메뉴 건너뛰기




Volumn 15, Issue 1, 2005, Pages 161-163

Security of an ill-posed operator for image authentication

Author keywords

Image authentication; Random forgery

Indexed keywords

COMPUTATION PRECISION; IMAGE AUTHENTICATION; INTEGER TRANSFORMATION; RANDOM FORGERY;

EID: 12344315777     PISSN: 10518215     EISSN: None     Source Type: Journal    
DOI: 10.1109/TCSVT.2004.839978     Document Type: Article
Times cited : (7)

References (5)
  • 1
    • 0034765589 scopus 로고    scopus 로고
    • Invertible authentication
    • J. Fridrich, M. Goljanb, and R. Du, "Invertible authentication," in Proc. SPIE, vol. 3971, 2001, pp. 197-208.
    • (2001) Proc. SPIE , vol.3971 , pp. 197-208
    • Fridrich, J.1    Goljanb, M.2    Du, R.3
  • 2
    • 0036502697 scopus 로고    scopus 로고
    • An SVD-based watermarking scheme for protecting rightful ownership
    • Jan.
    • R. Liu and T. Tan, "An SVD-based watermarking scheme for protecting rightful ownership," IEEE Trans. Multimedia, vol. 4, no. 1, pp. 121-128, Jan. 2002.
    • (2002) IEEE Trans. Multimedia , vol.4 , Issue.1 , pp. 121-128
    • Liu, R.1    Tan, T.2
  • 3
    • 0141862035 scopus 로고    scopus 로고
    • An ill-posed operator for secure image authentication
    • Aug.
    • E. Izquierdo and V. Guerra, "An ill-posed operator for secure image authentication," IEEE Trans. Circuits Syst. Video Technol., vol. 13, no. 8, pp. 842-852, Aug. 2003.
    • (2003) IEEE Trans. Circuits Syst. Video Technol. , vol.13 , Issue.8 , pp. 842-852
    • Izquierdo, E.1    Guerra, V.2
  • 4
    • 0035473831 scopus 로고    scopus 로고
    • Secret and public key image watermarking schemes for image authentication and ownership verification
    • Oct.
    • P. W. Wong, "Secret and public key image watermarking schemes for image authentication and ownership verification," IEEE Trans. Image Process., vol. 10, no. 10, pp. 1593-1601, Oct. 1998.
    • (1998) IEEE Trans. Image Process. , vol.10 , Issue.10 , pp. 1593-1601
    • Wong, P.W.1
  • 5
    • 0033872149 scopus 로고    scopus 로고
    • Counterfeiting attacks on oblivious block-wise independent invisible watermarking schemes
    • Mar.
    • M. Holliman and N. Memon, "Counterfeiting attacks on oblivious block-wise independent invisible watermarking schemes," IEEE Trans. Image Process., vol. 9, no. 3, pp. 432-441, Mar. 2000.
    • (2000) IEEE Trans. Image Process. , vol.9 , Issue.3 , pp. 432-441
    • Holliman, M.1    Memon, N.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.