메뉴 건너뛰기




Volumn , Issue , 2005, Pages 1083-1109

Watermarking Techniques for Image Authentication and Copyright Protection

Author keywords

[No Author keywords available]

Indexed keywords


EID: 34247604039     PISSN: None     EISSN: None     Source Type: Book    
DOI: 10.1016/B978-012119792-6/50125-X     Document Type: Chapter
Times cited : (11)

References (91)
  • 3
    • 85032753064 scopus 로고    scopus 로고
    • What is the future for watermarking? (part i)
    • September
    • M. Barni (2003) What is the future for watermarking? (part i). IEEE Signal Processing Magazine 20(5), 55-59. September
    • (2003) IEEE Signal Processing Magazine , vol.20 , Issue.5 , pp. 55-59
    • Barni, M.1
  • 4
    • 85032750868 scopus 로고    scopus 로고
    • What is the future for watermarking? (part ii)
    • November
    • M. Barni (2003) What is the future for watermarking? (part ii). IEEE Signal Processing Magazine 20(6), 53-59. November
    • (2003) IEEE Signal Processing Magazine , vol.20 , Issue.6 , pp. 53-59
    • Barni, M.1
  • 7
    • 85115721225 scopus 로고    scopus 로고
    • Benchmarking of watermarking algorithms
    • J.-S. Pan, H.-C. Huang, L. Jain (Eds), World Scientific Publishing
    • N. Nikolaidis and I. Pitas (2004) Benchmarking of watermarking algorithms. J.-S. Pan, H.-C. Huang, L. Jain (Eds) Intelligent Watermarking Techniques World Scientific Publishing 315-347.
    • (2004) Intelligent Watermarking Techniques , pp. 315-347
    • Nikolaidis, N.1    Pitas, I.2
  • 8
    • 0032633080 scopus 로고    scopus 로고
    • The use of watermarks in the protection of digital multimedia products
    • July
    • G. Voyatzis and I. Pitas (1999) The use of watermarks in the protection of digital multimedia products. Proceedings of the IEEE 87(7), 1197-1207. July
    • (1999) Proceedings of the IEEE , vol.87 , Issue.7 , pp. 1197-1207
    • Voyatzis, G.1    Pitas, I.2
  • 19
    • 0002500694 scopus 로고    scopus 로고
    • Image authentication techniques for surveillance applications
    • October
    • F. Bartolini, A. Tefas, M. Barni and I. Pitas (2001) Image authentication techniques for surveillance applications. Proceedings of the IEEE 89(10), 1403-1418. October
    • (2001) Proceedings of the IEEE , vol.89 , Issue.10 , pp. 1403-1418
    • Bartolini, F.1    Tefas, A.2    Barni, M.3    Pitas, I.4
  • 23
    • 0032625842 scopus 로고    scopus 로고
    • Watermarking as communications with side information
    • July
    • I.J. Cox, M.I. Miller and A.L. McKellips (1999) Watermarking as communications with side information. Proceedings of the IEEE 87(7), 1127-1141. July
    • (1999) Proceedings of the IEEE , vol.87 , Issue.7 , pp. 1127-1141
    • Cox, I.J.1    Miller, M.I.2    McKellips, A.L.3
  • 24
    • 0035333687 scopus 로고    scopus 로고
    • Quantization index modulation: a class of provably good methods for digital watermarking and information embedding
    • May
    • B. Chen and G. Wornell (2001) Quantization index modulation: a class of provably good methods for digital watermarking and information embedding. IEEE Transactions on Information Theory 47(4), 1423-1443. May
    • (2001) IEEE Transactions on Information Theory , vol.47 , Issue.4 , pp. 1423-1443
    • Chen, B.1    Wornell, G.2
  • 27
    • 4544313881 scopus 로고    scopus 로고
    • Design and statistical analysis of a hash-aided image watermarking system
    • October
    • J. Cannons and P. Moulin (2004) Design and statistical analysis of a hash-aided image watermarking system. IEEE Transactions on Image Processing 13(10), 1393-1408. October
