메뉴 건너뛰기




Volumn 1, Issue , 2006, Pages 726-731

Region of interest fragile watermarking for image authentication

Author keywords

[No Author keywords available]

Indexed keywords

BINARY CODES; COPYRIGHTS; DIGITAL WATERMARKING; FUNCTION EVALUATION; POISSON DISTRIBUTION; WAVELET TRANSFORMS;

EID: 33845582720     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/IMSCCS.2006.112     Document Type: Conference Paper
Times cited : (13)

References (22)
  • 4
    • 4544371217 scopus 로고    scopus 로고
    • A multi-scale fragile watermarking based on the Gaussian mixture model in the wavelet area
    • H. Yuan, and X.P. Zhang "A multi-scale fragile watermarking based on the Gaussian mixture model in the wavelet area", Proc. 2004 Int. Conf. on Acoustics, Speech and Signal Processing, 3, 2004,pp.413-416.
    • (2004) Proc. 2004 Int. Conf. on Acoustics, Speech and Signal Processing , vol.3 , pp. 413-416
    • Yuan, H.1    Zhang, X.P.2
  • 7
    • 0002500694 scopus 로고    scopus 로고
    • Image authentication techniques for surveillance applications
    • F. Bartollini, A. Tefas, M. Barni, and I. Pitas, "Image authentication techniques for surveillance applications", Proceedings of the IEEE, 89(10), 2001, pp. 1403-1418.
    • (2001) Proceedings of the IEEE , vol.89 , Issue.10 , pp. 1403-1418
    • Bartollini, F.1    Tefas, A.2    Barni, M.3    Pitas, I.4
  • 9
    • 0035391983 scopus 로고    scopus 로고
    • Digital watermarking:Algorithms and applications
    • C.I. Podilchuk, and E.J. Delp, "Digital watermarking:Algorithms and applications", IEEE Signal Processing Magazine, 18(4), 2001,pp.33-46.
    • (2001) IEEE Signal Processing Magazine , vol.18 , Issue.4 , pp. 33-46
    • Podilchuk, C.I.1    Delp, E.J.2
  • 14
    • 0032648596 scopus 로고    scopus 로고
    • Digital watermarking for telltale tamper proofing and authentication
    • D. Kundur, and Hatzinakos, "Digital watermarking for telltale tamper proofing and authentication", Proceedings of the IEEE, 87(7), 1999, pp.1167-1180.
    • (1999) Proceedings of the IEEE , vol.87 , Issue.7 , pp. 1167-1180
    • Kundur, D.1    Hatzinakos2
  • 15
    • 33845568061 scopus 로고    scopus 로고
    • A secure semi-fragile watermarking for image authentication based on integer wavelet transform with parameters abstract
    • X.Y. Wu, J.Q. Hu, Z.X. Gu, J.W. Huang, "A Secure Semi-Fragile Watermarking for Image Authentication Based on Integer Wavelet Transform with Parameters Abstract", ACSW Frontiers, 2005, pp.75-80.
    • (2005) ACSW Frontiers , pp. 75-80
    • Wu, X.Y.1    Hu, J.Q.2    Gu, Z.X.3    Huang, J.W.4
  • 16
    • 0030715832 scopus 로고    scopus 로고
    • Gradient vector flow: A new external force for snakes
    • Los Alamitos: Comp. Soc. Press
    • C. Xu, and J.L. Prince, "Gradient Vector Flow: A New External Force for Snakes", Proc. IEEE Conf. on Comp. Vis. Patt. Recog.(CVPR), Los Alamitos: Comp. Soc. Press, 1997, pp. 66-71.
    • (1997) Proc. IEEE Conf. on Comp. Vis. Patt. Recog.(CVPR) , pp. 66-71
    • Xu, C.1    Prince, J.L.2
  • 17
  • 19
    • 12844262766 scopus 로고    scopus 로고
    • 'Grabcut': Interactive foreground extraction using integrated graph cuts
    • C. Rother, V.Kolmogorov, and A.Black. "'grabcut': interactive foreground extraction using integrated graph cuts". ACM Trans.Graph, 23(3), 2004,pp.309-314.
    • (2004) ACM Trans.Graph , vol.23 , Issue.3 , pp. 309-314
    • Rother, C.1    Kolmogorov, V.2    Black, A.3
  • 20
    • 0034844730 scopus 로고    scopus 로고
    • Interactive graph cuts for optimal boundary and region segmentation of objects in n-d images
    • Y. Boykov, M.P. Jolly, "Interactive graph cuts for optimal boundary and region segmentation of objects in n-d images", In ICCV, 2001, pp. 105-112.
    • (2001) ICCV , pp. 105-112
    • Boykov, Y.1    Jolly, M.P.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.