메뉴 건너뛰기




Volumn , Issue , 2004, Pages 155-159

Multimedia authentication with sensor-based watermarking

Author keywords

Authentication; Fragile Watermarking; Fuzzy Identification System

Indexed keywords

ALGORITHMS; COMPUTER VISION; DATA ACQUISITION; FUZZY SETS; MULTIMEDIA SYSTEMS; ONLINE SYSTEMS; SENSITIVITY ANALYSIS; SENSORS;

EID: 14844293883     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1022431.1022458     Document Type: Conference Paper
Times cited : (1)

References (10)
  • 1
    • 11244300145 scopus 로고    scopus 로고
    • A brief review on fragile watermarking based image authentication
    • 2003
    • Tieniu Tan Yujie Song, "A brief review on fragile watermarking based image authentication," 2003, CIPT. Vol.8(A), No.1, pp.1-7, 2003.
    • (2003) CIPT , vol.8 , Issue.1 A , pp. 1-7
    • Song, T.T.Y.1
  • 2
    • 0031378592 scopus 로고    scopus 로고
    • An invisible watermarking technique for image verification
    • 1997
    • M. M. Yeung and F. Mintzer, "An invisible watermarking technique for image verification," 1997, Proc.ICIP'97 N0.97CB36144. 1997: 680-3 vol.2.
    • (1997) Proc.ICIP'97 , vol.2 , Issue.97 CB36144 , pp. 680-683
    • Yeung, M.M.1    Mintzer, F.2
  • 3
    • 0033688392 scopus 로고    scopus 로고
    • Semi-fragile watermarking for authenticating jpeg visual content
    • 2000
    • Lin Ching Yung and Chang Shih Fu, "Semi-fragile watermarking for authenticating jpeg visual content," 2000, Proc. SPIE. 2000; 3971:140-51.
    • (2000) Proc. SPIE , vol.3971 , pp. 140-151
    • Lin Ching Yung1    Chang Shih Fu2
  • 4
    • 0032223822 scopus 로고    scopus 로고
    • A robust image authentication method surviving jpeg lossy compression
    • 1997
    • Lin Ching Yung and Chang Shih Fu, "A robust image authentication method surviving jpeg lossy compression," 1997, Proc. ICIP. 1997; 3312: 296-307.
    • (1997) Proc. ICIP , vol.3312 , pp. 296-307
    • Lin Ching Yung1    Chang Shih Fu2
  • 5
    • 0035248504 scopus 로고    scopus 로고
    • A robust image authentication method distinguishing jpeg compression from malicious manipulation
    • 2001, Feb.
    • Lin Ching Yung and Chang Shih Fu, "A robust image authentication method distinguishing jpeg compression from malicious manipulation," 2001, IEEE-Transactions-on-Circuits-and-Systemsfor-Video-Technology. Feb. 2001; 11(2): 153-68.
    • (2001) IEEE-transactions-on-circuits-and-systemsfor-video-technology , vol.11 , Issue.2 , pp. 153-168
    • Lin Ching Yung1    Chang Shih Fu2
  • 6
    • 0005469295 scopus 로고    scopus 로고
    • An image authenticator surviving dct-based variable quantization table compressions
    • CY Lin and SF Chang, "An image authenticator surviving dct-based variable quantization table compressions," 1997, CU/CTR Technical Report 49098 -24.
    • (1997) CU/CTR Technical Report 49098 -24
    • Lin, C.Y.1    Chang, S.F.2
  • 7
    • 0033717154 scopus 로고    scopus 로고
    • Detection of image alterations using semi-fragile watermarks
    • E. T. Lin, C. I. Podilchuk, and E. J. Delp, "Detection of image alterations using semi-fragile watermarks," 2000, Proc. SPIE'2000; 3971: 152-63.
    • (2000) Proc. SPIE'2000 , vol.3971 , pp. 152-163
    • Lin, E.T.1    Podilchuk, C.I.2    Delp, E.J.3
  • 8
    • 0033706181 scopus 로고    scopus 로고
    • Compression compatible fragile and semi-fragile tamper detection
    • C. G. Boncelet Jr. L. M. Marvel, G. Hartwig, "Compression compatible fragile and semi-fragile tamper detection," 2000, SPIE vol. 3971, No. 12.
    • (2000) SPIE , vol.3971 , Issue.12
    • Boncelet Jr., C.G.1    Marvel, L.M.2    Hartwig, G.3
  • 9
    • 0033601667 scopus 로고    scopus 로고
    • Content based integrity protection of digital images
    • M. P. Queluz, "Content based integrity protection of digital images," 1999, SPIE vol. 3657, No. 09.
    • (1999) SPIE , vol.3657 , Issue.9
    • Queluz, M.P.1
  • 10
    • 0021892282 scopus 로고
    • Fuzzy identification of systems and its application to modeling and control
    • 1985
    • T. Takagi and M. Sugcno, "Fuzzy identification of systems and its application to modeling and control," 1985, IEEE Trans. Syst., Man. Cybern., vol. SMC-15, no. 1, pp. 116-132, 1985
    • (1985) IEEE Trans. Syst., Man. Cybern. , vol.SMC-15 , Issue.1 , pp. 116-132
    • Takagi, T.1    Sugcno, M.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.