메뉴 건너뛰기




Volumn 33, Issue 9, 2005, Pages 1557-1561

Fragile watermarking scheme with discrimination of tampers on image or watermark

Author keywords

Chaos; Fragile watermark; Scalar quantization; Scrambling

Indexed keywords

CHAOS THEORY; COMPUTER SIMULATION; CRYPTOGRAPHY; IMAGE COMPRESSION; IMAGE PROCESSING; SECURITY OF DATA; WAVELET TRANSFORMS;

EID: 27744484392     PISSN: 03722112     EISSN: None     Source Type: Journal    
DOI: None     Document Type: Article
Times cited : (15)

References (7)
  • 1
    • 0035473831 scopus 로고    scopus 로고
    • Secret and public key image watermarking schemes for image authentication and ownership verification
    • P W Wong, et al. Secret and public key image watermarking schemes for image authentication and ownership verification[J]. IEEE Trans on Image Processing, 2001, 10(10): 1593-1601
    • (2001) IEEE Trans on Image Processing , vol.10 , Issue.10 , pp. 1593-1601
    • Wong, P.W.1
  • 2
    • 0036611838 scopus 로고    scopus 로고
    • Hierarchical watermarking for secure image authentication with localization
    • M U Celik, et al. Hierarchical watermarking for secure image authentication with localization[J]. IEEE Trans on Image Processing. 2002, 11(6): 585-595.
    • (2002) IEEE Trans on Image Processing , vol.11 , Issue.6 , pp. 585-595
    • Celik, M.U.1
  • 3
    • 0032312612 scopus 로고    scopus 로고
    • Public key watermark for image verification and authentication
    • Chicago, IL, USA: IEEE
    • P W Wong, et al. Public key watermark for image verification and authentication [A]. Proc of 1998 IEEE Int Con on Image Processing [C]. Chicago, IL, USA: IEEE, 1998, 1: 455-459.
    • (1998) Proc of 1998 IEEE Int Con on Image Processing , vol.1 , pp. 455-459
    • Wong, P.W.1
  • 4
    • 0033872149 scopus 로고    scopus 로고
    • Counterfeiting attacks on oblivious block-wise independent invisible watermarking schemes
    • M Holliman, et al. Counterfeiting attacks on oblivious block-wise independent invisible watermarking schemes[J]. IEEE Trans on Image Processing, 2000, 3(9): 432-441.
    • (2000) IEEE Trans on Image Processing , vol.3 , Issue.9 , pp. 432-441
    • Holliman, M.1
  • 5
    • 4544259721 scopus 로고    scopus 로고
    • A chaotic fragile watermarking technique with precise localization
    • Chinese source
    • DING Ke, HE Chen, WANG Hong-xia. A Chaotic Fragile Watermarking Technique with Precise Localization[J]. Chinese Journal of Electronics, 2004, (6): 1009-1012. (Chinese Source)
    • (2004) Chinese Journal of Electronics , Issue.6 , pp. 1009-1012
    • Ding, K.1    He, C.2    Wang, H.-X.3
  • 6
    • 27744486530 scopus 로고    scopus 로고
    • A new chaotic digital watermarking method based on private key
    • Chinese source
    • ZHANG Jia-shu, TIAN Lei. A new chaotic digital watermarking method based on private key[J]. Journal of China Institute of communications, 2004, 25(8): 126-131. (Chinese Source)
    • (2004) Journal of China Institute of Communications , vol.25 , Issue.8 , pp. 126-131
    • Zhang, J.-S.1    Tian, L.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.