메뉴 건너뛰기




Volumn 29, Issue 1, 2007, Pages 125-131

A copyright protection scheme for digital images using visual cryptography technique

Author keywords

Copyright protection; Digital watermarking; Discrete wavelet transform; Robustness; Visual cryptography

Indexed keywords

COPYRIGHTS; CRYPTOGRAPHY; DIGITAL WATERMARKING; EMBEDDED SYSTEMS; IMAGE ANALYSIS; IMAGE COMPRESSION; SECURITY OF DATA; WAVELET TRANSFORMS;

EID: 33751076835     PISSN: 09205489     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.csi.2006.02.003     Document Type: Article
Times cited : (93)

References (18)
  • 1
    • 13644262818 scopus 로고    scopus 로고
    • Hiding secret data in images via predictive coding
    • Yu Y.-H., Chang C.-C., and Hu Y.-C. Hiding secret data in images via predictive coding. Pattern Recognition 38 5 (2005) 691-705
    • (2005) Pattern Recognition , vol.38 , Issue.5 , pp. 691-705
    • Yu, Y.-H.1    Chang, C.-C.2    Hu, Y.-C.3
  • 2
    • 0842288710 scopus 로고    scopus 로고
    • A digital image watermarking method based on labeled bisecting clustering algorithm
    • Chu S.-C., Roddick J.F., Lu Z.-M., and Pan J.-S. A digital image watermarking method based on labeled bisecting clustering algorithm. IEICE Transactions on Fundamentals E87-A 1 (2004) 282-285
    • (2004) IEICE Transactions on Fundamentals , vol.E87-A , Issue.1 , pp. 282-285
    • Chu, S.-C.1    Roddick, J.F.2    Lu, Z.-M.3    Pan, J.-S.4
  • 3
    • 0036497685 scopus 로고    scopus 로고
    • A steganographic method based upon JPEG and quantization table modification
    • Chang C.-C., Chen T.-S., and Chung L.-Z. A steganographic method based upon JPEG and quantization table modification. Information Sciences 141 (2002) 123-138
    • (2002) Information Sciences , vol.141 , pp. 123-138
    • Chang, C.-C.1    Chen, T.-S.2    Chung, L.-Z.3
  • 4
    • 0037410595 scopus 로고    scopus 로고
    • A steganographic method for images by pixel-value differencing
    • Wu D.-C., and Tsai W.-H. A steganographic method for images by pixel-value differencing. Pattern Recognition Letters 24 (2003) 1613-1626
    • (2003) Pattern Recognition Letters , vol.24 , pp. 1613-1626
    • Wu, D.-C.1    Tsai, W.-H.2
  • 7
    • 0036474718 scopus 로고    scopus 로고
    • A wavelet-based watermarking algorithm for ownership verification of digital images
    • Wang Y., Doherty J.F., and Van Dyck R.E. A wavelet-based watermarking algorithm for ownership verification of digital images. IEEE Transactions on Image Processing 11 2 (2002) 77-88
    • (2002) IEEE Transactions on Image Processing , vol.11 , Issue.2 , pp. 77-88
    • Wang, Y.1    Doherty, J.F.2    Van Dyck, R.E.3
  • 8
    • 0036773638 scopus 로고    scopus 로고
    • A new robust watermark embedding into wavelet DC components
    • Joo S., Suh Y., Shin J., Kikuchi H., and Cho S.-J. A new robust watermark embedding into wavelet DC components. ETRI Journal 24 5 (2002) 401-404
    • (2002) ETRI Journal , vol.24 , Issue.5 , pp. 401-404
    • Joo, S.1    Suh, Y.2    Shin, J.3    Kikuchi, H.4    Cho, S.-J.5
  • 9
    • 1942488388 scopus 로고    scopus 로고
    • Cryptanalysis of correlation-based watermarking schemes using single watermarked copy
    • Das T.K., and Maitra S. Cryptanalysis of correlation-based watermarking schemes using single watermarked copy. IEEE Signal Processing Letters 11 4 (2004) 446-449
    • (2004) IEEE Signal Processing Letters , vol.11 , Issue.4 , pp. 446-449
    • Das, T.K.1    Maitra, S.2
  • 13
    • 0034251536 scopus 로고    scopus 로고
    • Repeating image watermarking technique by the visual cryptography
    • Wang C.-C., Tai S.-C., and Yu C.-S. Repeating image watermarking technique by the visual cryptography. IEICE Transactions on Fundamentals E83-A 8 (2000) 1589-1598
    • (2000) IEICE Transactions on Fundamentals , vol.E83-A , Issue.8 , pp. 1589-1598
    • Wang, C.-C.1    Tai, S.-C.2    Yu, C.-S.3
  • 14
    • 33747620205 scopus 로고    scopus 로고
    • A copyright protection scheme for gray-level images based on image secret sharing and wavelet transformation
    • Hsieh S.-L., and Huang B.-Y. A copyright protection scheme for gray-level images based on image secret sharing and wavelet transformation. Proceedings of International Computer Symposium (2004) 661-666
    • (2004) Proceedings of International Computer Symposium , pp. 661-666
    • Hsieh, S.-L.1    Huang, B.-Y.2
  • 15
    • 0036605019 scopus 로고    scopus 로고
    • An image intellectual property protection scheme for gray-level images using visual secret sharing strategy
    • Chang C.-C., and Chung J.-C. An image intellectual property protection scheme for gray-level images using visual secret sharing strategy. Pattern Recognition Letters 23 (2002) 931-941
    • (2002) Pattern Recognition Letters , vol.23 , pp. 931-941
    • Chang, C.-C.1    Chung, J.-C.2
  • 16
    • 0037096996 scopus 로고    scopus 로고
    • A public verifiable copy protection technique for still image
    • Lee W.-B., and Chen T.-H. A public verifiable copy protection technique for still image. Journal of Systems and Software 62 (2002) 195-204
    • (2002) Journal of Systems and Software , vol.62 , pp. 195-204
    • Lee, W.-B.1    Chen, T.-H.2
  • 17
    • 84926193517 scopus 로고
    • Visual cryptography, advances in cryptology: Eurocrypt'94
    • Naor N., and Shamir A. Visual cryptography, advances in cryptology: Eurocrypt'94. LNCS 950 (1995) 1-12
    • (1995) LNCS , vol.950 , pp. 1-12
    • Naor, N.1    Shamir, A.2
  • 18
    • 2642515522 scopus 로고    scopus 로고
    • A steganographic scheme for secure communications based on the chaos and Euler theorem
    • Lou D.-C., and Sung C.-H. A steganographic scheme for secure communications based on the chaos and Euler theorem. IEEE Transactions on Multimedia 6 3 (2004) 501-509
    • (2004) IEEE Transactions on Multimedia , vol.6 , Issue.3 , pp. 501-509
    • Lou, D.-C.1    Sung, C.-H.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.