메뉴 건너뛰기




Volumn 3, Issue , 2004, Pages 1573-1576

A secure image authentication algorithm with pixel-level tamper localization

Author keywords

[No Author keywords available]

Indexed keywords

AUTHENTICITY VERIFICATION; FRAGILE WATERMARKING; IMAGE AUTHENTICATION; PIXEL-WISE AUTHENTICATION;

EID: 20444492372     PISSN: 15224880     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ICIP.2004.1421367     Document Type: Conference Paper
Times cited : (22)

References (14)
  • 2
    • 8644240462 scopus 로고    scopus 로고
    • Multimedia authentication and watermarking
    • D. Feng, W. C. Siu, and H. Zhang, Eds., Springer-Verlag, Berlin, Heidelberg, New York, chap. 7
    • B. B. Zhu and M. D. Swanson, "Multimedia Authentication and Watermarking," Multimedia Information Retrieval and Management, D. Feng, W. C. Siu, and H. Zhang, Eds., Springer-Verlag, Berlin, Heidelberg, New York, 2003, chap. 7, pp. 148-177.
    • (2003) Multimedia Information Retrieval and Management , pp. 148-177
    • Zhu, B.B.1    Swanson, M.D.2
  • 3
    • 0031378592 scopus 로고    scopus 로고
    • An invisible watermarking technique for image verification
    • M. M. Yeung and F. C. Mintzer, "An Invisible Watermarking Technique for Image Verification," IEEE Int. Conf. Image Processing, 1997, vol. 2, pp. 680-683.
    • (1997) IEEE Int. Conf. Image Processing , vol.2 , pp. 680-683
    • Yeung, M.M.1    Mintzer, F.C.2
  • 4
    • 0032117545 scopus 로고    scopus 로고
    • Invisible watermarking for image verification
    • July
    • M. M. Yeung and F. C. Mintzer. "Invisible Watermarking for Image Verification," J. Electronic Imaging, vol. 7, no. 3, pp. 578-591, July 1998.
    • (1998) J. Electronic Imaging , vol.7 , Issue.3 , pp. 578-591
    • Yeung, M.M.1    Mintzer, F.C.2
  • 5
    • 1542363253 scopus 로고    scopus 로고
    • On the security of the yeung-mintzer authentication watermark
    • Savannah, Georgia, March
    • N. Memon, S. Shende, and P. Wong, "On the Security of the Yeung-Mintzer Authentication Watermark," Proc. IS&T PICS Symp., Savannah, Georgia, March 1999, pp. 301-306.
    • (1999) Proc. IS&T PICS Symp. , pp. 301-306
    • Memon, N.1    Shende, S.2    Wong, P.3
  • 7
    • 0033872149 scopus 로고    scopus 로고
    • Counterfeiting attacks on oblivious block-wise independent invisible watermarking schemes
    • March
    • M. Holliman and N. Memon, "Counterfeiting Attacks on Oblivious Block-wise Independent Invisible Watermarking Schemes," IEEE Trans. Image Processing, vol.9, no.3, March 2000, pp. 432-441.
    • (2000) IEEE Trans. Image Processing , vol.9 , Issue.3 , pp. 432-441
    • Holliman, M.1    Memon, N.2
  • 8
    • 0036530306 scopus 로고    scopus 로고
    • Cryptanalysis of the yeung-mintzer fragile watermarking technique
    • J. Fridrich, M. Goljan, and N. Memon, "Cryptanalysis of the Yeung-Mintzer Fragile Watermarking Technique," J. Electronic Imaging, vol. 11, pp.262-274, 2002.
    • (2002) J. Electronic Imaging , vol.11 , pp. 262-274
    • Fridrich, J.1    Goljan, M.2    Memon, N.3
  • 9
    • 11244341366 scopus 로고    scopus 로고
    • Efficient oracle attacks on yeung-mintzer and variant authentication schemes
    • Taiwan, Jun
    • J. Wu, B. Zhu, S. Li, and F. Lin, "Efficient Oracle Attacks on Yeung-Mintzer and Variant Authentication Schemes," IEEE Int. Conf. Multimedia & Expo, Taiwan, Jun 2004.
    • (2004) IEEE Int. Conf. Multimedia & Expo
    • Wu, J.1    Zhu, B.2    Li, S.3    Lin, F.4
  • 10
    • 0034443602 scopus 로고    scopus 로고
    • New fragile authentication watermark for images
    • Vancouver, Canada, Sept.
    • J. Fridrich, M. Goljan, and A. C. Baldoza, "New Fragile Authentication Watermark for Images," IEEE Int. Conf. Image Processing, Vancouver, Canada, Sept., 2000, vol. 1, pp. 446-449.
    • (2000) IEEE Int. Conf. Image Processing , vol.1 , pp. 446-449
    • Fridrich, J.1    Goljan, M.2    Baldoza, A.C.3
  • 11
    • 8644267842 scopus 로고    scopus 로고
    • Oblivious fragile watermarking scheme for image authentication
    • Orlando, FL, USA, May
    • C. T. Li, F. M. Yang, and C. S. Lee, "Oblivious Fragile Watermarking Scheme for Image Authentication," IEEE Int. Conf. Acoustics, Speech, & Signal Processing, Orlando, FL, USA, May 2002, vol. VI, pp 3445-3448.
    • (2002) IEEE Int. Conf. Acoustics, Speech, & Signal Processing , vol.6 , pp. 3445-3448
    • Li, C.T.1    Yang, F.M.2    Lee, C.S.3
  • 12
    • 84949499709 scopus 로고    scopus 로고
    • A new fragile watermarking technique for image authentication
    • Aug. Beijing
    • H. Zhong, F. Liu, and L. C. Jiao, "A New Fragile Watermarking Technique for Image Authentication," Int. Conf. Signal Processing, Aug. 2002, Beijing, vol. 1, pp. 792-795.
    • (2002) Int. Conf. Signal Processing , vol.1 , pp. 792-795
    • Zhong, H.1    Liu, F.2    Jiao, L.C.3
  • 13
    • 0037869332 scopus 로고    scopus 로고
    • Fragile watermarking scheme for image authentication
    • June
    • H. Lu, R. Shen, and F. Chung, "Fragile Watermarking Scheme for Image Authentication," Electronics Letters, vol. 39, no. 12, June 2003, pp. 898-900.
    • (2003) Electronics Letters , vol.39 , Issue.12 , pp. 898-900
    • Lu, H.1    Shen, R.2    Chung, F.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.