메뉴 건너뛰기




Volumn 12, Issue 2, 2006, Pages 151-163

Analysis of the "wavelet Tree Quantization" watermarking strategy and a modified robust scheme

Author keywords

Cryptanalysis; Digital watermarking; Information security; Multimedia systems; Wavelet transform

Indexed keywords

CRYPTOGRAPHY; JAMMING; MULTIMEDIA SYSTEMS; ROBUSTNESS (CONTROL SYSTEMS); SECURITY OF DATA; SPATIAL VARIABLES MEASUREMENT; WAVELET TRANSFORMS;

EID: 33750969059     PISSN: 09424962     EISSN: None     Source Type: Journal    
DOI: 10.1007/s00530-006-0046-9     Document Type: Article
Times cited : (6)

References (26)
  • 2
    • 84947227462 scopus 로고    scopus 로고
    • An analysis of one of the SDMI candidates
    • Information Hiding 2001. Springer, Berlin Heidelberg New York
    • Boeuf, J., Stern, J.P.: An analysis of one of the SDMI candidates. In: Information Hiding 2001. Lecture Notes in Computer Science, vol. 2137, pp. 395-410 Springer, Berlin Heidelberg New York (2001)
    • (2001) Lecture Notes in Computer Science , vol.2137 , pp. 395-410
    • Boeuf, J.1    Stern, J.P.2
  • 4
    • 13244284705 scopus 로고    scopus 로고
    • Cryptanalysis of optimal differential energy watermarking (DEW) and a modified robust scheme
    • Das, T.K., Maitra, S., Mitra, J.: Cryptanalysis of optimal differential energy watermarking (DEW) and a modified robust scheme. IEEE Trans. Signal Process. 53(2), 768-775 (2005)
    • (2005) IEEE Trans. Signal Process. , vol.53 , Issue.2 , pp. 768-775
    • Das, T.K.1    Maitra, S.2    Mitra, J.3
  • 5
    • 1942488388 scopus 로고    scopus 로고
    • Cryptanalysis of correlation based water-marking schemes using single watermarked copy
    • Das, T.K., Maitra, S.: Cryptanalysis of correlation based water-marking schemes using single watermarked copy. IEEE Signal Process. Lett. 11(4), 446-449 (2004)
    • (2004) IEEE Signal Process. Lett. , vol.11 , Issue.4 , pp. 446-449
    • Das, T.K.1    Maitra, S.2
  • 6
    • 84957610906 scopus 로고    scopus 로고
    • A note on the limits of collusion-resistant watermarks
    • Eurocrypt 1999. Springer, Berlin Heidelberg New york
    • Ergun, F., Kilian J., Kumar, R.: A note on the limits of collusion-resistant watermarks. In: Eurocrypt 1999. LNCS, vol. 1592, pp. 140-149, Springer, Berlin Heidelberg New york (1999)
    • (1999) LNCS , vol.1592 , pp. 140-149
    • Ergun, F.1    Kilian, J.2    Kumar, R.3
  • 8
    • 84957892352 scopus 로고    scopus 로고
    • Robust digital water-marking based on key-dependent basis functions
    • Information Hiding: Second International Workshop. Portland, OR, USA, April 1998. Springer, Berlin Heidelberg New York
    • Fridrich, J., Baldoza, A.C., Simard, R.J.: Robust digital water-marking based on key-dependent basis functions. In: Information Hiding: Second International Workshop. Portland, OR, USA, April 1998. Lecture Notes in Computer Science, vol. 1525, pp. 143-157, Springer, Berlin Heidelberg New York (1998)
    • (1998) Lecture Notes in Computer Science , vol.1525 , pp. 143-157
    • Fridrich, J.1    Baldoza, A.C.2    Simard, R.J.3
  • 10
    • 84947916149 scopus 로고    scopus 로고
    • Recovery of watermarks from distorted images
    • Proceedings of the Third Information Hiding Workshop, Springer, Berlin Heidelberg New York
    • Johnson, N.F., Duric, Z., Jajodia, S.: Recovery of watermarks from distorted images. In: Proceedings of the Third Information Hiding Workshop, LNCS, vol. 1768, pp. 318-332. Springer, Berlin Heidelberg New York (2000)
    • (2000) LNCS , vol.1768 , pp. 318-332
    • Johnson, N.F.1    Duric, Z.2    Jajodia, S.3
  • 13
    • 0003185688 scopus 로고
    • La cryptographie militaire
    • Jan, 161-191, FEB 1883
    • Kerckhoffs, A.: La Cryptographie Militaire. J. Sci. Mil. 9th series, IX, 5-38, Jan 1883, 161-191, FEB 1883
    • (1883) J. Sci. Mil. 9th Series , vol.9 , pp. 5-38
    • Kerckhoffs, A.1
  • 15
    • 35248891551 scopus 로고    scopus 로고
    • Replacement attack on arbitrary watermarking systems
    • ACM Workshop on Digital Rights Management 2002. Springer, Berlin Heidelberg New York
    • Kirovski, D., Petitcolas, F.A.P.: Replacement attack on arbitrary watermarking systems. In: ACM Workshop on Digital Rights Management 2002. Lecture Notes in Computer Science, vol. 2696, pp. 177-189. Springer, Berlin Heidelberg New York (2002)
