메뉴 건너뛰기




Volumn 13, Issue 1, 2004, Pages 209-219

Comparative evaluation of semifragile watermarking algorithms

Author keywords

[No Author keywords available]

Indexed keywords

MULTIMEDIA INTEGRITY; SEMIFRAGILE WATERMARKING ALGORITHMS;

EID: 1842421975     PISSN: 10179909     EISSN: 1560229X     Source Type: Journal    
DOI: 10.1117/1.1633285     Document Type: Article
Times cited : (71)

References (34)
  • 1
    • 0034775562 scopus 로고    scopus 로고
    • Strict integrity control of biomedical images
    • G. Coatrieux, B. Sankur, and H. Maitre, "Strict integrity control of biomedical images," Proc. SPIE 4314, 229-240 (2001).
    • (2001) Proc. SPIE , vol.4314 , pp. 229-240
    • Coatrieux, G.1    Sankur, B.2    Maitre, H.3
  • 2
    • 0032117545 scopus 로고    scopus 로고
    • Invisible watermarking for image verification
    • July
    • M. M. Yeung and F. C. Mintzer, "Invisible watermarking for image verification," J. Electron. Imaging 7(3), 578-591 (July 1998).
    • (1998) J. Electron. Imaging , vol.7 , Issue.3 , pp. 578-591
    • Yeung, M.M.1    Mintzer, F.C.2
  • 4
    • 0002321371 scopus 로고    scopus 로고
    • Methods for tamper detection in digital images
    • Orlando, FL, October 30-31
    • J. Fridrich, "Methods for tamper detection in digital images," Proc. ACM Workshop on Multimedia and Security, pp. 19-23, Orlando, FL, October 30-31, 1999.
    • (1999) Proc. ACM Workshop on Multimedia and Security , pp. 19-23
    • Fridrich, J.1
  • 6
    • 0033706181 scopus 로고    scopus 로고
    • Compression compatible fragile and semifragile tamper detection
    • L. M. Marvel, G. W. Hartwig, Jr., and C. Boncelet, Jr., "Compression compatible fragile and semifragile tamper detection," Proc. SPIE 3971, 131-139 (2000).
    • (2000) Proc. SPIE , vol.3971 , pp. 131-139
    • Marvel, L.M.1    Hartwig Jr., G.W.2    Boncelet Jr., C.3
  • 8
    • 1842546197 scopus 로고    scopus 로고
    • Robust digital watermarking based on key-dependent basis functions
    • Portland, Oregon, April 15-27
    • J. Fridrich, "Robust digital watermarking based on key-dependent basis functions," 2nd Information Hiding Workshop, Portland, Oregon, April 15-27, 1998.
    • (1998) 2nd Information Hiding Workshop
    • Fridrich, J.1
  • 9
    • 0033717154 scopus 로고    scopus 로고
    • Detection of image alterations using semi-fragile watermarks
    • E. T. Lin, C. I. Podilchuk, and E. J. Delp, "Detection of image alterations using semi-fragile watermarks," Proc. SPIE 3971, 152-163 (2000).
    • (2000) Proc. SPIE , vol.3971 , pp. 152-163
    • Lin, E.T.1    Podilchuk, C.I.2    Delp, E.J.3
  • 10
    • 0033688392 scopus 로고    scopus 로고
    • Semifragile watermarking for authentication JPEG visual content
    • C. Y. Lin and S. F. Chang, "Semifragile watermarking for authentication JPEG visual content," Proc. SPIE 3971, 140-151 (2000).
    • (2000) Proc. SPIE , vol.3971 , pp. 140-151
    • Lin, C.Y.1    Chang, S.F.2
  • 11
    • 0033601667 scopus 로고    scopus 로고
    • Content-based integrity protection of digital images
    • Security and Watermarking of Multimedia Contents, P. W. Wong and E. J. Delp, Eds.
    • M. P. Queluz, "Content-based integrity protection of digital images," in Security and Watermarking of Multimedia Contents, P. W. Wong and E. J. Delp, Eds., Proc. SPIE 3657, 85-93 (1999).
