메뉴 건너뛰기




Volumn 2, Issue , 2004, Pages 963-966

Hierarchical watermarking scheme for image authentication and recovery

Author keywords

[No Author keywords available]

Indexed keywords

ALGORITHMS; DATA REDUCTION; IMAGE PROCESSING; PROBABILITY; PUBLIC KEY CRYPTOGRAPHY; SECURITY OF DATA;

EID: 11244354474     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (7)

References (10)
  • 1
    • 11244266383 scopus 로고    scopus 로고
    • The trustworthy digital camera: Restoring credibility to the photographic image
    • Chicago, IL, USA, Oct.
    • G.I. Friedman, "The trustworthy digital camera: restoring credibility to the photographic image," in Proc. IEEE ICIP, vol. II, Chicago, IL, USA, Oct. 1998, pp 409-413
    • (1998) Proc. IEEE ICIP , vol.2 , pp. 409-413
    • Friedman, G.I.1
  • 2
    • 0013106830 scopus 로고    scopus 로고
    • Structural digital signature for image authentication: An incidental distortion resistant scheme
    • 8th ACM Int. Conf. Multimedia, Los Angeles, C.A
    • C.S. Lu, H.Y.M. Liao, and C.J. Sze, "Structural digital signature for image authentication: An incidental distortion resistant scheme," in Proc. Multimedia Security Workshop, 8th ACM Int. Conf. Multimedia, Los Angeles, C.A., 2000, pp. 115-118
    • (2000) Proc. Multimedia Security Workshop , pp. 115-118
    • Lu, C.S.1    Liao, H.Y.M.2    Sze, C.J.3
  • 3
    • 0032292847 scopus 로고    scopus 로고
    • Image watermarking for tamper detection
    • Chicago, IL, USA, Oct.
    • J. Fridrich, "Image watermarking for tamper detection," in Proc. IEEE ICIP, vol. II, Chicago, IL, USA, Oct. 1998, pp.404-408.
    • (1998) Proc. IEEE ICIP , vol.2 , pp. 404-408
    • Fridrich, J.1
  • 4
    • 11244278221 scopus 로고
    • Toward a telltale watermarking technique for tamper-proofing
    • D. Kundur and D. Hatzinakos, "Toward a telltale watermarking technique for tamper-proofing," IEEE Trans. Consum. Electronics, vol. 39, pp. 905-910, 1993.
    • (1993) IEEE Trans. Consum. Electronics , vol.39 , pp. 905-910
    • Kundur, D.1    Hatzinakos, D.2
  • 5
    • 0003356542 scopus 로고    scopus 로고
    • A public key watermark for image verification and authentication
    • Santa Barbara, CA, Oct.
    • P. W. Wong, "A public key watermark for image verification and authentication," in Proc. IEEE Int. Conf. Image Processing, Santa Barbara, CA, Oct. 1997, pp. 680-683.
    • (1997) Proc. IEEE Int. Conf. Image Processing , pp. 680-683
    • Wong, P.W.1
  • 6
    • 11244326177 scopus 로고    scopus 로고
    • A review watermarking and the importance of perceptual modeling
    • Feb.
    • I.J. Cox and M.I. Miller, "A review watermarking and the importance of perceptual modeling," Proc. IEEE, vol. 3016, Feb. 1999.
    • (1999) Proc. IEEE , vol.3016
    • Cox, I.J.1    Miller, M.I.2
  • 7
    • 0037508344 scopus 로고    scopus 로고
    • Invisibility and application functionalities in perceptual watermarking-an overview
    • Jan.
    • Christophe De Vleeschouwer, Jean-Francois Delaigle, and Benoit Macq, "Invisibility and Application Functionalities in Perceptual Watermarking-An Overview", Proceedings of the IEEE, vol. 90, no. 1, Jan. 2002, pp. 64-77.
    • (2002) Proceedings of the IEEE , vol.90 , Issue.1 , pp. 64-77
    • De Vleeschouwer, C.1    Delaigle, J.-F.2    Macq, B.3
  • 8
    • 0036611838 scopus 로고    scopus 로고
    • Hierarchical watermarking for secure image authentication with localization
    • Jun.
    • Mehmet Utku Celik, Gaurav Sharma, Eli Saber, and Ahmet Murat Tekalp, "Hierarchical Watermarking for Secure Image Authentication With Localization", IEEE Transactions on Image Processing, vol.11, no. 4, Jun. 2002, pp. 585-594.
    • (2002) IEEE Transactions on Image Processing , vol.11 , Issue.4 , pp. 585-594
    • Celik, M.U.1    Sharma, G.2    Saber, E.3    Tekalp, A.M.4
  • 9
    • 0033872149 scopus 로고    scopus 로고
    • Counterfeiting attacks on oblivious block-wise independent invisible watermarking schemes
    • Mar.
    • M. Holliman and N. Memon, "Counterfeiting attacks on oblivious block-wise independent invisible watermarking schemes," IEEE Transactions on Image Processing, vol. 9, pp. 412-441, Mar. 2000.
    • (2000) IEEE Transactions on Image Processing , vol.9 , pp. 412-441
    • Holliman, M.1    Memon, N.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.