메뉴 건너뛰기




Volumn , Issue , 2004, Pages 530-533

Fragile blockwise image authentication thwarting vector quantization attack

Author keywords

Attack localization; Blind watermark; Fragile watermark; Image authentication; Variable block size

Indexed keywords

ALGORITHMS; DIGITAL WATERMARKING; ELECTRONIC DOCUMENT IDENTIFICATION SYSTEMS; IMAGE ANALYSIS; INFORMATION TECHNOLOGY; RANDOM NUMBER GENERATION;

EID: 21544477794     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (11)

References (8)
  • 1
    • 0032633080 scopus 로고    scopus 로고
    • The use of watermarks in the protection of digital multimedia products
    • July
    • G. Voyatzis and I. Pitas, "The use of watermarks in the protection of digital multimedia products," Proc. IEEE, vol. 87, no. 7, pp.1197-1207, July 1999.
    • (1999) Proc. IEEE , vol.87 , Issue.7 , pp. 1197-1207
    • Voyatzis, G.1    Pitas, I.2
  • 2
    • 0032095654 scopus 로고    scopus 로고
    • Multimedia data-embedding and watermarking technologies
    • June
    • M. D. Swanson, M. Kobayashi, and A. H. Tewfik, "Multimedia data-embedding and watermarking technologies," Proc. IEEE, vol. 86, pp. 1064-1087, June 1998.
    • (1998) Proc. IEEE , vol.86 , pp. 1064-1087
    • Swanson, M.D.1    Kobayashi, M.2    Tewfik, A.H.3
  • 3
    • 0035391983 scopus 로고    scopus 로고
    • Digital watermarking: Algorithms and applications
    • July
    • C. I. Podilchuk," Digital watermarking: algorithms and applications," IEEE Signal Processing magazine, pp.33-46, July 2001.
    • (2001) IEEE Signal Processing Magazine , pp. 33-46
    • Podilchuk, C.I.1
  • 5
    • 0035473831 scopus 로고    scopus 로고
    • Secret and public key image watermarking schemes for image authentication and ownership verification
    • Oct.
    • P. W. Wong, and N. Memon, "Secret and public key image watermarking schemes for image authentication and ownership verification," IEEE Trans. on Image proc., vol. 10, no. 10, Oct. 2001.
    • (2001) IEEE Trans. on Image Proc. , vol.10 , Issue.10
    • Wong, P.W.1    Memon, N.2
  • 6
    • 0036030626 scopus 로고    scopus 로고
    • Security of fragile authentication watermarks with localization
    • Electronic Imaging 2002, Security and Watermarking of Multimedia Contents, San Jose, California, January
    • J. Fridrich, "Security of fragile authentication watermarks with localization," Proc. SPIE Photonic West, Vol. 4675, Electronic Imaging 2002, Security and Watermarking of Multimedia Contents, San Jose, California, January, 2002, pp. 691-700.
    • (2002) Proc. SPIE Photonic West , vol.4675 , pp. 691-700
    • Fridrich, J.1
  • 7
    • 0033872149 scopus 로고    scopus 로고
    • Counterfeiting attacks on oblivious block-wise independent invisible watermarking schemes
    • Mar.
    • M. Holliman, and N. Memon, "Counterfeiting attacks on oblivious block-wise independent invisible watermarking schemes," IEEE Trans. on Image Proc., vol. 9, no. 3, ,pp. 432-441, Mar. 2000.
    • (2000) IEEE Trans. on Image Proc. , vol.9 , Issue.3 , pp. 432-441
    • Holliman, M.1    Memon, N.2
  • 8
    • 0036611838 scopus 로고    scopus 로고
    • Hierarchical watermarking for secure image authentication with localization
    • June
    • M. U. Celik, G. Sharma, E. Saber, and A. M. Tekalp, "Hierarchical watermarking for secure image authentication with localization," IEEE Trans. on Image Proc., vol. 11, no. 6, June 2002.
    • (2002) IEEE Trans. on Image Proc. , vol.11 , Issue.6
    • Celik, M.U.1    Sharma, G.2    Saber, E.3    Tekalp, A.M.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.