    • (2004) IEEE Transactions on Image Processing , vol.13 , Issue.10 , pp. 1393-1408
    • Cannons, J.1    Moulin, P.2
  • 29
    • 0035333285 scopus 로고    scopus 로고
    • Improved wavelet-based watermarking through pixel-wise masking
    • May
    • M. Barni, F. Bartolini and A. Piva (2001) Improved wavelet-based watermarking through pixel-wise masking. IEEE Transactions on Image Processing 10(5), 783-791. May
    • (2001) IEEE Transactions on Image Processing , vol.10 , Issue.5 , pp. 783-791
    • Barni, M.1    Bartolini, F.2    Piva, A.3
  • 30
    • 0035510211 scopus 로고    scopus 로고
    • Circularly symmetric watermark embedding in 2d dft domain
    • November
    • V. Solachidis and I. Pitas (2001) Circularly symmetric watermark embedding in 2d dft domain. IEEE Transactions on Image Processing 10(11), 1741-1753. November
    • (2001) IEEE Transactions on Image Processing , vol.10 , Issue.11 , pp. 1741-1753
    • Solachidis, V.1    Pitas, I.2
  • 31
    • 0033882559 scopus 로고    scopus 로고
    • Dct-domain watermarking techniques for still images: Detector performance analysis and a new structure
    • Januray
    • J.R. Hernandez Juan R., M. Amado Martin and F. PerezGonzalez Fernando (2000) Dct-domain watermarking techniques for still images: Detector performance analysis and a new structure. IEEE Transactions on Image Processing 9(1), 55-68Januray. Januray
    • (2000) IEEE Transactions on Image Processing , vol.9 , Issue.1 , pp. 55-68Januray
    • Hernandez, J.R.1    Amado, M.2    PerezGonzalez, F.3
  • 34
    • 0037851033 scopus 로고    scopus 로고
    • Robust optimum detection of transform domain multiplicative watermarks
    • April
    • Q. Cheng Qiang and T.S. Huang (2003) Robust optimum detection of transform domain multiplicative watermarks. IEEE Transactions on Signal Processing 51(4), 906-924. April
    • (2003) IEEE Transactions on Signal Processing , vol.51 , Issue.4 , pp. 906-924
    • Cheng, Q.1    Huang, T.S.2
  • 35
    • 14544298472 scopus 로고    scopus 로고
    • Optimal detector for multiplicative watermarks embedded in the dft domain of non-white signals
    • accepted for publication
    • V. Solachidis and I. Pitas (2004) Optimal detector for multiplicative watermarks embedded in the dft domain of non-white signals. Journal of Applied Signal Processing accepted for publication
    • (2004) Journal of Applied Signal Processing
    • Solachidis, V.1    Pitas, I.2
  • 37
    • 0742321328 scopus 로고    scopus 로고
    • Spatial domain digital watermarking of multimedia objects for buyer authentication
    • February
    • D.P. Mukherjee, S. Maitra and S.T. Acton (2004) Spatial domain digital watermarking of multimedia objects for buyer authentication. IEEE Transactions on Multimedia 6(1), 1-15. February
    • (2004) IEEE Transactions on Multimedia , vol.6 , Issue.1 , pp. 1-15
    • Mukherjee, D.P.1    Maitra, S.2    Acton, S.T.3
  • 39
    • 0038612961 scopus 로고    scopus 로고
    • Dct-based image watermarking using subsampling
    • March
    • W.C. Chu (2003) Dct-based image watermarking using subsampling. IEEE Transactions on Multimedia 5(1), 34-38. March
    • (2003) IEEE Transactions on Multimedia , vol.5 , Issue.1 , pp. 34-38
    • Chu, W.C.1
  • 41
    • 0036474718 scopus 로고    scopus 로고
    • A wavelet-based watermarking algorithm for ownership verification of digital images
    • February
    • Y. Wang, J. Doherty and R.V. Dyck R. Van (2002) A wavelet-based watermarking algorithm for ownership verification of digital images. IEEE Transactions on Image Processing 11(2), 77-88. February