    • (1999) Proc. SPIE , vol.3657 , pp. 85-93
    • Queluz, M.P.1
  • 13
    • 84914815743 scopus 로고    scopus 로고
    • Fraud detection and self embedding
    • T.-H. Lan and A. H. Tewfik, "Fraud detection and self embedding," ACM Multimedia 2, 33-36 (1999).
    • (1999) ACM Multimedia , vol.2 , pp. 33-36
    • Lan, T.-H.1    Tewfik, A.H.2
  • 14
    • 0036488304 scopus 로고    scopus 로고
    • Video error correction using steganography
    • Feb.
    • D. L. Robie and R. M. Mersereau, "Video error correction using steganography," Appl. Signal Processing 2002(2), 164-173 (Feb. 2002).
    • (2002) Appl. Signal Processing , vol.2002 , Issue.2 , pp. 164-173
    • Robie, D.L.1    Mersereau, R.M.2
  • 15
    • 0032223822 scopus 로고    scopus 로고
    • A robust image authentication algorithm surviving JPEG compression
    • C.-Y. Lin and S.-F. Chang, "A robust image authentication algorithm surviving JPEG compression," Proc. SPIE 3312, 296-307 (1997).
    • (1997) Proc. SPIE , vol.3312 , pp. 296-307
    • Lin, C.-Y.1    Chang, S.-F.2
  • 16
    • 0038636389 scopus 로고    scopus 로고
    • Combining low frequency and spread spectrum watermarking
    • J. Fridrich, "Combining low frequency and spread spectrum watermarking," Proc. SPIE 3456, 2-12 (1998).
    • (1998) Proc. SPIE , vol.3456 , pp. 2-12
    • Fridrich, J.1
  • 17
    • 0036030626 scopus 로고    scopus 로고
    • Security of fragile authentication watermarks with localization
    • J. Fridrich, "Security of fragile authentication watermarks with localization," Proc. SPIE 4675, 691-700 (2002).
    • (2002) Proc. SPIE , vol.4675 , pp. 691-700
    • Fridrich, J.1
  • 18
    • 84904413817 scopus 로고    scopus 로고
    • A hybrid watermark for tamper detection in digital images
    • Brisbane, Australia, August 22-25
    • J. Fridrich, "A hybrid watermark for tamper detection in digital images," ISSPA'99 Conf., pp. 301-304, Brisbane, Australia, August 22-25, 1999.
    • (1999) ISSPA'99 Conf. , pp. 301-304
    • Fridrich, J.1
  • 19
    • 0035362493 scopus 로고    scopus 로고
    • Approximate message authentication codes
    • June
    • L. Xie, G. R. Arce, and R. F. Graverman, "Approximate message authentication codes," IEEE Trans. Multimedia 3, 242-252 (June 2001).
    • (2001) IEEE Trans. Multimedia , vol.3 , pp. 242-252
    • Xie, L.1    Arce, G.R.2    Graverman, R.F.3
  • 20
    • 0035454036 scopus 로고    scopus 로고
    • Secure discrete cosine transform based technique for recoverable tamper proofing
    • Sep.
    • K. L. Hung, C. C. Cheng, and T. S. Chen, "Secure discrete cosine transform based technique for recoverable tamper proofing," Opt. Eng. 40(9), 1950-1958 (Sep. 2001).
    • (2001) Opt. Eng. , vol.40 , Issue.9 , pp. 1950-1958
    • Hung, K.L.1    Cheng, C.C.2    Chen, T.S.3
  • 22
    • 0033723294 scopus 로고    scopus 로고
    • Spatial watermark for image verification
    • M. P. Queluz and P. Lamy, "Spatial watermark for image verification," Proc. SPIE 3971, 120-130 (2000).
    • (2000) Proc. SPIE , vol.3971 , pp. 120-130
    • Queluz, M.P.1    Lamy, P.2
  • 23
    • 0036530224 scopus 로고    scopus 로고
    • Spatial watermark for image content authentication
    • April
    • M. P. Queluz, "Spatial watermark for image content authentication," J. Electron. Imaging 11(2), 275-285 (April 2002).
    • (2002) J. Electron. Imaging , vol.11 , Issue.2 , pp. 275-285
