메뉴 건너뛰기




Volumn , Issue , 2005, Pages 5484-5489

Using two semi-fragile watermark for image authentication

Author keywords

Authentication; Image features; Semi fragile watermarking; Wavelet transform

Indexed keywords

DIGITAL WATERMARKING; FREQUENCY DOMAIN ANALYSIS; WAVELET TRANSFORMS;

EID: 28444483572     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (29)

References (16)
  • 1
    • 49549097199 scopus 로고    scopus 로고
    • The survey of digital watermarking-based image authentication techniques
    • Aug.
    • Liu .T, Qiu.Z D, "The survey of digital watermarking-based image authentication techniques" proceeding of. 2002 6th International conference, pp. 1556-1559, Aug., 2002.
    • (2002) Proceeding Of. 2002 6th International Conference , pp. 1556-1559
    • Liu, T.1    Qiu, Z.D.2
  • 9
    • 0035509773 scopus 로고    scopus 로고
    • A class of authentication digital watermark for secure multimedia communication
    • G.R.A.L.Xie, "A class of authentication digital watermark for secure multimedia communication", IEEE trans on image processing,vol. 10, No. 11, pp. 1754-1764, 2001.
    • (2001) IEEE Trans on Image Processing , vol.10 , Issue.11 , pp. 1754-1764
    • Xie, G.R.A.L.1
  • 10
    • 0024700097 scopus 로고
    • A theory for multiresolution signal decomposition: The wavelet representation
    • Nov.
    • Mallat S. G, " A theory for multiresolution signal decomposition: The wavelet representation", IEEE Trans. Pattern Anal. Machine Intell., vol.1,No. 11, pp. 674-693, Nov. 1989.
    • (1989) IEEE Trans. Pattern Anal. Machine Intell. , vol.1 , Issue.11 , pp. 674-693
    • Mallat, S.G.1
  • 11
    • 0034258869 scopus 로고    scopus 로고
    • Adaptive wavelet thresholding for image denosing and compression
    • sept.
    • Chang S, Yu B, Vetterli M, "Adaptive wavelet thresholding for image denosing and compression. "IEEE transaction on image processing, vol.9, No.9 pp. 1532-1546., sept., 2002.
    • (2002) IEEE Transaction on Image Processing , vol.9 , Issue.9 , pp. 1532-1546
    • Chang, S.1    Yu, B.2    Vetterli, M.3
  • 13
    • 28444457919 scopus 로고
    • RFC1321:The MD5 message-digiest algorithm
    • Apr
    • Rivest R L.RFC1321:The MD5 message-digiest algorithm.Internet Activitys Board, Apr, 1992
    • (1992) Internet Activitys Board
    • Rivest, R.L.1
  • 15
    • 0035248504 scopus 로고    scopus 로고
    • A robust image authentication method distinguishing JPEG compression from malicious manipulation
    • Feb
    • Lin C,.Chang S F, "A robust image authentication method distinguishing JPEG compression from malicious manipulation" IEEE transaction on circuits and systems for video technology,vol.11, No.2,pp. 153 -168.Feb,2001
    • (2001) IEEE Transaction on Circuits and Systems for Video Technology , vol.11 , Issue.2 , pp. 153-168
    • Lin, C.1    Chang, S.F.2
  • 16
    • 0037818310 scopus 로고    scopus 로고
    • Structural digital signature for image authentication: An incidental distortion resistant algorithm
    • Mar
    • Lu C S, Liao, H, "Structural digital signature for image authentication: an incidental distortion resistant algorithm, IEEE trans on Multimedia",vol. 5,No.3,pp. 161-173,Mar,2003
    • (2003) IEEE Trans on Multimedia , vol.5 , Issue.3 , pp. 161-173
    • Lu, C.S.1    Liao, H.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.