메뉴 건너뛰기




Volumn 38, Issue 12, 2005, Pages 2519-2529

A hierarchical digital watermarking method for image tamper detection and recovery

Author keywords

Digital watermarking; Image authentication; Tamper detection; Tamper localization

Indexed keywords

EDGE DETECTION; HIERARCHICAL SYSTEMS; IMAGE ANALYSIS; IMAGE QUALITY; PROBABILITY;

EID: 25144448272     PISSN: 00313203     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.patcog.2005.02.007     Document Type: Article
Times cited : (283)

References (28)
  • 1
    • 11244266383 scopus 로고    scopus 로고
    • The trustworthy digital camera: Restoring credibility to the photographic image
    • Chicago, IL, USA, October
    • G.I. Friedman, The trustworthy digital camera: restoring credibility to the photographic image, in: Proceedings of the IEEE International Conference on Image Processing, vol. II, Chicago, IL, USA, October 1998, pp. 409-413.
    • (1998) Proceedings of the IEEE International Conference on Image Processing , vol.2 , pp. 409-413
    • Friedman, G.I.1
  • 3
    • 0032223822 scopus 로고    scopus 로고
    • A robust image authentication method surviving JPEG lossy compression
    • C.Y. Lin, and S.F. Chang A robust image authentication method surviving JPEG lossy compression Proc. SPIE 3312 1998 296 307
    • (1998) Proc. SPIE , vol.3312 , pp. 296-307
    • Lin, C.Y.1    Chang, S.F.2
  • 11
  • 15
    • 0032634857 scopus 로고    scopus 로고
    • Multimedia watermarking techniques
    • F. Hartung, and M. Kutter Multimedia watermarking techniques Proc. IEEE 87 1999 1079 1107
    • (1999) Proc. IEEE , vol.87 , pp. 1079-1107
    • Hartung, F.1    Kutter, M.2
  • 16
    • 0032095654 scopus 로고
    • Multimedia data embedding and watermarking technologies
    • M.D. Swanson, M. Kobayashi, and A.H. Tewfik Multimedia data embedding and watermarking technologies Proc. IEEE 86 1988 1064 1087
    • (1988) Proc. IEEE , vol.86 , pp. 1064-1087
    • Swanson, M.D.1    Kobayashi, M.2    Tewfik, A.H.3
  • 17
    • 0032625842 scopus 로고    scopus 로고
    • Watermarking as communications with side information
    • I.J. Cox, M.I. Miller, and A.L. Mckellips Watermarking as communications with side information Proc. IEEE 87 1999 1127 1147
    • (1999) Proc. IEEE , vol.87 , pp. 1127-1147
    • Cox, I.J.1    Miller, M.I.2    McKellips, A.L.3
  • 18
    • 0037508344 scopus 로고    scopus 로고
    • Invisibility and application functionalities in perceptual watermarking - An overview
    • C.De. Vleeschouwer, J.F. Delaigle, and B. Macq Invisibility and application functionalities in perceptual watermarking - an overview Proc. IEEE 90 1 2002 64 77
    • (2002) Proc. IEEE , vol.90 , Issue.1 , pp. 64-77
    • Vleeschouwer, C.De.1    Delaigle, J.F.2    Macq, B.3
  • 20
    • 0036611838 scopus 로고    scopus 로고
    • Hierarchical watermarking for secure image authentication with localization
    • M.U. Celik, G. Sharma, E. Saber, and A.M. Tekalp Hierarchical watermarking for secure image authentication with localization IEEE Trans. Image Process. 11 6 2002 585 594
    • (2002) IEEE Trans. Image Process. , vol.11 , Issue.6 , pp. 585-594
    • Celik, M.U.1    Sharma, G.2    Saber, E.3    Tekalp, A.M.4
  • 21
    • 0032648596 scopus 로고    scopus 로고
    • Digital watermarking for telltale tamper proofing and authentication
    • D. Kundur, and D. Hatzinakos Digital watermarking for telltale tamper proofing and authentication Proc. IEEE 87 1999 1167 1180
    • (1999) Proc. IEEE , vol.87 , pp. 1167-1180
    • Kundur, D.1    Hatzinakos, D.2
  • 22
    • 0034848594 scopus 로고    scopus 로고
    • Blind watermarking applied to image authentication
    • Salt Lake City, UT
    • J. Eggers, and B. Girod Blind watermarking applied to image authentication Proceedings of the IEEE ICASSP Salt Lake City, UT May 2001 1977 1980
    • (2001) Proceedings of the IEEE ICASSP , pp. 1977-1980
    • Eggers, J.1    Girod, B.2
  • 24
    • 0035473830 scopus 로고    scopus 로고
    • Multipurpose watermarking for image authentication and protection
    • C.S. Lu, and H.Y. Liao Multipurpose watermarking for image authentication and protection IEEE Trans. Image Process. 10 2001 1579 1592
    • (2001) IEEE Trans. Image Process. , vol.10 , pp. 1579-1592
    • Lu, C.S.1    Liao, H.Y.2
  • 25
    • 0033872149 scopus 로고    scopus 로고
    • Counterfeiting attacks on oblivious block-wise independent invisible watermarking schemes
    • M. Holliman, and N. Memon Counterfeiting attacks on oblivious block-wise independent invisible watermarking schemes IEEE Trans. Image Process. 9 2000 432 441
    • (2000) IEEE Trans. Image Process. , vol.9 , pp. 432-441
    • Holliman, M.1    Memon, N.2
  • 27
    • 0033682895 scopus 로고    scopus 로고
    • Secret and public key authentication schemes that resist vector quantization attack
    • P.W. Wong, and N. Memon Secret and public key authentication schemes that resist vector quantization attack Proc. SPIE 3971 75 2002 417 427
    • (2002) Proc. SPIE , vol.3971 , Issue.75 , pp. 417-427
    • Wong, P.W.1    Memon, N.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.