메뉴 건너뛰기




Volumn 185, Issue 2, 2007, Pages 869-882

An image fragile watermark scheme based on chaotic image pattern and pixel-pairs

Author keywords

Authentication; Chaotic image; Difference image; Fragile watermark

Indexed keywords

ALGORITHMS; CHAOS THEORY; COMPUTATIONAL COMPLEXITY; COMPUTER SIMULATION; IMAGE PROCESSING; SECURITY OF DATA;

EID: 33847280382     PISSN: 00963003     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.amc.2006.07.036     Document Type: Article
Times cited : (110)

References (27)
  • 3
    • 1942517830 scopus 로고    scopus 로고
    • Dual domain watermarking for authentication and compression of cultural heritage images
    • Yang Z., Campisi P., and Kundur D. Dual domain watermarking for authentication and compression of cultural heritage images. IEEE Transactions on Image Processing 13 3 (2004) 430-448
    • (2004) IEEE Transactions on Image Processing , vol.13 , Issue.3 , pp. 430-448
    • Yang, Z.1    Campisi, P.2    Kundur, D.3
  • 4
    • 0032308292 scopus 로고    scopus 로고
    • S. Bhattacharjee, M. Kutter. Compression tolerant image authentication, in: Proceeding of IEEE International Conference on Image Processing, vol. 1, 1998, pp. 435-439.
  • 5
    • 0035248504 scopus 로고    scopus 로고
    • A robust image authentication method distinguishing JPEG compression from malicious manipulation
    • Lin C.Y., and Chang S.F. A robust image authentication method distinguishing JPEG compression from malicious manipulation. IEEE Transactions on Circuits System and Video Technology 11 2 (2001) 153-168
    • (2001) IEEE Transactions on Circuits System and Video Technology , vol.11 , Issue.2 , pp. 153-168
    • Lin, C.Y.1    Chang, S.F.2
  • 7
    • 0042823356 scopus 로고    scopus 로고
    • Wavelet packets-based digital watermarking for image verification and authentication
    • Paquet A.H., Ward R.K., and Pitas I. Wavelet packets-based digital watermarking for image verification and authentication. Signal Processing 83 10 (2003) 2117-2132
    • (2003) Signal Processing , vol.83 , Issue.10 , pp. 2117-2132
    • Paquet, A.H.1    Ward, R.K.2    Pitas, I.3
  • 8
    • 0036611838 scopus 로고    scopus 로고
    • Hierarchical watermarking for secure image authentication with localization
    • Mehmet U.C., Gaurav S., Eli S., and Ahmet M.T. Hierarchical watermarking for secure image authentication with localization. IEEE Transactions on Image Processing 11 6 (2002) 585-595
    • (2002) IEEE Transactions on Image Processing , vol.11 , Issue.6 , pp. 585-595
    • Mehmet, U.C.1    Gaurav, S.2    Eli, S.3    Ahmet, M.T.4
  • 9
    • 0344235334 scopus 로고    scopus 로고
    • H. Yuan, X.P. Zhang. Fragile watermark based on the Gaussian mixture model in the wavelet domain for image authentication, in: Proceedings of International Conference on Image Processing, vol. 1, Barcelona, Spain, 2003, pp. 505-508 .
  • 10
    • 0029292158 scopus 로고
    • Information authentication for a slippery new age
    • Walton S. Information authentication for a slippery new age. Dr. Dobbs Journal 20 4 (1995) 18-26
    • (1995) Dr. Dobbs Journal , vol.20 , Issue.4 , pp. 18-26
    • Walton, S.1
  • 11
    • 0031378592 scopus 로고    scopus 로고
    • M. Yeung, F. Mintzer. An invisible watermarking technique for image verification, in: Proceeding of IEEE International Conference on Image Processing, vol. 2, Santa Barbara, California, 1997, pp. 680-683.
  • 12
    • 0034443602 scopus 로고    scopus 로고
    • J. Fridrich, M. Goljan, A.C. Baldoza, New fragile authentication watermark for images, in: Proceeding of IEEE International Conference on Image Processing, vol. 1, Vancouver, Canada, 2000, pp. 446-449.
  • 13
    • 0036030626 scopus 로고    scopus 로고
    • J. Fridrich, Security of fragile authentication watermarks with localization, in: Proceedings of SPIE Conference on Security and Watermarking of Multimedia Contents, vol. 4675, San Jose, California, 2002, pp. 691-700.
  • 14
    • 0033682895 scopus 로고    scopus 로고
