메뉴 건너뛰기




Volumn 2, Issue , 2002, Pages

Fragile and semi-fragile image authentication based on image self-similarity

Author keywords

[No Author keywords available]

Indexed keywords

ALGORITHMS; FEATURE EXTRACTION; FINITE AUTOMATA; IMAGE COMPRESSION;

EID: 0036450244     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (13)

References (15)
  • 1
    • 0027697301 scopus 로고
    • The trustworthy digital camera: Restoring credibility to the photographic image
    • Nov.
    • G.L. Friedman, "The Trustworthy Digital Camera: restoring Credibility to The Photographic Image", IEEE Trans. Consumer Electron., PP. 905-910, Nov. 1993.
    • (1993) IEEE Trans. Consumer Electron. , pp. 905-910
    • Friedman, G.L.1
  • 2
    • 0032785523 scopus 로고    scopus 로고
    • Hidden digital watermarks in images
    • Jan.
    • C. T. Hsu and J.I. Wu, "Hidden Digital Watermarks in Images", IEEE Trans. On Image Processing, Vol. 8, PP. 56-68, Jan. 1999.
    • (1999) IEEE Trans. On Image Processing , vol.8 , pp. 56-68
    • Hsu, C.T.1    Wu, J.I.2
  • 3
    • 0343797942 scopus 로고    scopus 로고
    • Biblography of multimedia authentication research papers
    • [online]
    • C.-Y. Lin. "Biblography of multimedia authentication research papers." [online]. Available:http://www.ctr.columbia.edu/~cylin/auth/bibauth/html.
    • Lin, C.-Y.1
  • 4
    • 0003620778 scopus 로고
    • Introduction to automata theory, languages and computations
    • Addison-wesley Publishing Company
    • J.E. Hopcroft and J.D. Ullman. "Introduction to Automata Theory, Languages and computations". Addison-wesley Publishing Company, 1979
    • (1979)
    • Hopcroft, J.E.1    Ullman, J.D.2
  • 6
    • 0031343598 scopus 로고    scopus 로고
    • Finite state transformations of images
    • K. Culik II, J. Kari, "Finite State Transformations of images", Computer and Graphics, Pergamon,. Vol. 34.PP. 151-166, 1997.
    • (1997) Computer and Graphics, Pergamon , vol.34 , pp. 151-166
    • Culik K. II1    Kari, J.2
  • 9
    • 0029292158 scopus 로고
    • Information authentication for a slippery new images
    • April
    • S. Walton. "Information authentication for a slippery new images" Dr. Dobbs Journal. Vol.20 no.4. pp.16-26 April 1995.
    • (1995) Dr. Dobbs Journal , vol.20 , Issue.4 , pp. 16-26
    • Walton, S.1
  • 11
    • 0032117545 scopus 로고    scopus 로고
    • Invesible watermarking for image verification
    • July
    • M. Yeung and F. Mintzer. "Invesible watermarking for image verification" Journal of Electronic Imaging Vol.7 no.3 pp578-591 July 1998.
    • (1998) Journal of Electronic Imaging , vol.7 , Issue.3 , pp. 578-591
    • Yeung, M.1    Mintzer, F.2
  • 14
    • 0033601667 scopus 로고    scopus 로고
    • Content-based integrity protection of digital images
    • San Jose, CA; Jan.
    • M. P. Queluz, "Content-based integrity protection of digital images," in SPIE Conf. Security and Watermarking of Multimedia Contents, vol. 3657, San Jose, CA, pp. 85-93. Jan. 1999,
    • (1999) SPIE Conf. Security and Watermarking of Multimedia Contents , vol.3657 , pp. 85-93
    • Queluz, M.P.1
  • 15
    • 0035248504 scopus 로고    scopus 로고
    • A robust image authentication method distinguishing JPEG compression from malicious manipulation
    • February
    • C.-Y. Lin and S. F. Chang "A Robust Image Authentication Method Distinguishing JPEG Compression from Malicious Manipulation" IEEE Trans. on Circuits and Sys. of Video Tech. Vol. 1 no 2 February 2001.
    • (2001) IEEE Trans. on Circuits and Sys. of Video Tech. , vol.1 , Issue.2
    • Lin, C.-Y.1    Chang, S.F.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.