    • (2002) IEEE Transactions on Image Processing , vol.11 , Issue.2 , pp. 77-88
    • Wang, Y.1    Doherty, J.2    Dyck, R.V.3
  • 42
    • 44649109456 scopus 로고    scopus 로고
    • Methodology for the subjective assessment of the quality of television pictures
    • June
    • ITU (2002) Methodology for the subjective assessment of the quality of television pictures. ITU-R Recommendation BT.500-11 June
    • (2002) ITU-R Recommendation BT.500-11
  • 44
    • 0035369792 scopus 로고    scopus 로고
    • Attack modelling: Towards a second generation benchmark
    • June
    • S. Voloshynovskiy, S. Pereira, V. Iquise and T. Pun (2001) Attack modelling: Towards a second generation benchmark. Signal Processing 81(6), 1177-1214. June
    • (2001) Signal Processing , vol.81 , Issue.6 , pp. 1177-1214
    • Voloshynovskiy, S.1    Pereira, S.2    Iquise, V.3    Pun, T.4
  • 45
    • 0034442962 scopus 로고    scopus 로고
    • Multi-bit image watermarking robust to geometric distortions
    • Vancouver, Canada, 10-13 September
    • A. Tefas and I. Pitas (2000) Multi-bit image watermarking robust to geometric distortions. CD-ROM Proc. of IEEE Int. Conf on Image Processing (ICIP'2000) Vancouver, Canada 710-713. 10-13 September
    • (2000) CD-ROM Proc. of IEEE Int. Conf on Image Processing (ICIP'2000) , pp. 710-713
    • Tefas, A.1    Pitas, I.2
  • 46
    • 85032751954 scopus 로고    scopus 로고
    • Watermarking schemes evaluation
    • September
    • F.A.P. Petitcolas (2000) Watermarking schemes evaluation. IEEE Signal Processing Magazine 17(5), 58-64. September
    • (2000) IEEE Signal Processing Magazine , vol.17 , Issue.5 , pp. 58-64
    • Petitcolas, F.A.P.1
  • 48
    • 0032074580 scopus 로고    scopus 로고
    • Resolving rightful ownerships with invisible watermarking techniques: Limitations, attacks and implications
    • May
    • S. Craver, N. Memon, B.-L. Yeo and M. Yeung (1998) Resolving rightful ownerships with invisible watermarking techniques: Limitations, attacks and implications. IEEE Journal of Selected Areas in Communications 16(4), May
    • (1998) IEEE Journal of Selected Areas in Communications , vol.16 , Issue.4
    • Craver, S.1    Memon, N.2    Yeo, B.-L.3    Yeung, M.4
  • 54
    • 0029765001 scopus 로고    scopus 로고
    • Copyright protection of images using robust digital signatures
    • Atlanta, GA
    • N. Nikolaidis and I. Pitas (1996) Copyright protection of images using robust digital signatures. Proc. of ICASSP'96 4 2168-2171. Atlanta, GA
    • (1996) Proc. of ICASSP'96 , vol.4 , pp. 2168-2171
    • Nikolaidis, N.1    Pitas, I.2
  • 56
    • 0032296690 scopus 로고    scopus 로고
    • Chaotic watermarks for embedding in the spatial digital image domain
    • 4–7 October, Chicago, USA
    • G. Voyatzis and I. Pitas (1998) Chaotic watermarks for embedding in the spatial digital image domain. 4–7 October Proc. of ICIP'98 II 432-436. Chicago, USA
    • (1998) Proc. of ICIP'98 , vol.II , pp. 432-436
    • Voyatzis, G.1    Pitas, I.2
  • 57
    • 0033699308 scopus 로고    scopus 로고
    • Comparison of different chaotic maps with application to image watermarking
    • 28-31 May, Geneva, Switzerland
    • A. Nikolaidis and I. Pitas (2000) Comparison of different chaotic maps with application to image watermarking. 28-31 May Proc. of ISCAS'00 V 509-512. Geneva, Switzerland
    • (2000) Proc. of ISCAS'00 , vol.V , pp. 509-512
    • Nikolaidis, A.1    Pitas, I.2
  • 58
    • 0034442891 scopus 로고    scopus 로고
    • Copyright protection of still images using self-similar chaotic watermarks
