메뉴 건너뛰기




Volumn 4283 LNCS, Issue , 2006, Pages 422-432

A wavelet-based fragile watermarking scheme for secure image authentication

Author keywords

Discrete wavelet transform (DWT); Fragile watermarking; The transplantation attack; The vector quantization attack

Indexed keywords

DIGITAL WATERMARKING; EMBEDDED SYSTEMS; SECURITY OF DATA; WAVELET TRANSFORMS;

EID: 33845423997     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/11922841_34     Document Type: Conference Paper
Times cited : (49)

References (12)
  • 1
    • 0031378592 scopus 로고    scopus 로고
    • An invisible watermarking technique for image verification
    • M.M. Yeung and F. Mintzer, An invisible watermarking technique for image verification, Proc. IEEE Int. Conf. Image Processing, 1997, vol. 2, pp. 680-683.
    • (1997) Proc. IEEE Int. Conf. Image Processing , vol.2 , pp. 680-683
    • Yeung, M.M.1    Mintzer, F.2
  • 2
    • 0032312612 scopus 로고    scopus 로고
    • A public key watermark for image verification and authentication
    • Chicago, IL
    • P. Wong, A public key watermark for image verification and authentication, Proc. IEEE Int. Conf. Image Processing, Chicago, IL, 1998, pp. 425 - 429.
    • (1998) Proc. IEEE Int. Conf. Image Processing , pp. 425-429
    • Wong, P.1
  • 4
    • 0033872149 scopus 로고    scopus 로고
    • Counterfeiting attacks on oblivious block-wise independent invisible watermarking schemes
    • March
    • M.Holliman and N. Memon, Counterfeiting attacks on oblivious block-wise independent invisible watermarking schemes, IEEE Trans. Image Processing, vol. 9, no. 3, pp. 432-441, March 2000.
    • (2000) IEEE Trans. Image Processing , vol.9 , Issue.3 , pp. 432-441
    • Holliman, M.1    Memon, N.2
  • 5
    • 0036030626 scopus 로고    scopus 로고
    • Security of fragile authentication watermarks with localization
    • Security and Watermarking of Multimedia Contents, San Jose, CA, Jan.
    • J. Fridrich, Security of fragile authentication watermarks with localization, Proc. SPIE, vol. 4675, Security and Watermarking of Multimedia Contents, San Jose, CA, Jan., 2002, pp. 691-700.
    • (2002) Proc. SPIE , vol.4675 , pp. 691-700
    • Fridrich, J.1
  • 6
    • 0042823352 scopus 로고    scopus 로고
    • Secure hybrid robust watermarking resistant against tampering and copy attack
    • F.Deguillaume, S.Voloshynovskiy, T.Pun, Secure hybrid robust watermarking resistant against tampering and copy attack, Signal Processing 83(2003):2133-2170.
    • (2003) Signal Processing , vol.83 , pp. 2133-2170
    • Deguillaume, F.1    Voloshynovskiy, S.2    Pun, T.3
  • 7
    • 0035473831 scopus 로고    scopus 로고
    • Secret and public key image watermarking schemes for image authentication and ownership verification
    • P. Wong and N. Memon, Secret and public key image watermarking schemes for image authentication and ownership verification, IEEE Trans. Image Processing, vol. 10, pp. 1593-1601, 2001.
    • (2001) IEEE Trans. Image Processing , vol.10 , pp. 1593-1601
    • Wong, P.1    Memon, N.2
  • 8
    • 8344236008 scopus 로고    scopus 로고
    • Fragile image watermarking using a gradient image for improved localization and security
    • Suthaharan, S., Fragile image watermarking using a gradient image for improved localization and security, Pattern Recognition Letters, 2004(25),pp:1893-1903.
    • (2004) Pattern Recognition Letters , Issue.25 , pp. 1893-1903
    • Suthaharan, S.1
  • 10
    • 0035398091 scopus 로고    scopus 로고
    • Bayesian tree-structured image modeling using wavelet-domain hidden markov models
    • Justin K R, Hyeokho Choi, et al, Bayesian Tree-structured image modeling using wavelet-domain hidden markov models, IEEE Transactions on Image Processing, 2001, 10(7):1056 - 1068.
    • (2001) IEEE Transactions on Image Processing , vol.10 , Issue.7 , pp. 1056-1068
    • Justin, K.R.1    Choi, H.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.