    • (2002) Lecture Notes in Computer Science , vol.2696 , pp. 177-189
    • Kirovski, D.1    Petitcolas, F.A.P.2
  • 16
    • 0002883985 scopus 로고    scopus 로고
    • Improved digital watermarking through diversity and attack characterization
    • Orlando, FL, USA, October
    • Kundur, D.: Improved digital watermarking through diversity and attack characterization. In: Proceedings of the ACM Workshop on Multimedia Security'99, Orlando, FL, USA, October 1999, pp. 53-58
    • (1999) Proceedings of the ACM Workshop on Multimedia Security'99 , pp. 53-58
    • Kundur, D.1
  • 17
    • 0035127750 scopus 로고    scopus 로고
    • Optimal differential energy watermarking of DCT encoded images and video
    • Langelaar, G.C., Lagendijk, R.L.: Optimal differential energy watermarking of DCT encoded images and video. IEEE Trans. Image Process. 10(1), 148-158 (2001)
    • (2001) IEEE Trans. Image Process. , vol.10 , Issue.1 , pp. 148-158
    • Langelaar, G.C.1    Lagendijk, R.L.2
  • 18
    • 0024700097 scopus 로고
    • A theory of multi resolution signal decomposition: The Wavelet representation
    • Mallat, S.G.: A theory of multi resolution signal decomposition: the Wavelet representation. IEEE Trans PAMI 11, 674-693 (1989)
    • (1989) IEEE Trans PAMI , vol.11 , pp. 674-693
    • Mallat, S.G.1
  • 19
    • 35248849238 scopus 로고    scopus 로고
    • Cryptanalysis of discrete-sequence spread spectrum watermarks
    • Workshop on Information Hiding 2002, Springer, Berlin Heidelbreg New York
    • Mihcak, M.K., Venkatesan, R., Kesal, M.: Cryptanalysis of discrete-sequence spread spectrum watermarks. In: Workshop on Information Hiding 2002, Lecture Notes in Computer Science, vol 2578, pp. 226-246. Springer, Berlin Heidelbreg New York (2003)
    • (2003) Lecture Notes in Computer Science , vol.2578 , pp. 226-246
    • Mihcak, M.K.1    Venkatesan, R.2    Kesal, M.3
  • 20
    • 0035167831 scopus 로고    scopus 로고
    • Watermark security via wavelet filter parameterization
    • 2001
    • Meerwald, P., Uhl, A.: Watermark Security via Wavelet Filter Parameterization. In: The Proceedings of ICIP, 2001, vol. 3, pp. 1027-1030, 2001
    • (2001) The Proceedings of ICIP , vol.3 , pp. 1027-1030
    • Meerwald, P.1    Uhl, A.2
  • 21
    • 84957877979 scopus 로고    scopus 로고
    • Attacks on copyright marking systems
    • 2nd Workshop on Information Hiding. Springer, Berlin Heidelberg New York
    • Petitcolas, F.A.P., Anderson, R.J., Kuhn, M.G., Aucsmith, D.: Attacks on copyright marking systems. In: 2nd Workshop on Information Hiding. Lecture Notes in Computer Science, vol. 1525 pp. 28-238. Springer, Berlin Heidelberg New York (1998)
    • (1998) Lecture Notes in Computer Science , vol.1525 , pp. 28-238
    • Petitcolas, F.A.P.1    Anderson, R.J.2    Kuhn, M.G.3    Aucsmith, D.4
  • 23
    • 0346396224 scopus 로고    scopus 로고
    • Cryptographic copyright protection for digital images based on watermarking techniques
    • Ruanaidh, J.O., Petersen, H., Herrigel, A., Pereira, S., Pun, T.: Cryptographic copyright protection for digital images based on watermarking techniques. Theor. Comput. Sci. 226, 117-142 (1999)
    • (1999) Theor. Comput. Sci. , vol.226 , pp. 117-142
    • Ruanaidh, J.O.1    Petersen, H.2    Herrigel, A.3    Pereira, S.4    Pun, T.5
  • 24
    • 0036474718 scopus 로고    scopus 로고
    • A wavelet-based watermarking algorithm for ownership verification of digital images
    • Wang, Y., Doherty, J.F., VanDyck, R.E.: A wavelet-based watermarking algorithm for ownership verification of digital images. IEEE Trans. Image Process. 11(2), 77-88 (2002)
    • (2002) IEEE Trans. Image Process. , vol.11 , Issue.2 , pp. 77-88
    • Wang, Y.1    Doherty, J.F.2    VanDyck, R.E.3
  • 26
    • 1942486241 scopus 로고    scopus 로고
    • Wavelet tree quantization for copyright protection watermarking
    • Wang, S.-H., Lin, Y.-P: Wavelet tree quantization for copyright protection watermarking. IEEE Trans. Image Process. 13(2), 154-165 (2004)
    • (2004) IEEE Trans. Image Process. , vol.13 , Issue.2 , pp. 154-165
    • Wang, S.-H.1    Lin, Y.-P.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.