    • to appear, Vancouver, Canada, 10-13 September
    • S. Tsekeridou, N. Nikolaidis, N. Sidiropoulos and I. Pitas (2000) Copyright protection of still images using self-similar chaotic watermarks. to appear Proc. of ICIP'00 Vancouver, Canada 411-414. 10-13 September
    • (2000) Proc. of ICIP'00 , pp. 411-414
    • Tsekeridou, S.1    Nikolaidis, N.2    Sidiropoulos, N.3    Pitas, I.4
  • 62
    • 0035308124 scopus 로고    scopus 로고
    • Watermarking in the space/spatial domain using two-dimensional radon wigner distribution
    • April
    • I. Djurovic, S. Stankovic and I. Pitas (2001) Watermarking in the space/spatial domain using two-dimensional radon wigner distribution. IEEE Transactions on Image Processing 10(4), 650-658. April
    • (2001) IEEE Transactions on Image Processing , vol.10 , Issue.4 , pp. 650-658
    • Djurovic, I.1    Stankovic, S.2    Pitas, I.3
  • 63
    • 0033726714 scopus 로고    scopus 로고
    • Robust template matching for affine resistant image watermarks
    • June
    • S. Pereira and T. Pun (2000) Robust template matching for affine resistant image watermarks. IEEE Trans, on Image Processing 9(6), 1123-1129. June
    • (2000) IEEE Trans, on Image Processing , vol.9 , Issue.6 , pp. 1123-1129
    • Pereira, S.1    Pun, T.2
  • 64
    • 0032678983 scopus 로고    scopus 로고
    • Template based recovery of fourier-based watermarks using log-polar and log-log maps
    • 7-11 June, Florence, Italy
    • S. Pereira, J. Ruanaidh, F. Deguillaume, G. Csurka and T. Pun (1999) Template based recovery of fourier-based watermarks using log-polar and log-log maps. 7-11 June Proc. of ICMCS'99 I 870-874. Florence, Italy
    • (1999) Proc. of ICMCS'99 , vol.I , pp. 870-874
    • Pereira, S.1    Ruanaidh, J.2    Deguillaume, F.3    Csurka, G.4    Pun, T.5
  • 67
    • 0032636838 scopus 로고    scopus 로고
    • Circularly symmetric watermark embedding in 2-d dft domain
    • Phoenix, Arizona, 15-19 March
    • V. Solachidis and I. Pitas (1999) Circularly symmetric watermark embedding in 2-d dft domain. Proc. of ICASPF'99 Phoenix, Arizona 3469-3472. 15-19 March
    • (1999) Proc. of ICASPF'99 , pp. 3469-3472
    • Solachidis, V.1    Pitas, I.2
  • 68
    • 0033692720 scopus 로고    scopus 로고
    • Embedding self-similar watermarks in the wavelet domain
    • Istanbul, Turkey, 5-9 June
    • S. Tsekeridou and I. Pitas (2000) Embedding self-similar watermarks in the wavelet domain. Proc. of ICASSP'00 Istanbul, Turkey 1967-1970. 5-9 June
    • (2000) Proc. of ICASSP'00 , pp. 1967-1970
    • Tsekeridou, S.1    Pitas, I.2
  • 69
    • 0000633632 scopus 로고    scopus 로고
    • Watermarking resisting to translation, rotation and scaling
    • November
    • M. Kutter (1998) Watermarking resisting to translation, rotation and scaling. Proc. of SPIE November
    • (1998) Proc. of SPIE
    • Kutter, M.1
  • 72
    • 0037353686 scopus 로고    scopus 로고
    • Information-theoretic analysis of information hiding
    • March
    • P. Moulin and J.A. O'Sullivan (2003) Information-theoretic analysis of information hiding. IEEE Trans, on Information Theory 49(3), 563-593. March
    • (2003) IEEE Trans, on Information Theory , vol.49 , Issue.3 , pp. 563-593
    • Moulin, P.1    O'Sullivan, J.A.2
  • 73
    • 0035251780 scopus 로고    scopus 로고
    • Quantization index modulation methods for digital watermarking and information embedding in multimedia
    • B. Chen and G. Wornell (2001) Quantization index modulation methods for digital watermarking and information embedding in multimedia. Journal of VLSI Signal Processing 27 7-33.
