메뉴 건너뛰기




Volumn 12, Issue 2, 2003, Pages 284-291

One-dimensional neighborhood forming strategy for fragile watermarking

Author keywords

[No Author keywords available]

Indexed keywords

BINARY WATERMARK; CROPPING ATTACK; FRAGILE WATERMARKING; THWART VECTOR QUANTIZATION; WATERMARK EXTRACTION PROCESS;

EID: 0037721337     PISSN: 10179909     EISSN: 1560229X     Source Type: Journal    
DOI: 10.1117/1.1557156     Document Type: Article
Times cited : (36)

References (19)
  • 1
    • 0035927557 scopus 로고    scopus 로고
    • Efficient and robust water-marking algorithm with vector quantisation
    • (June)
    • H. C. Huang, F. H. Wang, and J. S. Pan, "Efficient and robust water-marking algorithm with vector quantisation," Electron. Lett. 37(13), 826-828 (June 2001).
    • (2001) Electron. Lett. , vol.37 , Issue.13 , pp. 826-828
    • Huang, H.C.1    Wang, F.H.2    Pan, J.S.3
  • 2
    • 0034442841 scopus 로고    scopus 로고
    • Efficient detection of a spatial spread-spectrum watermark in MPEG vedio streams
    • T. Kalker and J. Haitsma, "Efficient detection of a spatial spread-spectrum watermark in MPEG vedio streams," Proc. IEEE Int. Conf. Image Process. 1, 434-437 (2000).
    • (2000) Proc. IEEE Int. Conf. Image Process. , vol.1 , pp. 434-437
    • Kalker, T.1    Haitsma, J.2
  • 4
    • 0032223822 scopus 로고    scopus 로고
    • A robust image authentication method surviving JPEG lossy compression
    • C. Y. Lin and S. F. Chang, "A robust image authentication method surviving JPEG lossy compression," Proc. SPIE 3312, 296-307 (1998).
    • (1998) Proc. SPIE , vol.3312 , pp. 296-307
    • Lin, C.Y.1    Chang, S.F.2
  • 5
    • 0035509773 scopus 로고    scopus 로고
    • A class of authentication digital watermarks for secure multimedia communication
    • L. Xie and G. R. Arce, "A class of authentication digital watermarks for secure multimedia communication," IEEE Trans. Image Process. 10(11), 1754-1764 (2001).
    • (2001) IEEE Trans. Image Process. , vol.10 , Issue.11 , pp. 1754-1764
    • Xie, L.1    Arce, G.R.2
  • 6
    • 0035169533 scopus 로고    scopus 로고
    • Toward a secure public-key blockwise fragile authentication watermarking
    • P. S. L. M. Barreto, H. Y. Kim, and V. Rijmen, "Toward a secure public-key blockwise fragile authentication watermarking," Proc. IEEE Intl. Conf. Image Process. 2, 494-497 (2001).
    • (2001) Proc. IEEE Intl. Conf. Image Process. , vol.2 , pp. 494-497
    • Barreto, P.S.L.M.1    Kim, H.Y.2    Rijmen, V.3
  • 8
    • 0034442403 scopus 로고    scopus 로고
    • Image authenticity and integrity verification via content-based watermarks and a public key cryptosystem
    • C. T. Li, D. C. Lou, and T. H. Chen, "Image authenticity and integrity verification via content-based watermarks and a public key cryptosystem," Proc. IEEE Int. Conf. Image Process. 3, 694-697 (2000).
    • (2000) Proc. IEEE Int. Conf. Image Process. , vol.3 , pp. 694-697
    • Li, C.T.1    Lou, D.C.2    Chen, T.H.3
  • 9
    • 0031378592 scopus 로고    scopus 로고
    • An invisible watermarking technique for image verification
    • M. Yeung and F. Minzter, "An invisible watermarking technique for image verification," Proc. IEEE Intl. Conf. Image Process. 1, 680-683 (1997).
    • (1997) Proc. IEEE Intl. Conf. Image Process. , vol.1 , pp. 680-683
    • Yeung, M.1    Minzter, F.2
  • 10
    • 0033682895 scopus 로고    scopus 로고
    • Secret and public key authentication watermarking schemes that resist vector quantization attack
    • P. W. Wong and N. Memom, "Secret and public key authentication watermarking schemes that resist vector quantization attack," Proc. SPIE 3971, 417-427 (2000).
    • (2000) Proc. SPIE , vol.3971 , pp. 417-427
    • Wong, P.W.1    Memom, N.2
  • 11
    • 29144534942 scopus 로고    scopus 로고
    • Futhur attack on Yeung-Mintzer watermarking scheme
    • J. Fridrich, M. Goljan, and N. Memom, "Futhur attack on Yeung-Mintzer watermarking scheme," Proc. SPIE, (2000).
    • (2000) Proc. SPIE
    • Fridrich, J.1    Goljan, M.2    Memom, N.3
  • 12
    • 0033872149 scopus 로고    scopus 로고
    • Counterfeiting attacks on oblivious block-wise independent invisible watermarking schemes
    • (Mar.)
    • M. Holliman and N. Memon, "Counterfeiting attacks on oblivious block-wise independent invisible watermarking schemes," IEEE Trans. Image Process. 9, 432-441 (Mar. 2000).
    • (2000) IEEE Trans. Image Process. , vol.9 , pp. 432-441
    • Holliman, M.1    Memon, N.2
  • 15
    • 0032312612 scopus 로고    scopus 로고
    • A public key watermark for image verification and authentication
    • P. W. Wong, "A public key watermark for image verification and authentication," Proc. IEEE Intl. Conf. Image Process. 1, 455-459 (1998).
    • (1998) Proc. IEEE Intl. Conf. Image Process. , vol.1 , pp. 455-459
    • Wong, P.W.1
  • 16
    • 0017930809 scopus 로고
    • A method for obtaining digital signatures and public key cryptosystems
    • R. L. Rivest, A. Shamir, and L. Adleman, "A method for obtaining digital signatures and public key cryptosystems," Commun. ACM 21, 120-126 (1978).
    • (1978) Commun. ACM , vol.21 , pp. 120-126
    • Rivest, R.L.1    Shamir, A.2    Adleman, L.3
  • 17
    • 0035159824 scopus 로고    scopus 로고
    • A hierarchical image authentication watermark with improved localization and security
    • M. U. Celik, G. Sharma, E. Saber, and A. M. Tekalp, "A hierarchical image authentication watermark with improved localization and security," Proc. IEEE Int. Conf. Image Process. 2, 502-505 (2001).
    • (2001) Proc. IEEE Int. Conf. Image Process. , vol.2 , pp. 502-505
    • Celik, M.U.1    Sharma, G.2    Saber, E.3    Tekalp, A.M.4
  • 18
    • 0033601660 scopus 로고    scopus 로고
    • Fragile imperceptible digital watermark with privacy control
    • D. Coppersmith, F. Mintzer, C. Tresser, C. W. Wu, and M. Yeung, "Fragile imperceptible digital watermark with privacy control," Proc. SPIE 3657, 79-84 (1999).
    • (1999) Proc. SPIE , vol.3657 , pp. 79-84
    • Coppersmith, D.1    Mintzer, F.2    Tresser, C.3    Wu, C.W.4    Yeung, M.5


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.