메뉴 건너뛰기




Volumn 3304, Issue , 2005, Pages 125-136

Alteration-locating authentication watermarking for binary images

Author keywords

[No Author keywords available]

Indexed keywords

BINARY CODES; COMPUTER NETWORKS; CRYPTOGRAPHY; FACSIMILE; IMAGE CODING; INTERNET;

EID: 23944519396     PISSN: 03029743     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1007/978-3-540-31805-7_11     Document Type: Conference Paper
Times cited : (25)

References (27)
  • 3
    • 0036544390 scopus 로고    scopus 로고
    • Toward a secure public-key blockwise fragile authentication watermarking
    • P. S. L. M. Barreto, H. Y. Kim and V. Rijmen, "Toward a Secure Public-Key Blockwise Fragile Authentication Watermarking," IEE Proc. Vision, Image and Signal Processing, vol. 149, no. 2, pp. 57-62, 2002.
    • (2002) IEE Proc. Vision, Image and Signal Processing , vol.149 , Issue.2 , pp. 57-62
    • Barreto, P.S.L.M.1    Kim, H.Y.2    Rijmen, V.3
  • 4
    • 84946840347 scopus 로고    scopus 로고
    • Short signatures from the Weil pairing
    • Advances in Cryptology - Asiacrypt'2001
    • D. Boneh, B. Lynn and H. Shacham, "Short signatures from the Weil pairing," Advances in Cryptology - Asiacrypt'2001, Lecture Notes in Computer Science 2248, pp. 514-532, 2002.
    • (2002) Lecture Notes in Computer Science , vol.2248 , pp. 514-532
    • Boneh, D.1    Lynn, B.2    Shacham, H.3
  • 5
    • 0036611838 scopus 로고    scopus 로고
    • Hierarchical watermarking for secure image authentication with localization
    • M. U. Celik, G. Sharma, E. Saber and A. M. Tekalp, "Hierarchical Watermarking for Secure Image Authentication with Localization," IEEE Trans. Image Processing, vol. 11, no. 6, pp. 585-595, 2002.
    • (2002) IEEE Trans. Image Processing , vol.11 , Issue.6 , pp. 585-595
    • Celik, M.U.1    Sharma, G.2    Saber, E.3    Tekalp, A.M.4
  • 7
    • 35048897168 scopus 로고    scopus 로고
    • A robust printed image watermarking based on iterative halftoning method
    • 2nd Int. Workshop on Digital Watermarking
    • I. G. Chun and S. Ha, "A Robust Printed Image Watermarking Based on Iterative Halftoning Method," 2nd Int. Workshop on Digital Watermarking, Lecture Notes on Computer Science 2939, pp. 200-211, 2003.
    • (2003) Lecture Notes on Computer Science , vol.2939 , pp. 200-211
    • Chun, I.G.1    Ha, S.2
  • 8
  • 11
    • 0036543654 scopus 로고    scopus 로고
    • Data hiding watermarking for halftone images
    • M. S. Fu and O. C. Au, "Data Hiding Watermarking for Halftone Images," IEEE Trans. Image Processing, vol. 11, no. 4, pp. 477-484, 2002.
    • (2002) IEEE Trans. Image Processing , vol.11 , Issue.4 , pp. 477-484
    • Fu, M.S.1    Au, O.C.2
  • 12
    • 0035387635 scopus 로고    scopus 로고
    • Watermarking and copyright labeling of printed images
    • H. Z. Hel-Or, "Watermarking and Copyright Labeling of Printed Images," Journal of Electronic Imaging, vol. 10, no. 3, pp. 794-803, 2001.
    • (2001) Journal of Electronic Imaging , vol.10 , Issue.3 , pp. 794-803
    • Hel-Or, H.Z.1
  • 13
    • 0033872149 scopus 로고    scopus 로고
    • Counterfeiting attacks on oblivious block-wise independent invisible watermarking schemes
    • M. Holliman and N. Memon, "Counterfeiting Attacks on Oblivious Block-wise Independent Invisible Watermarking Schemes," IEEE Trans. Image Processing, vol. 9. no. 3, pp. 432-441, 2000.
    • (2000) IEEE Trans. Image Processing , vol.9 , Issue.3 , pp. 432-441
    • Holliman, M.1    Memon, N.2
  • 15
    • 33645418173 scopus 로고    scopus 로고
    • Secure authentication watermarking for halftone and binary images
    • to appear in
    • H. Y. Kim and A. Afif. "Secure Authentication Watermarking for Halftone and Binary Images," to appear in Int. J. Imaging Systems and Technology.
