메뉴 건너뛰기




Volumn 23, Issue 2, 2007, Pages 511-524

Toward a robust image authentication method surviving JPEG lossy compression

Author keywords

Discrete cosine transform (DCT); Further quantization property; Image authentication; JPEG quantization; Quantization sum invariant property

Indexed keywords

AUTHENTICATION; COMPUTER CRIME; CRYPTOGRAPHY; DISCRETE COSINE TRANSFORMS; EMBEDDED SYSTEMS; ROBUSTNESS (CONTROL SYSTEMS); SECURITY OF DATA;

EID: 33947720908     PISSN: 10162364     EISSN: None     Source Type: Journal    
DOI: None     Document Type: Article
Times cited : (5)

References (12)
  • 2
    • 0036611838 scopus 로고    scopus 로고
    • Hierarchical watermarking for secure image authentication with localization
    • M. U. Celik, G. Sharma, and A. M. Tekalp, "Hierarchical watermarking for secure image authentication with localization," IEEE Transactions on Image Processing, Vol. 11, 2002, pp. 585-595.
    • (2002) IEEE Transactions on Image Processing , vol.11 , pp. 585-595
    • Celik, M.U.1    Sharma, G.2    Tekalp, A.M.3
  • 4
    • 0032648596 scopus 로고    scopus 로고
    • Digital watermarking for telltale tamper-proofing and authentication
    • D. Kundur and D. Hatzinakos, "Digital watermarking for telltale tamper-proofing and authentication," in Proceedings of the IEEE, Vol. 87, 1999, pp. 1167-1180.
    • (1999) Proceedings of the IEEE , vol.87 , pp. 1167-1180
    • Kundur, D.1    Hatzinakos, D.2
  • 5
    • 0035248504 scopus 로고    scopus 로고
    • A robust image authentication method distinguishing JPEG compression from malicious manipulation
    • C. Y. Lin and S. F. Chang, "A robust image authentication method distinguishing JPEG compression from malicious manipulation," IEEE Transactions on Circuits and Systems of Video Technology, Vol. 10, 2001, pp. 153-1681.
    • (2001) IEEE Transactions on Circuits and Systems of Video Technology , vol.10 , pp. 153-1681
    • Lin, C.Y.1    Chang, S.F.2
  • 6
    • 0035473830 scopus 로고    scopus 로고
    • Multipurpose watermarking for image authentication and protection
    • C. S. Lu and H. Y. M. Liao, "Multipurpose watermarking for image authentication and protection," IEEE Transactions on Image Processing, Vol. 10, 2001, pp. 1579-1592.
    • (2001) IEEE Transactions on Image Processing , vol.10 , pp. 1579-1592
    • Lu, C.S.1    Liao, H.Y.M.2
  • 7
    • 0037869332 scopus 로고    scopus 로고
    • Fragile watermarking scheme for image authentication
    • H. Lu, R. Shen, and F. L. Chung, "Fragile watermarking scheme for image authentication," Electronic Letters, Vol. 39, 2003, pp. 898-900.
    • (2003) Electronic Letters , vol.39 , pp. 898-900
    • Lu, H.1    Shen, R.2    Chung, F.L.3
  • 9
    • 0142029533 scopus 로고    scopus 로고
    • Using set partitioning in hierarchical trees to authenticate digital images
    • P. Tsai, Y. C. Hu, and C. C. Chang, "Using set partitioning in hierarchical trees to authenticate digital images," Signal Processing: Image Communication, Vol. 18, 2003, pp. 813-822.
    • (2003) Signal Processing: Image Communication , vol.18 , pp. 813-822
    • Tsai, P.1    Hu, Y.C.2    Chang, C.C.3
  • 10
    • 0035473831 scopus 로고    scopus 로고
    • Secret and public key image watermarking schemes for image authentication and ownership verification
    • P. W. Wong and N. Memon, "Secret and public key image watermarking schemes for image authentication and ownership verification," IEEE Transactions on Image Processing, Vol. 10, 2001, pp. 1593-1601.
    • (2001) IEEE Transactions on Image Processing , vol.10 , pp. 1593-1601
    • Wong, P.W.1    Memon, N.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.