메뉴 건너뛰기




Volumn 4, Issue , 2004, Pages 2615-2618

A practical version of Wong's watermarking technique

Author keywords

[No Author keywords available]

Indexed keywords

DIGITAL IMAGES; HASH FUNCTION; IMAGE BLOCKS; SHORT KEYS;

EID: 20444464042     PISSN: 15224880     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ICIP.2004.1421639     Document Type: Conference Paper
Times cited : (3)

References (11)
  • 1
    • 0032312612 scopus 로고    scopus 로고
    • A public key watermark for image verification and authentication
    • October
    • P. Wong, "A Public Key Watermark for Image Verification and Authentication," IEEE International Conference on Image Processing (ICIP'98), vol. I, pp. 455-459, October 1998.
    • (1998) IEEE International Conference on Image Processing (ICIP'98) , vol.1 , pp. 455-459
    • Wong, P.1
  • 3
    • 0033872149 scopus 로고    scopus 로고
    • Counterfeiting attacks on oblivious block-wise independent invisible watermarking schemes
    • M. Holliman and N. Memon, "Counterfeiting attacks on oblivious block-wise independent invisible watermarking schemes," IEEE Transactions on Image Processing, vol. 9, no. 3, pp. 432-441, 2000.
    • (2000) IEEE Transactions on Image Processing , vol.9 , Issue.3 , pp. 432-441
    • Holliman, M.1    Memon, N.2
  • 4
    • 0035473831 scopus 로고    scopus 로고
    • Secret and public key image watermarking schemes for image authentication and ownership verification
    • October
    • P. Wong and N. Memon, "Secret and Public Key Image Watermarking Schemes for Image Authentication and Ownership Verification," IEEE Transactions on Image Processing, vol. 10, no. 10, pp. 1593-1601, October 2001
    • (2001) IEEE Transactions on Image Processing , vol.10 , Issue.10 , pp. 1593-1601
    • Wong, P.1    Memon, N.2
  • 5
    • 0003602325 scopus 로고
    • The MD5 message digest algorithm
    • IETF
    • R. Rivest. "The MD5 message digest algorithm," Technical Report RFC1321, IETF, 1992.
    • (1992) Technical Report , vol.RFC1321
    • Rivest, R.1
  • 6
    • 0017930809 scopus 로고
    • A method for obtaining digital signatures and public-key cryptosystems
    • R. Rivest, A. Shamir, and L. Adleman, "A method for obtaining digital signatures and public-key cryptosystems," Communications of the ACM, vol. 21, no. 2, pp. 120-126, 1978.
    • (1978) Communications of the ACM , vol.21 , Issue.2 , pp. 120-126
    • Rivest, R.1    Shamir, A.2    Adleman, L.3
  • 8
    • 84955575947 scopus 로고
    • The magic words are squeamish ossifrage
    • Advances in Cryptology, Springer, Berlin
    • D. Atkins, M. Graff, A. Lenstra, and P. Leyland, "The magic words are squeamish ossifrage," Advances in Cryptology, LNCS 917, pp. 263-277, Springer, Berlin, 1995.
    • (1995) LNCS , vol.917 , pp. 263-277
    • Atkins, D.1    Graff, M.2    Lenstra, A.3    Leyland, P.4
  • 10
    • 77956089601 scopus 로고    scopus 로고
    • Factorization of a 512-bit RSA Modulus
    • Advances in Cryptology, Springer, Berlin
    • S. Cavallar, W. Lioen, H. Riele, B. Dodson, A.Lenstra, P. Montgomery and B. Murphy, "Factorization of a 512-bit RSA Modulus," Advances in Cryptology, LNCS 1807, pp. 1-8, Springer, Berlin, 2000.
    • (2000) LNCS , vol.1807 , pp. 1-8
    • Cavallar, S.1    Lioen, W.2    Riele, H.3    Dodson, B.4    Lenstra, A.5    Montgomery, P.6    Murphy, B.7
  • 11
    • 38249007777 scopus 로고
    • Birthday paradox, coupon collectors, caching algorithms and self-organizing search
    • P. Flajolet, D. Gardy and L. Thimonier, "Birthday paradox, coupon collectors, caching algorithms and self-organizing search," Discrete Applied Mathematics, vol. 39, no. 3, pp. 207-229, 1992.
    • (1992) Discrete Applied Mathematics , vol.39 , Issue.3 , pp. 207-229
    • Flajolet, P.1    Gardy, D.2    Thimonier, L.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.