    • Int. J. Imaging Systems and Technology
    • Kim, H.Y.1    Afif, A.2
  • 16
    • 85075920937 scopus 로고    scopus 로고
    • Digital watermarks using stochastic screens, color imaging: Device-independent color, color hard copy, and graphic arts II
    • Feb.
    • K. T. Knox and S. Wang, "Digital Watermarks Using Stochastic Screens, Color Imaging: Device-Independent Color, Color Hard Copy, and Graphic Arts II," SPIE Proc., vol. 3018, pp.316-322, Feb. 1997.
    • (1997) SPIE Proc. , vol.3018 , pp. 316-322
    • Knox, K.T.1    Wang, S.2
  • 17
    • 0034442403 scopus 로고    scopus 로고
    • Image authentication and integrity verification via content-based watermarks and a public key cryptosystem
    • C. T. Li, D. C. Lou and T. H. Chen, "Image Authentication and Integrity Verification via Content-Based Watermarks and a Public Key Cryptosystem," IEEE Int. Conf. Image Processing, 2000, vol. 3, pp. 694-697.
    • (2000) IEEE Int. Conf. Image Processing , vol.3 , pp. 694-697
    • Li, C.T.1    Lou, D.C.2    Chen, T.H.3
  • 19
    • 0141527376 scopus 로고    scopus 로고
    • Hybrid pixel-based data hiding and block-based watermarking for error-diffused halftone images
    • S. C. Pei and J. M. Guo, "Hybrid Pixel-Based Data Hiding and Block-Based Watermarking for Error-Diffused Halftone Images," IEEE Trans. on Circuits and Systems for Video Technology, vol. 13, no. 8, pp. 867-884, 2003.
    • (2003) IEEE Trans. on Circuits and Systems for Video Technology , vol.13 , Issue.8 , pp. 867-884
    • Pei, S.C.1    Guo, J.M.2
  • 21
    • 0036688310 scopus 로고    scopus 로고
    • A secure data hiding scheme for binary images
    • Aug.
    • Y.-C. Tseng, Y.-Y. Chen and H.-K. Pan, "A Secure Data Hiding Scheme for Binary Images," IEEE Trans. on Communications, Vol. 50, No. 8, Aug. 2002. pp. 1227-1231.
    • (2002) IEEE Trans. on Communications , vol.50 , Issue.8 , pp. 1227-1231
    • Tseng, Y.-C.1    Chen, Y.-Y.2    Pan, H.-K.3
  • 22
    • 0002956093 scopus 로고    scopus 로고
    • A watermark for image integrity and ownership verification
    • (Portland, OR), May also available as Hewlett-Packard Labs. Tech. Rep. HPL-97-72, May 1997
    • P. W. Wong, "A Watermark for Image Integrity and Ownership Verification," IS&T PIC Conference, (Portland, OR), May 1998 (also available as Hewlett-Packard Labs. Tech. Rep. HPL-97-72, May 1997).
    • (1998) IS&T PIC Conference
    • Wong, P.W.1
  • 23
    • 0032312612 scopus 로고    scopus 로고
    • A public key watermark for image verification and authentication
    • MA11.07
    • P. W. Wong, "A Public Key Watermark for Image Verification and Authentication," IEEE Int. Conf. Image Processing, 1998, vol. 1, pp. 455-459, (MA11.07).
    • (1998) IEEE Int. Conf. Image Processing , vol.1 , pp. 455-459
    • Wong, P.W.1
  • 24
    • 0035473831 scopus 로고    scopus 로고
    • Secret and public key image watermarking schemes for image authentication and ownership verification
    • P. W. Wong and N. Memon, "Secret and Public Key Image Watermarking Schemes for Image Authentication and Ownership Verification," IEEE Trans. Image Processing, vol. 10, no. 10, pp. 1593-1601, 2001.
    • (2001) IEEE Trans. Image Processing , vol.10 , Issue.10 , pp. 1593-1601
    • Wong, P.W.1    Memon, N.2
  • 26
    • 0031378592 scopus 로고    scopus 로고
    • An invisible watermarking technique for image verification
    • M. M. Yeung and F. Mintzer, "An Invisible Watermarking Technique for Image Verification," IEEE Int. Conf. Image Processing, 1997, vol. 1, pp. 680-683.
    • (1997) IEEE Int. Conf. Image Processing , vol.1 , pp. 680-683
    • Yeung, M.M.1    Mintzer, F.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.