메뉴 건너뛰기




Volumn , Issue , 2004, Pages 146-153

A fragile watermarking scheme for image authentication with localization and recovery

Author keywords

Fragile Watermark; Image Authentication; Image Recovery; Tamper Detection

Indexed keywords

ALGORITHMS; CRYPTOGRAPHY; IMAGE QUALITY; IMAGE RETRIEVAL; SECURITY OF DATA; SIGNAL TO NOISE RATIO;

EID: 20844440573     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (74)

References (20)
  • 1
    • 0037869332 scopus 로고    scopus 로고
    • Fragile watermarking scheme for image authentication
    • 12 Jun
    • Hongtao Lu, Ruiming Shen and Fu-Lai Chung, "Fragile watermarking scheme for image authentication," Electronics Letters, Volume: 39 Issue: 12, 12 Jun 2003.
    • (2003) Electronics Letters , vol.39 , Issue.12
    • Lu, H.1    Shen, R.2    Chung, F.-L.3
  • 3
    • 0036755019 scopus 로고    scopus 로고
    • On the design of content-based multimedia authentication systems
    • Sept.
    • Chai Wah Wu, "On the design of content-based multimedia authentication systems," Multimedia, IEEE Transactions on, Volume: 4 Issue: 3, Sept. 2002.
    • (2002) Multimedia, IEEE Transactions on , vol.4 , Issue.3
    • Wu, C.W.1
  • 4
    • 0037818310 scopus 로고    scopus 로고
    • Structural digital signature for image authentication: An incidental distortion resistant scheme
    • June
    • Chun-Shien Lu and H. Y. M. Liao, 'Structural digital signature for image authentication: an incidental distortion resistant scheme," Multimedia, IEEE Transactions on, Volume: 5 Issue: 2, June 2003.
    • (2003) Multimedia, IEEE Transactions on , vol.5 , Issue.2
    • Lu, C.-S.1    Liao, H.Y.M.2
  • 6
    • 0035473830 scopus 로고    scopus 로고
    • Multipurpose watermarking for image authentication and protection
    • Oct.
    • Chun-Shien Lu; and H. Y. M Liao, "Multipurpose watermarking for image authentication and protection," Image Processing, IEEE Transactions on, Volume: 10 Issue: 10, Oct. 2001.
    • (2001) Image Processing, IEEE Transactions on , vol.10 , Issue.10
    • Lu, C.-S.1    Liao, H.Y.M.2
  • 7
    • 0035473831 scopus 로고    scopus 로고
    • Secret and public key image-watermarking schemes for image authentication and ownership verification
    • Oct.
    • Ping Wah Wong and N. Memon, "Secret and public key image-watermarking schemes for image authentication and ownership verification," Image Processing, IEEE Transactions on, Volume: 10 Issue: 10, Oct. 2001.
    • (2001) Image Processing, IEEE Transactions on , vol.10 , Issue.10
    • Wong, P.W.1    Memon, N.2
  • 8
    • 0033872149 scopus 로고    scopus 로고
    • Counterfeiting attacks on oblivious block-wise independent invisible watermarking schemes
    • March
    • M. Holliman and N. Memon, "Counterfeiting attacks on oblivious block-wise independent invisible watermarking schemes," Image Processing, IEEE Transactions on, Volume: 9 Issue: 3, March 2000.
    • (2000) Image Processing, IEEE Transactions on , vol.9 , Issue.3
    • Holliman, M.1    Memon, N.2
  • 11
    • 0032648596 scopus 로고    scopus 로고
    • Digital watermarking for telltale tamper proofing and authentication
    • July
    • D. Kundur and D. Hatzinakos, "Digital watermarking for telltale tamper proofing and authentication," Proceedings of the IEEE, Volume: 87 Issue: 7, July 1999.
    • (1999) Proceedings of the IEEE , vol.87 , Issue.7
    • Kundur, D.1    Hatzinakos, D.2
  • 12
    • 0035163017 scopus 로고    scopus 로고
    • On the security of the SARI image authentication system
    • R. Radhakrisnan and N. Memon, "On the Security of the SARI Image Authentication System," Proc. IEEE Int. Conf. on Image Proc., Vol. III, pp. 971-974, 2001.
    • (2001) Proc. IEEE Int. Conf. on Image Proc. , vol.3 , pp. 971-974
    • Radhakrisnan, R.1    Memon, N.2
  • 13
    • 0035248504 scopus 로고    scopus 로고
    • A robust image authentication method distinguishing JPEG compression from malicious manipulation
    • Feb
    • Ching-Yung Lin and Shih-Fu Chang, "A robust image authentication method distinguishing JPEG compression from malicious manipulation," Circuits and Systems for Video Technology, IEEE Transactions on, Volume: 11 Issue: 2, Feb 2001.
    • (2001) Circuits and Systems for Video Technology, IEEE Transactions on , vol.11 , Issue.2
    • Lin, C.-Y.1    Chang, S.-F.2
  • 14
    • 0036611838 scopus 로고    scopus 로고
    • Hierarchical watermarking for secure image authentication with localization
    • June
    • M. Utku Celik, G. Sharma, E. Saber, and A. Murat Tekalp, "Hierarchical watermarking for secure image authentication with localization," Image Processing, IEEE Transactions on, Volume: 11 Issue: 6, June 2002
    • (2002) Image Processing, IEEE Transactions on , vol.11 , Issue.6
    • Celik, M.U.1    Sharma, G.2    Saber, E.3    Tekalp, A.M.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.