메뉴 건너뛰기




Volumn 26, Issue 4, 2002, Pages 359-366

Recognition of image authenticity using significant DCT coefficients quantization

Author keywords

DCT; Image authentication; JPEG; Signature; Watermaking

Indexed keywords

COSINE TRANSFORMS; DIGITAL WATERMARKING; FEATURE EXTRACTION; PUBLIC KEY CRYPTOGRAPHY; VECTOR QUANTIZATION;

EID: 0036983914     PISSN: 03505596     EISSN: None     Source Type: Journal    
DOI: None     Document Type: Article
Times cited : (10)

References (10)
  • 2
    • 0027697301 scopus 로고
    • The trustworthy digital camera: Restoring credibility to the photographic image
    • Friedman, G. L. (1993) The Trustworthy Digital Camera: Restoring Credibility to the Photographic Image. IEEE Transactions on Consumer Electronics, 39, 4, p. 905-910.
    • (1993) IEEE Transactions on Consumer Electronics , vol.39 , Issue.4 , pp. 905-910
    • Friedman, G.L.1
  • 3
    • 0013106830 scopus 로고    scopus 로고
    • Structural digital signature for image authentication: An incidental distortion resistant scheme
    • Lu C. S. & Liao H. Y. (2000) Structural Digital Signature for Image Authentication: An Incidental Distortion Resistant Scheme. Proceedings of the Workshops on ACM multimedia, p. 115-118.
    • (2000) Proceedings of the Workshops on ACM Multimedia , pp. 115-118
    • Lu, C.S.1    Liao, H.Y.2
  • 4
    • 0032648596 scopus 로고    scopus 로고
    • Digital watermarking for telltale tamper proofing and authentication
    • Kundur D. & Hatzinakos D. (1999) Digital Watermarking for Telltale Tamper Proofing and Authentication. Proceedings of the IEEE, 87, 7, p. 1167-1180.
    • (1999) Proceedings of the IEEE , vol.87 , Issue.7 , pp. 1167-1180
    • Kundur, D.1    Hatzinakos, D.2
  • 5
    • 0030409375 scopus 로고    scopus 로고
    • A robust image content based digital signature for image authentication
    • Schneider M. & Chang, S. F. (1996) A Robust Image Content Based Digital Signature for Image Authentication. International Conference on Image Processing, 3, p. 227-230.
    • (1996) International Conference on Image Processing , vol.3 , pp. 227-230
    • Schneider, M.1    Chang, S.F.2
  • 7
    • 0035454036 scopus 로고    scopus 로고
    • Secure discrete cosine transform based technique for recoverable tamper proofing
    • Hung, K. L., Chang C. C. & Chen T. S. (2001) Secure Discrete Cosine Transform Based Technique for Recoverable Tamper Proofing. Optical Engineering, 40, 9, p. 1950-1958.
    • (2001) Optical Engineering , vol.40 , Issue.9 , pp. 1950-1958
    • Hung, K.L.1    Chang, C.C.2    Chen, T.S.3
  • 8
    • 0017930809 scopus 로고
    • A method for obtaining digital signatures and public-key cryptosystems
    • Rivest, R., Shamir, A. & Adleman L. (1978) A Method for Obtaining Digital Signatures and Public-key Cryptosystems. Communications of the ACM, 21, 2, p. 120-126.
    • (1978) Communications of the ACM , vol.21 , Issue.2 , pp. 120-126
    • Rivest, R.1    Shamir, A.2    Adleman, L.3
  • 9
    • 0004045578 scopus 로고
    • JPEG: Still image data compression standard
    • New York, Van Nostrand Reinhold, 1993
    • Pennebaker, W. B. & Mitchell J. L. (1993) JPEG: Still Image Data Compression Standard, New York, Van Nostrand Reinhold, 1993.
    • (1993)
    • Pennebaker, W.B.1    Mitchell, J.L.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.