메뉴 건너뛰기




Volumn 27, Issue 5, 2006, Pages 439-446

A watermarking-based image ownership and tampering authentication scheme

Author keywords

Image authentication; Ownership protection; Tampering detection; Watermarking

Indexed keywords

EMBEDDED SYSTEMS; IMAGE PROCESSING; WATERMARKING;

EID: 32644434350     PISSN: 01678655     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.patrec.2005.09.006     Document Type: Article
Times cited : (140)

References (18)
  • 2
    • 0036611838 scopus 로고    scopus 로고
    • Hierarchical watermarking for secure image authentication with localization
    • M.U. Celik, G. Sharma, E. Saber, and A.M. Tekalp Hierarchical watermarking for secure image authentication with localization IEEE Trans. Image Process. 11 6 2002 585 595
    • (2002) IEEE Trans. Image Process. , vol.11 , Issue.6 , pp. 585-595
    • Celik, M.U.1    Sharma, G.2    Saber, E.3    Tekalp, A.M.4
  • 3
    • 0036489322 scopus 로고    scopus 로고
    • A data-hiding technique with authentication, integration, and confidentiality for electronic patient records
    • H.M. Chao, C.M. Hsu, and S.G. Miaou A data-hiding technique with authentication, integration, and confidentiality for electronic patient records IEEE Trans. Inf. Technol. Biomed. 6 1 2002 46 53
    • (2002) IEEE Trans. Inf. Technol. Biomed. , vol.6 , Issue.1 , pp. 46-53
    • Chao, H.M.1    Hsu, C.M.2    Miaou, S.G.3
  • 5
    • 1542752845 scopus 로고    scopus 로고
    • Applying projection and B-spline to image authentication and remedy
    • C.H. Lin, and W.S. Hsieh Applying projection and B-spline to image authentication and remedy IEEE Trans. Consumer Electron. 49 4 2003 1234 1239
    • (2003) IEEE Trans. Consumer Electron. , vol.49 , Issue.4 , pp. 1234-1239
    • Lin, C.H.1    Hsieh, W.S.2
  • 6
    • 0035248504 scopus 로고    scopus 로고
    • A robust image authentication method distinguishing JPEG compression from malicious manipulation
    • C.Y. Lin, and S.F. Chang A robust image authentication method distinguishing JPEG compression from malicious manipulation IEEE Trans. Circ. Systems Video Technol. 11 2 2001 153 168
    • (2001) IEEE Trans. Circ. Systems Video Technol. , vol.11 , Issue.2 , pp. 153-168
    • Lin, C.Y.1    Chang, S.F.2
  • 7
    • 0037818310 scopus 로고    scopus 로고
    • Structural digital signature for image authentication: An incidental distortion resistant scheme
    • C.S. Lu, and H.Y.M. Liao Structural digital signature for image authentication: An incidental distortion resistant scheme IEEE Trans. Multimedia 5 2 2003 161 173
    • (2003) IEEE Trans. Multimedia , vol.5 , Issue.2 , pp. 161-173
    • Lu, C.S.1    Liao, H.Y.M.2
  • 8
    • 0035372202 scopus 로고    scopus 로고
    • Lossless image compression and encryption using SCAN
    • S.S. Maniccam, and N. Bourbakis Lossless image compression and encryption using SCAN Pattern Recognition 34 6 2001 1229 1245
    • (2001) Pattern Recognition , vol.34 , Issue.6 , pp. 1229-1245
    • Maniccam, S.S.1    Bourbakis, N.2
  • 9
    • 0348108146 scopus 로고    scopus 로고
    • Lossless compression and information hiding in images
    • S.S. Maniccam, and N. Bourbakis Lossless compression and information hiding in images Pattern Recognition 37 3 2004 475 486
    • (2004) Pattern Recognition , vol.37 , Issue.3 , pp. 475-486
    • Maniccam, S.S.1    Bourbakis, N.2
  • 10
    • 0035097432 scopus 로고    scopus 로고
    • Authentication of digital images and video: Generic models and a new contribution
    • M.P. Queluz Authentication of digital images and video: Generic models and a new contribution Signal Process.: Image Comm. 16 5 2001 461 475
    • (2001) Signal Process.: Image Comm. , vol.16 , Issue.5 , pp. 461-475
    • Queluz, M.P.1
  • 13
    • 0142029533 scopus 로고    scopus 로고
    • Using set partitioning in hierarchical tree to authenticate digital images
    • P. Tsai, Y.C. Hu, and C.C. Chang Using set partitioning in hierarchical tree to authenticate digital images Signal Process.: Image Comm. 18 9 2003 813 822
    • (2003) Signal Process.: Image Comm. , vol.18 , Issue.9 , pp. 813-822
    • Tsai, P.1    Hu, Y.C.2    Chang, C.C.3
  • 14
    • 0029292158 scopus 로고
    • Information authentication for a slippery new age
    • S. Walton Information authentication for a slippery new age Dr. Dobbs J. 20 4 1995 18 26
    • (1995) Dr. Dobbs J. , vol.20 , Issue.4 , pp. 18-26
    • Walton, S.1
  • 16
    • 0032312612 scopus 로고    scopus 로고
    • A public key watermark for image verification and authentication
    • Chicago, IL
    • Wong, P.W., 1998. A public key watermark for image verification and authentication. In: Proceedings of IEEE International Conference on Image Processing, Chicago, IL, vol. 1, pp. 425-429.
    • (1998) Proceedings of IEEE International Conference on Image Processing , vol.1 , pp. 425-429
    • Wong, P.W.1
  • 17
    • 0035473831 scopus 로고    scopus 로고
    • Secret and public key image watermarking schemes for image authentication and ownership verification
    • P.W. Wong, and N. Memon Secret and public key image watermarking schemes for image authentication and ownership verification IEEE Trans. Image Process. 10 10 2001 1593 1601
    • (2001) IEEE Trans. Image Process. , vol.10 , Issue.10 , pp. 1593-1601
    • Wong, P.W.1    Memon, N.2
  • 18
    • 0036755019 scopus 로고    scopus 로고
    • On the design of content-based multimedia authentication systems
    • C.W. Wu On the design of content-based multimedia authentication systems IEEE Trans. Multimedia 4 3 2002 385 393
    • (2002) IEEE Trans. Multimedia , vol.4 , Issue.3 , pp. 385-393
    • Wu, C.W.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.