • 0031355236 scopus 로고    scopus 로고
    • Multiresolution video watermarking using perceptual models and scene segmentation
    • to be published. See also Proceedings ofllie IEEE International Conference on Image Processing 1997. Piscataway, NJ
    • M. Swanson, B. Zhu, and A. Tewfik, "Multiresolution video watermarking using perceptual models and scene segmentation," IEEE J. Select. Areas Commun., to be published. See also Proceedings ofllie IEEE International Conference on Image Processing 1997. Piscataway, NJ: 1997, vol. II, pp. 558-561.
    • (1997) IEEE J. Select. Areas Commun. , vol.2 , pp. 558-561
    • Swanson, M.1    Zhu, B.2    Tewfik, A.3
  • 87
    • 0032069486 scopus 로고    scopus 로고
    • Robust audio watermarking using perceptual masking
    • to be published
    • M. Swanson, B. Zhu, A. Tewfik, and L. Boney, "Robust audio watermarking using perceptual masking," Signal Process., to be published.
    • Signal Process.
    • Swanson, M.1    Zhu, B.2    Tewfik, A.3    Boney, L.4
  • 89
    • 0002197488 scopus 로고    scopus 로고
    • Encoding a hidden digital signature onto an audio signal using psychoacoustic masking
    • J. Tilki and A. Beex, "Encoding a hidden digital signature onto an audio signal using psychoacoustic masking," in Proc. 1996 7th Int. Conf. Sig. Proc. Appls. Tech., 1996, pp. 476-480.
    • (1996) Proc. 1996 7th Int. Conf. Sig. Proc. Appls. Tech. , pp. 476-480
    • Tilki, J.1    Beex, A.2
  • 95
    • 0029292158 scopus 로고
    • Image authentication for a slippery new age
    • Apr.
    • S. Wallon, "Image authentication for a slippery new age," Dr. Dobb'sJ., pp. 18-26 and 82-87, Apr. 1995.
    • (1995) Dr. Dobb'sJ. , pp. 18-26
    • Wallon, S.1
  • 97
    • 33646940789 scopus 로고    scopus 로고
    • A watermarking technique for digital imagery: Further studies
    • Las Vegas, NV, June 30-July 3
    • __, "A watermarking technique for digital imagery: Further studies," in Proc. Int. Conf. Imaging Science, Systems and Technology, Las Vegas, NV, June 30-July 3, 1997.
    • (1997) Proc. Int. Conf. Imaging Science, Systems and Technology


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.