메뉴 건너뛰기




Volumn 2, Issue , 2004, Pages 1137-1140

A robust watermarking scheme using filter and ROI

Author keywords

[No Author keywords available]

Indexed keywords

EMBEDDED SYSTEMS; FREQUENCY DOMAIN ANALYSIS; IMAGE PROCESSING; SECURITY OF DATA; SIGNAL PROCESSING; WAVELET TRANSFORMS;

EID: 13444249798     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (7)

References (9)
  • 1
    • 10744222259 scopus 로고    scopus 로고
    • A robust watermarking scheme based on the just-noticeable-distortion
    • May
    • D.-C. Lou and J.-L. Liu, A robust watermarking scheme based on the just-noticeable-distortion, Journal of Chung Cheng Institute of Technology, vol. 31, no. 2, pp. 11-22, May 2003.
    • (2003) Journal of Chung Cheng Institute of Technology , vol.31 , Issue.2 , pp. 11-22
    • Lou, D.-C.1    Liu, J.-L.2
  • 2
    • 0035421311 scopus 로고    scopus 로고
    • Adaptive digital watermarking using fuzzy clustering technique
    • Aug.
    • D.-C. Lou and T.-L. Yin, Adaptive digital watermarking using fuzzy clustering technique, IEICE Transactions on Fundamentals, vol. E84-A, no. 8, pp. 2052-2060, Aug. 2001.
    • (2001) IEICE Transactions on Fundamentals , vol.E84-A , Issue.8 , pp. 2052-2060
    • Lou, D.-C.1    Yin, T.-L.2
  • 4
    • 0842288710 scopus 로고    scopus 로고
    • A digital image watermarking method based on labeled bisecting clustering algorithm
    • Jan.
    • S. C. Chu, J. F. Roddick, Z. M. Lu and J. S. Pan, A digital image watermarking method based on labeled bisecting clustering algorithm, IEICE Transactions on Fundamentals, vol. E87-A, no. 1, pp. 282-285, Jan. 2004.
    • (2004) IEICE Transactions on Fundamentals , vol.E87-A , Issue.1 , pp. 282-285
    • Chu, S.C.1    Roddick, J.F.2    Lu, Z.M.3    Pan, J.S.4
  • 5
    • 0036611838 scopus 로고    scopus 로고
    • Hierarchical watermarking for secure image authentication with localization
    • June
    • M. U. Celik, G. Sharma and E. Saber, Hierarchical watermarking for secure image authentication with localization, IEEE Transactions on Image Processing, vol. 11, no. 6, pp. 585-594, June 2002.
    • (2002) IEEE Transactions on Image Processing , vol.11 , Issue.6 , pp. 585-594
    • Celik, M.U.1    Sharma, G.2    Saber, E.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.