메뉴 건너뛰기




Volumn 2, Issue , 2003, Pages II213-II216

A content-based image authentication system with lossless data hiding

Author keywords

[No Author keywords available]

Indexed keywords

AUTHENTICATION; ELECTRONIC DOCUMENT IDENTIFICATION SYSTEMS; IMAGE PROCESSING; STEGANOGRAPHY;

EID: 33751536764     PISSN: 19457871     EISSN: 1945788X     Source Type: Conference Proceeding    
DOI: 10.1109/ICME.2003.1221591     Document Type: Conference Paper
Times cited : (14)

References (10)
  • 1
    • 0029292158 scopus 로고
    • Information authentication for a slippery new age
    • April
    • S. Walton, "Information Authentication for a SlipperyNew Age", Dr. Dobbs Joumal, 20(4), pp18-26, April 1995.
    • (1995) Dr. Dobbs Joumal , vol.20 , Issue.4 , pp. 18-26
    • Walton, S.1
  • 2
    • 0032292342 scopus 로고    scopus 로고
    • Watermarking for image authentication
    • M. Wu, B. Liu, "Watermarking for ImageAuthentication", Proceedings KIP-98, vol. 2, pp. 437-441, 1998.
    • (1998) Proceedings KIP-98 , vol.2 , pp. 437-441
    • Wu, M.1    Liu, B.2
  • 3
    • 0032291652 scopus 로고    scopus 로고
    • Iloint wavelet compression andouthentication watermarking
    • G.R. Arce, Liehua Xie, 'Iloint wavelet compression andouthentication watermarking" Proceedings ICIP-98, "01.2 pp.427-431, 1998.
    • (1998) Proceedings ICIP-98,01.2 , pp. 427-431
    • Arce, G.R.1    Xie, L.2
  • 4
    • 84908566330 scopus 로고    scopus 로고
    • A robust content baseddigital signature for image authentication
    • M. Schneider, Shih-Fu Chang, "A robust content baseddigital signature for image authentication", Proceedings ICIP-96.vol. 3, pp. 16-19. 1996.
    • (1996) Proceedings ICIP-96 , vol.3 , pp. 16-19
    • Schneider, M.1    Chang, S.-F.2
  • 6
    • 0035471225 scopus 로고    scopus 로고
    • Techniques forcontent-based graph authentication
    • W. Wolf, Xiangyang Kong, H Yu, "Techniques forcontent-based graph authentication", IEEE Transaction onMultimedia, vol. 8, no. 4, pp 38-45,2001.
    • (2001) IEEE Transaction OnMultimedia , vol.8 , Issue.4 , pp. 38-45
    • Wolf, W.1    Kong, X.2    Yu, H.3
  • 7
    • 0033686485 scopus 로고    scopus 로고
    • DistortionBounded Authentication Techniques
    • T. Memon, P. Vora, B. Yeo, M. Yeung, "DistortionBounded Authentication Techniques", Proceedings of SPIE, vol.3971, pp. 164-174,2000.
    • (2000) Proceedings of SPIE , vol.3971 , pp. 164-174
    • Memon, T.1    Vora, P.2    Yeo, B.3    Yeung, M.4
  • 8
    • 0034780270 scopus 로고    scopus 로고
    • Limitations and requirements of contentbased multimedia authenlicntion systems
    • [SI C. W. Wu, "Limitations and Requirements of ContentbasedMultimedia Authenlicntion Systems", Proceedings of SPIE,vol. 4314, pp. 241-252,2001.
    • (2001) Proceedings of SPIE , vol.4314 , pp. 241-252
    • Wu, C.W.1
  • 9
    • 0036755019 scopus 로고    scopus 로고
    • On the design of content-based multimedia authenticofion systems
    • Sept.
    • C. W. Wu, "On the Design of Content-basedMultimedia Authenticofion Systems", IEEE Transaction onMultimedia, vol. 4, no. 3, pp. 385-393, Sept. 2002.
    • (2002) IEEE Transaction on Multimedia , vol.4 , Issue.3 , pp. 385-393
    • Wu, C.W.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.