    • Queluz, M.P.1
  • 24
    • 0032304995 scopus 로고    scopus 로고
    • Towards a telltale watermarking technique for tamper-proofing
    • Oct.
    • D. Kundur and D. Hatzinakos, "Towards a telltale watermarking technique for tamper-proofing," Proc. IEEE Int. Conf. On Image Processing, 2,409-413 (Oct. 1998).
    • (1998) Proc. IEEE Int. Conf. On Image Processing , vol.2 , pp. 409-413
    • Kundur, D.1    Hatzinakos, D.2
  • 26
  • 27
    • 0035388316 scopus 로고    scopus 로고
    • Mean quantization-based fragile watermarking for image authentication
    • G.-W. Yu, C.-S. Lu, and H.-Y. M. Liao, "Mean quantization-based fragile watermarking for image authentication," Opt. Eng. 40(7), 1396-1408 (2001).
    • (2001) Opt. Eng. , vol.40 , Issue.7 , pp. 1396-1408
    • Yu, G.-W.1    Lu, C.-S.2    Liao, H.-Y.M.3
  • 28
    • 0035763305 scopus 로고    scopus 로고
    • Comparative assessment of semifragile watermarking methods
    • Ö. Ekici, B. Coşkun, U. Naci, and B. Sankur, "Comparative assessment of semifragile watermarking methods," Proc. SPIE 4518, 177-188 (2001).
    • (2001) Proc. SPIE , vol.4518 , pp. 177-188
    • Ekici, Ö.1    Coşkun, B.2    Naci, U.3    Sankur, B.4
  • 29
    • 0005063377 scopus 로고    scopus 로고
    • Fair evaluation methods for image watermarking systems
    • Oct.
    • M. Kutter and F. A. P. Petitcolas, "Fair evaluation methods for image watermarking systems," J. Electron. Imaging 9(4), 445-455 (Oct. 2000).
    • (2000) J. Electron. Imaging , vol.9 , Issue.4 , pp. 445-455
    • Kutter, M.1    Petitcolas, F.A.P.2
  • 30
    • 0035248504 scopus 로고    scopus 로고
    • A robust image authentication method distinguishing JPEG compression from malicious manipulation
    • C. Y. Lin and S. F. Chang, "A robust image authentication method distinguishing JPEG compression from malicious manipulation," IEEE Trans. Circuits Syst. Video Technol. 11(2), 153-168 (2001).
    • (2001) IEEE Trans. Circuits Syst. Video Technol. , vol.11 , Issue.2 , pp. 153-168
    • Lin, C.Y.1    Chang, S.F.2
  • 31
    • 0035097432 scopus 로고    scopus 로고
    • Authentication of digital images and video: Generic models and a new contribution
    • M. P. Queluz, "Authentication of digital images and video: generic models and a new contribution," Signal Process. Image Commun. 216(5), 461-475 (2001).
    • (2001) Signal Process. Image Commun. , vol.216 , Issue.5 , pp. 461-475
    • Queluz, M.P.1
  • 33
    • 85032751954 scopus 로고    scopus 로고
    • Watermarking schemes evaluation
    • Sep.
    • F. A. P. Petitcolas, "Watermarking schemes evaluation," IEEE Signal Processing 17(5), 58-64 (Sep. 2000).
    • (2000) IEEE Signal Processing , vol.17 , Issue.5 , pp. 58-64
    • Petitcolas, F.A.P.1
  • 34
    • 0034444435 scopus 로고    scopus 로고
    • Mean quantization blind watermarking for image authentication
    • Vancouver, BC, Canada, Sept. 10-13
    • G.-J. Yu, C.-S. Lu, H.-Y. M. Liao, and J.-P. Sheu, "Mean quantization blind watermarking for image authentication," Proc. 7th IEEE Int. Conf. on Image Processing, Vol. III, pp. 706-709, Vancouver, BC, Canada, Sept. 10-13, 2000.
    • (2000) Proc. 7th IEEE Int. Conf. on Image Processing , vol.3 , pp. 706-709
    • Yu, G.-J.1    Lu, C.-S.2    Liao, H.-Y.M.3    Sheu, J.-P.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.