메뉴 건너뛰기




Volumn 2, Issue , 2004, Pages 931-934

Efficient oracle attacks on Yeung-Mintzer and variant authentication schemes

Author keywords

[No Author keywords available]

Indexed keywords

COLOR IMAGE PROCESSING; DIGITAL WATERMARKING; FUNCTION EVALUATION; MULTIMEDIA SYSTEMS; SECURITY OF DATA; SET THEORY; VECTOR QUANTIZATION;

EID: 11244341366     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (12)

References (12)
  • 2
    • 8644240462 scopus 로고    scopus 로고
    • Multimedia authentication and watermarking
    • D. Feng, W. C. Siu, and H. Zhang, Eds. Springer-Verlag, Ch. 7
    • B. B. Zhu and M. D. Swanson, "Multimedia Authentication and Watermarking," Multimedia Information Retrieval and Management, D. Feng, W. C. Siu, and H. Zhang, Eds. Springer-Verlag, 2003, Ch. 7, pp. 148-177.
    • (2003) Multimedia Information Retrieval and Management , pp. 148-177
    • Zhu, B.B.1    Swanson, M.D.2
  • 3
    • 0031378592 scopus 로고    scopus 로고
    • An invisible watermarking technique for image verification
    • M. M. Yeung and F. Mintzer, "An Invisible Watermarking Technique for Image Verification," IEEE Int. Conf. Image Processing, 1997, vol. 2, pp. 680-683.
    • (1997) IEEE Int. Conf. Image Processing , vol.2 , pp. 680-683
    • Yeung, M.M.1    Mintzer, F.2
  • 4
    • 0032117545 scopus 로고    scopus 로고
    • Invisible watermarking for image verification
    • July
    • M. M. Yeung and F. C. Mintzer. "Invisible Watermarking for Image Verification," J. Electronic Imaging, vol. 7, no. 3, pp. 578-591, July 1998.
    • (1998) J. Electronic Imaging , vol.7 , Issue.3 , pp. 578-591
    • Yeung, M.M.1    Mintzer, F.C.2
  • 5
    • 1542363253 scopus 로고    scopus 로고
    • On the security of the Yeung-Mintzer authentication watermark
    • Savannah, Georgia, March
    • N. Memon, S. Shende, and P. Wong, "On the Security of the Yeung-Mintzer Authentication Watermark," Proc. IS&T PICS Symp., Savannah, Georgia, pp. 301-306, March 1999.
    • (1999) Proc. IS&T PICS Symp. , pp. 301-306
    • Memon, N.1    Shende, S.2    Wong, P.3
  • 7
    • 0036530306 scopus 로고    scopus 로고
    • Cryptanalysis of the Yeung-Mintzer fragile watermarking technique
    • J. Fridrich, M. Goljan, and N. Memon, "Cryptanalysis of the Yeung-Mintzer Fragile Watermarking Technique," J. Electronic Imaging, vol. 11, pp.262-274, 2002.
    • (2002) J. Electronic Imaging , vol.11 , pp. 262-274
    • Fridrich, J.1    Goljan, M.2    Memon, N.3
  • 8
    • 0033872149 scopus 로고    scopus 로고
    • Counterfeiting attacks on oblivious block-wise independent invisible watermarking schemes
    • March
    • M. Holliman and N. Memon, "Counterfeiting Attacks on Oblivious Block-wise Independent Invisible Watermarking Schemes," IEEE Trans. Image Processing, vol.9, no.3, pp. 432-441, March 2000.
    • (2000) IEEE Trans. Image Processing , vol.9 , Issue.3 , pp. 432-441
    • Holliman, M.1    Memon, N.2
  • 9
    • 0037869332 scopus 로고    scopus 로고
    • Fragile watermarking scheme for image authentication
    • June
    • H. Lu, R. Shen, and F. Chung, "Fragile Watermarking Scheme for Image Authentication," Electronics Letters, vol. 39, no.12, pp. 898-900, June 2003.
    • (2003) Electronics Letters , vol.39 , Issue.12 , pp. 898-900
    • Lu, H.1    Shen, R.2    Chung, F.3
  • 10
    • 84949499709 scopus 로고    scopus 로고
    • A new fragile watermarking technique for image authentication
    • Aug. Beijing
    • H. Zhong, F. Liu, and L. C. Jiao, "A New Fragile Watermarking Technique for Image Authentication," Int. Conf. Signal Processing, vol.1, pp. 792-795, Aug. 2002, Beijing.
    • (2002) Int. Conf. Signal Processing , vol.1 , pp. 792-795
    • Zhong, H.1    Liu, F.2    Jiao, L.C.3
  • 11
    • 0034443602 scopus 로고    scopus 로고
    • New fragile authentication watermark for images
    • Vancouver, Canada, Sept.
    • J. Fridrich, M. Goljan, and A. C. Baldoza, "New Fragile Authentication Watermark for Images," IEEE Int. Conf. Image Processing, vol. 1, pp. 446-449, Vancouver, Canada, Sept., 2000.
    • (2000) IEEE Int. Conf. Image Processing , vol.1 , pp. 446-449
    • Fridrich, J.1    Goljan, M.2    Baldoza, A.C.3
  • 12
    • 8644267842 scopus 로고    scopus 로고
    • Oblivious fragile watermarking scheme for image authentication
    • Orlando, FL, USA, May
    • C. T. Li, F. M. Yang, and C. S. Lee, "Oblivious Fragile Watermarking Scheme For Image Authentication," IEEE Int. Conf. Acoustics, Speech, & Signal Processing, Orlando, FL, USA, vol. VI, pp. 3445-3448, May 2002.
    • (2002) IEEE Int. Conf. Acoustics, Speech, & Signal Processing , vol.6 , pp. 3445-3448
    • Li, C.T.1    Yang, F.M.2    Lee, C.S.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.