메뉴 건너뛰기




Volumn 67, Issue 2, 2003, Pages 131-140

Detecting and restoring the tampered images based on iteration-free fractal compression

Author keywords

Detecting and restoring a tampered image; Iteration free fractal image coding; Least significant bit

Indexed keywords

FRACTALS; IMAGE CODING; IMAGE COMPRESSION; IMAGE RECONSTRUCTION;

EID: 0038729637     PISSN: 01641212     EISSN: None     Source Type: Journal    
DOI: 10.1016/S0164-1212(02)00094-8     Document Type: Article
Times cited : (9)

References (19)
  • 3
    • 0033884717 scopus 로고    scopus 로고
    • Iteration-free fractal image coding based on efficient domain pool design
    • Chang H.T., Kuo C.J. Iteration-free fractal image coding based on efficient domain pool design. IEEE Trans. Image Process. 9(3):2000;329-339.
    • (2000) IEEE Trans. Image Process. , vol.9 , Issue.3 , pp. 329-339
    • Chang, H.T.1    Kuo, C.J.2
  • 4
    • 0032595065 scopus 로고    scopus 로고
    • Edge enhancement of remote image data in the DCT domain
    • Chen B., Latifi S., Kanai J. Edge enhancement of remote image data in the DCT domain. Image Vision Comput. 17(12):1999;913-921.
    • (1999) Image Vision Comput. , vol.17 , Issue.12 , pp. 913-921
    • Chen, B.1    Latifi, S.2    Kanai, J.3
  • 7
    • 0032648596 scopus 로고    scopus 로고
    • Digital watermarking for telltale tamper proofing and authentication
    • Kunder D., Hatzinakos D. Digital watermarking for telltale tamper proofing and authentication. Proc. IEEE. 87(7):1999;1167-1180.
    • (1999) Proc. IEEE , vol.87 , Issue.7 , pp. 1167-1180
    • Kunder, D.1    Hatzinakos, D.2
  • 8
    • 0035248504 scopus 로고    scopus 로고
    • A robust image authentication method distinguishing JPEG compression from malicious manipulation
    • Lin C.Y., Chang S.F. A robust image authentication method distinguishing JPEG compression from malicious manipulation. IEEE Trans. Circuits Syst. Video Technol. 11(2):2001;153-168.
    • (2001) IEEE Trans. Circuits Syst. Video Technol. , vol.11 , Issue.2 , pp. 153-168
    • Lin, C.Y.1    Chang, S.F.2
  • 9
    • 0018918171 scopus 로고
    • An algorithm for vector quantizer design
    • Linde Y., Buzo A., Gray R. An algorithm for vector quantizer design. IEEE Trans. Commun. 28:1980;84-95.
    • (1980) IEEE Trans. Commun. , vol.28 , pp. 84-95
    • Linde, Y.1    Buzo, A.2    Gray, R.3
  • 10
    • 0034140535 scopus 로고    scopus 로고
    • Fault resilient and compression tolerant digital signature for image authentication
    • Lou D.C., Liu J.L. Fault resilient and compression tolerant digital signature for image authentication. IEEE Trans. Consumer Electron. 46:2000;31-39.
    • (2000) IEEE Trans. Consumer Electron. , vol.46 , pp. 31-39
    • Lou, D.C.1    Liu, J.L.2
  • 11
    • 0013106830 scopus 로고    scopus 로고
    • Structural digital for image authentication: An incidental distortion resistant scheme
    • California, USA
    • Lu, C.S., Liao, H.Y., 2000. Structural digital for image authentication: An incidental distortion resistant scheme. In: Proceedings on ACM multimedia 2000 workshop, California, USA, pp. 115-118.
    • (2000) Proceedings on ACM Multimedia 2000 Workshop , pp. 115-118
    • Lu, C.S.1    Liao, H.Y.2
  • 12
    • 0003522356 scopus 로고    scopus 로고
    • New York, USA: M & T book, A Division of MIS! Press, Inc.
    • Nelson M., Gally J.L. The Data Compression Book. 1999;M & T book, A Division of MIS! Press, Inc. New York, USA.
    • (1999) The Data Compression Book
    • Nelson, M.1    Gally, J.L.2
  • 13
    • 0017930809 scopus 로고
    • A method for obtaining digital signatures and public-key cryptosystem
    • Rivest R.L., Shamir A., Addleman L. A method for obtaining digital signatures and public-key cryptosystem. Comm. ACM. 21(2):1978;120-126.
    • (1978) Comm. ACM , vol.21 , Issue.2 , pp. 120-126
    • Rivest, R.L.1    Shamir, A.2    Addleman, L.3
  • 14
    • 0030409375 scopus 로고    scopus 로고
    • A robust content based digital signature for image authentication
    • Schneider M., Chang S.F. A robust content based digital signature for image authentication. Proc. IEEE Int. Conf. Image Process. 3:1996;227-230.
    • (1996) Proc. IEEE Int. Conf. Image Process. , vol.3 , pp. 227-230
    • Schneider, M.1    Chang, S.F.2
  • 15
    • 0029292158 scopus 로고
    • Image authentication for a slippery new age
    • Walton S. Image authentication for a slippery new age. Dr. Dobb's J. 20:1995;18-26.
    • (1995) Dr. Dobb's J. , vol.20 , pp. 18-26
    • Walton, S.1
  • 16
    • 0032312612 scopus 로고    scopus 로고
    • A public key watermark for image verification and authentication
    • Wong P.W. A public key watermark for image verification and authentication. Proc. IEEE Int. Conf. Image Process. 1:1998;445-449.
    • (1998) Proc. IEEE Int. Conf. Image Process. , vol.1 , pp. 445-449
    • Wong, P.W.1
  • 19
    • 0031378592 scopus 로고    scopus 로고
    • An invisible watermarking technique for image verification
    • Yeung M.M., Mintzer F. An invisible watermarking technique for image verification. Proc. IEEE Int. Conf. Image Process. 2:1997;680-683.
    • (1997) Proc. IEEE Int. Conf. Image Process. , vol.2 , pp. 680-683
    • Yeung, M.M.1    Mintzer, F.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.