    • P. Wong, N. Memon, Secret and public key authentication watermarking schemes that resist vector quantization attack, in: Proceedings of SPIE Conference on Security and Watermarking of Multimedia Contents, vol. 3971, San Jose, California, 2000, pp. 417-427.
  • 15
    • 33847253278 scopus 로고    scopus 로고
    • N. Memon, S. Shende, P. Wong, On the security of the Yeung-Mintzer authentication watermark. in: Proceedings of the IS&T PICS Symposium, Savannah, Georgia, 2000.
  • 16
    • 0033703669 scopus 로고    scopus 로고
    • J. Fridrich, M. Goljan, N. Memon, Further attacks on Yeung-Mintzer watermarking scheme, in: Proceedings of SPIE Electronic Imaging, San Jose, 2000.
  • 17
    • 0037869332 scopus 로고    scopus 로고
    • Fragile watermarking scheme for image authentication
    • Lu H.T., Shen R.M., and Chung F.L. Fragile watermarking scheme for image authentication. Electronics Letters 39 12 (2003) 898-900
    • (2003) Electronics Letters , vol.39 , Issue.12 , pp. 898-900
    • Lu, H.T.1    Shen, R.M.2    Chung, F.L.3
  • 18
    • 0033872149 scopus 로고    scopus 로고
    • Counterfeiting attacks on oblivious block-wise independent invisible watermarking schemes
    • Holliman M., and Memon N. Counterfeiting attacks on oblivious block-wise independent invisible watermarking schemes. IEEE Transactions on Image Processing 9 3 (2000) 432-444
    • (2000) IEEE Transactions on Image Processing , vol.9 , Issue.3 , pp. 432-444
    • Holliman, M.1    Memon, N.2
  • 20
    • 20444492372 scopus 로고    scopus 로고
    • J.H. Wu, B.B. Zhu, S.P. Li, F.Z. Lin, A secure image authentication algorithm with pixel-level tamper localization, in: Proceedings of international conference on image process (IEEE ICIP2004), vol. III, 2004, pp. 1573-1576 .
  • 21
    • 33847307997 scopus 로고    scopus 로고
    • J.H. Wu, B.B. Zhu, S.P. Li, F.Z. Lin, Efficient oracle attacks on Yeung-Mintzer and variant authentication schemes, in: Proceedings of International Conference on Multimedia and Expro. Twaiwan, 2004, pp. 301-306.
  • 22
    • 8644231988 scopus 로고    scopus 로고
    • J.H. Wu, B.B. Zhu, S.P. Li, F.Z. Lin, New attacks on sari image authentication system, in: Proceedings of SPIE, vol. 5306, San Jose, CA, 2004, pp. 602-609.
  • 23
    • 1342306801 scopus 로고    scopus 로고
    • Watermark-based copyright protection system security
    • Kwok S.H. Watermark-based copyright protection system security. Communications of the ACM 46 10 (2003) 98-101
    • (2003) Communications of the ACM , vol.46 , Issue.10 , pp. 98-101
    • Kwok, S.H.1
  • 24
    • 0041320695 scopus 로고    scopus 로고
    • A general framework for robust watermarking security
    • Barni M., Bartolini F., and Furon T. A general framework for robust watermarking security. Signal Processing 83 10 (2003) 2069-2084
    • (2003) Signal Processing , vol.83 , Issue.10 , pp. 2069-2084
    • Barni, M.1    Bartolini, F.2    Furon, T.3
  • 25
    • 0036530306 scopus 로고    scopus 로고
    • Cryptanalysis of the Yeung-Mintzer fragile watermarking technique
    • Fridrich J., Goljan M., and Memon N. Cryptanalysis of the Yeung-Mintzer fragile watermarking technique. Journal of Electronic Imaging 11 2 (2002) 262-274
    • (2002) Journal of Electronic Imaging , vol.11 , Issue.2 , pp. 262-274
    • Fridrich, J.1    Goljan, M.2    Memon, N.3
  • 26
    • 0035135789 scopus 로고    scopus 로고
    • Watermark embedded in permuted domain
    • Yen J.C. Watermark embedded in permuted domain. Electronics Letters 37 2 (2001) 80-81
    • (2001) Electronics Letters , vol.37 , Issue.2 , pp. 80-81
    • Yen, J.C.1
  • 27
    • 1842528982 scopus 로고    scopus 로고
    • A chaos-based robust wavelet-domain watermarking algorithm
    • Zhao D.W., Chen G.R., and Liu W.B. A chaos-based robust wavelet-domain watermarking algorithm. Chaos, Solitons and Fractals 22 12 (2004) 47-54
    • (2004) Chaos, Solitons and Fractals , vol.22 , Issue.12 , pp. 47-54
    • Zhao, D.W.1    Chen, G.R.2    Liu, W.B.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.