메뉴 건너뛰기




Volumn E88-A, Issue 1, 2005, Pages 374-377

Permutation-based semi-fragile watermark scheme

Author keywords

Permutation; Semi fragile; Tamper proofing; Transform; Watermark

Indexed keywords

COMPUTER SIMULATION; IMAGE COMPRESSION; IMAGE PROCESSING; MULTIMEDIA SYSTEMS; PROBLEM SOLVING; SECURITY OF DATA; STANDARDS;

EID: 27544514646     PISSN: 09168508     EISSN: 17451337     Source Type: Journal    
DOI: 10.1093/ietfec/E88-A.1.374     Document Type: Conference Paper
Times cited : (7)

References (9)
  • 1
    • 0037869332 scopus 로고    scopus 로고
    • Fragile watermarking scheme for image authentication
    • June
    • H.T. Lu, R.M. Shen, and F.L. Chung, "Fragile watermarking scheme for image authentication," Electron. Lett., vol.39, no.12, pp.898-900, June 2003.
    • (2003) Electron. Lett. , vol.39 , Issue.12 , pp. 898-900
    • Lu, H.T.1    Shen, R.M.2    Chung, F.L.3
  • 2
    • 0032648596 scopus 로고    scopus 로고
    • Digital watermarking for telltale tamper proofing and authentication
    • July
    • D. Kundur and D. Hatzinakos, "Digital watermarking for telltale tamper proofing and authentication," Proc. IEEE, vol.87, no.7, pp.1167-1180, July 1999.
    • (1999) Proc. IEEE , vol.87 , Issue.7 , pp. 1167-1180
    • Kundur, D.1    Hatzinakos, D.2
  • 3
    • 0035473830 scopus 로고    scopus 로고
    • Multipurpose watermarking for image authentication and protection
    • Oct.
    • C.S. Lu and H.M. Liao, "Multipurpose watermarking for image authentication and protection," IEEE Trans. Image Process., vol.10, no.10, pp.1579-1592, Oct. 2001.
    • (2001) IEEE Trans. Image Process. , vol.10 , Issue.10 , pp. 1579-1592
    • Lu, C.S.1    Liao, H.M.2
  • 5
    • 0036611838 scopus 로고    scopus 로고
    • Hierarchical watermarking for secure image authentication with localization
    • June
    • M.U. Celik, G. Sharma, E. Saber, and A.M. Tekalp, "Hierarchical watermarking for secure image authentication with localization," IEEE Trans. Image Process., vol.11, no.6, pp.585-595, June 2002.
    • (2002) IEEE Trans. Image Process. , vol.11 , Issue.6 , pp. 585-595
    • Celik, M.U.1    Sharma, G.2    Saber, E.3    Tekalp, A.M.4
  • 6
    • 0037851028 scopus 로고    scopus 로고
    • An asymmetric watermarking method
    • April
    • F. Teddy and D. Pierre, "An asymmetric watermarking method," IEEE Trans. Signal Process., vol.51, no.4, pp.981-995, April 2003.
    • (2003) IEEE Trans. Signal Process. , vol.51 , Issue.4 , pp. 981-995
    • Teddy, F.1    Pierre, D.2
  • 7
    • 0032120128 scopus 로고    scopus 로고
    • Digital image watermarking using mixing systems
    • G. Voyatzis and I. Pitas, "Digital image watermarking using mixing systems," Comput. & Graphics, vol.22, no.4, pp.405-416, 1998.
    • (1998) Comput. & Graphics , vol.22 , Issue.4 , pp. 405-416
    • Voyatzis, G.1    Pitas, I.2
  • 8
    • 0035018982 scopus 로고    scopus 로고
    • Watermarks embedded in the permuted image
    • J.C. Yen, "Watermarks embedded in the permuted image," Proc. IEEE Int. Symp. Circuits Syst., vol.2, pp.53-56, 2001.
    • (2001) Proc. IEEE Int. Symp. Circuits Syst. , vol.2 , pp. 53-56
    • Yen, J.C.1
  • 9
    • 0038194092 scopus 로고    scopus 로고
    • Information sources using chaotic dynamics
    • May
    • T. Kouda, "Information sources using chaotic dynamics," Proc. IEEE, vol.90, no.5, pp.641-661, May 2002.
    • (2002) Proc. IEEE , vol.90 , Issue.5 , pp. 641-661
    • Kouda, T.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.