메뉴 건너뛰기




Volumn 16, Issue 1, 2005, Pages 75-92

Tamper-proof image watermarking, based on existing public key infrastructure

Author keywords

Image hash; Public key; Public watermarking; Wavelets

Indexed keywords


EID: 21244467596     PISSN: 08684952     EISSN: None     Source Type: Journal    
DOI: None     Document Type: Article
Times cited : (6)

References (19)
  • 3
    • 35248829262 scopus 로고    scopus 로고
    • Zero knowledge watermarking detection
    • A. Pfitzmann, ed. Robustness of an Asymmetric Watermarking Technique, Information Hiding '99, Springer-Verlag, Dresden, Germany
    • Craver, S. (1999). Zero knowledge watermarking detection. In A. Pfitzmann, ed. Robustness of an Asymmetric Watermarking Technique, Information Hiding '99, Vol. 1768 of Lectures Notes in Computer Science (LNCS). Springer-Verlag, Dresden, Germany, pp. 101-116.
    • (1999) Lectures Notes in Computer Science (LNCS) , vol.1768 , pp. 101-116
    • Craver, S.1
  • 5
    • 84990731886 scopus 로고
    • How to prove yourself: Practical solutions to identification and signature problems
    • A.M. Odlyzko (Ed.), Advances in Cryptology - CRYPTO '86, Springer-Verlag
    • Fiat, A., and A. Shamir (1987). How to prove yourself: Practical solutions to identification and signature problems. In A.M. Odlyzko (Ed.), Advances in Cryptology - CRYPTO '86, Vol. 263 of Lectures Notes in Computer Science (LNCS). Springer-Verlag, pp. 186-196.
    • (1987) Lectures Notes in Computer Science (LNCS) , vol.263 , pp. 186-196
    • Fiat, A.1    Shamir, A.2
  • 6
    • 84944403312 scopus 로고    scopus 로고
    • An asymmetric public detection watermarking technique
    • A. Pfitzmann(Ed.), Robustness of an Asymmetric Watermarking Technique, Information Hiding '99, Springer-Verlag, Dresden, Germany
    • Furon, T., and P. Duhamel (2000). An asymmetric public detection watermarking technique. In A. Pfitzmann(Ed.), Robustness of an Asymmetric Watermarking Technique, Information Hiding '99, Vol. 1768 of Lectures Notes in Computer Science (LNCS). Springer-Verlag, Dresden, Germany, pp. 88-100.
    • (2000) Lectures Notes in Computer Science (LNCS) , vol.1768 , pp. 88-100
    • Furon, T.1    Duhamel, P.2
  • 11
    • 21144443873 scopus 로고    scopus 로고
    • Bit-plane decomposition steganography combined with Jpeg2000 compression
    • F.A.F. Petitcolas (Ed.), IH 2002, Springer-Verlag, Berlin, Heidelberg
    • Noda, H., J. Spaulding, M.N. Shirazi, M. Niimi and E. Kawaguchi (2003). Bit-plane decomposition steganography combined with Jpeg2000 compression. In F.A.F. Petitcolas (Ed.), IH 2002, LNCS 2578. Springer-Verlag, Berlin, Heidelberg, pp. 295-309.
    • (2003) LNCS , vol.2578 , pp. 295-309
    • Noda, H.1    Spaulding, J.2    Shirazi, M.N.3    Niimi, M.4    Kawaguchi, E.5
  • 16
    • 0003313852 scopus 로고    scopus 로고
    • Image watermarking for copyright protection and authentication
    • Al Bovik (Ed.), Academic Press
    • Voyatzis, G., and I. Pitas (2000). Image watermarking for copyright protection and authentication. In Al Bovik (Ed.), Handbook of Image and Video Processing. Academic Press, pp. 773-745.
    • (2000) Handbook of Image and Video Processing , pp. 773-1745
    • Voyatzis, G.1    Pitas, I.2
  • 17
    • 0032687726 scopus 로고    scopus 로고
    • WaveMark: Digital image watermarking using daubechies' wavelets and error correcting coding
    • Multimedia satellite networks: issues and challenges
    • Wang, J.Z., G. Wiederhold (1998). WaveMark: digital image watermarking using daubechies' wavelets and error correcting coding. In Proceedings of SPIE, Vol. 3528 Multimedia satellite networks: issues and challenges.
    • (1998) Proceedings of SPIE , vol.3528
    • Wang, J.Z.1    Wiederhold, G.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.