    • (2001) Journal of VLSI Signal Processing , vol.27 , pp. 7-33
    • Chen, B.1    Wornell, G.2
  • 78
    • 0027697301 scopus 로고
    • The trustworthy digital camera: Restoring credibility to the photographic image
    • November
    • G.L. Friedman (1993) The trustworthy digital camera: Restoring credibility to the photographic image. IEEE Transactions on Consumer Electronics 39(4), 905-910. November
    • (1993) IEEE Transactions on Consumer Electronics , vol.39 , Issue.4 , pp. 905-910
    • Friedman, G.L.1
  • 79
    • 0032308292 scopus 로고    scopus 로고
    • Compression tolerant image authentication
    • 4-7 October, Chicago
    • S. Bhattacharjee and M. Kutter (1998) Compression tolerant image authentication. 4-7 October Proc. of ICIP'98 I 425-429. Chicago
    • (1998) Proc. of ICIP'98 , vol.I , pp. 425-429
    • Bhattacharjee, S.1    Kutter, M.2
  • 80
    • 0029727745 scopus 로고    scopus 로고
    • Transparent robust authentication and distortion measurement technique for images
    • Loen, Norway, September
    • B. Zhu, M.D. Swanson and A.H. Tewfik (1996) Transparent robust authentication and distortion measurement technique for images. Proc. of DSP'96 Loen, Norway 45-48. September
    • (1996) Proc. of DSP'96 , pp. 45-48
    • Zhu, B.1    Swanson, M.D.2    Tewfik, A.H.3
  • 81
    • 0001171295 scopus 로고    scopus 로고
    • A public key watermark for image verification and authentication
    • 4-7 October, Chicago
    • P.W. Wong (1998) A public key watermark for image verification and authentication. 4-7 October Proc. of ICIF'98 I 425-429. Chicago
    • (1998) Proc. of ICIF'98 , vol.I , pp. 425-429
    • Wong, P.W.1
  • 82
    • 84882516087 scopus 로고    scopus 로고
    • Semi-fragile watermarking for authenticating jpeg visual content
    • C.-Y. Lin and S.-F. Chang (2000) Semi-fragile watermarking for authenticating jpeg visual content. SPIE EI'00 3971.
    • (2000) SPIE EI'00 , pp. 3971
    • Lin, C.-Y.1    Chang, S.-F.2
  • 83
    • 0001204404 scopus 로고    scopus 로고
    • Watermarking for image authentication
    • 4-7 October, Chicago
    • M. Wu and B. Liu (1998) Watermarking for image authentication. 4-7 October Proc. of ICIP'98 I 425-429. Chicago
    • (1998) Proc. of ICIP'98 , vol.I , pp. 425-429
    • Wu, M.1    Liu, B.2
  • 84
    • 0031378592 scopus 로고    scopus 로고
    • An invisible watermarking technique for image verification
    • October, Atlanta, GA
    • M.M. Yeung and F. Mintzer (1997) An invisible watermarking technique for image verification. October Proc. of ICIP'97 II 680-683. Atlanta, GA
    • (1997) Proc. of ICIP'97 , vol.II , pp. 680-683
    • Yeung, M.M.1    Mintzer, F.2
  • 85
    • 0033872149 scopus 로고    scopus 로고
    • Counterfeiting attacks on oblivious blockwise independent invisible watermarking schemes
    • March
    • M. Holliman and N. Memon (2000) Counterfeiting attacks on oblivious blockwise independent invisible watermarking schemes. IEEE Trans, on Image Processing 9(3), 432-441. March
    • (2000) IEEE Trans, on Image Processing , vol.9 , Issue.3 , pp. 432-441
    • Holliman, M.1    Memon, N.2
  • 86
    • 0032291652 scopus 로고    scopus 로고
    • Joint wavelet compression and authentication watermarking
    • 4-7 October, Chicago
    • L. Xie and G.R. Arce (1998) Joint wavelet compression and authentication watermarking. 4-7 October Proc. of ICIP'98 II 427-431. Chicago
    • (1998) Proc. of ICIP'98 , vol.II , pp. 427-431
    • Xie, L.1    Arce, G.R.2
  • 87
    • 0032648596 scopus 로고    scopus 로고
    • Digital watermarking for telltale tamper proofing and authentication
    • July
    • D. Kundur and D. Hatzinakos (1999) Digital watermarking for telltale tamper proofing and authentication. Proceedings of the IEEE 87(7), 1167-1180. July
    • (1999) Proceedings of the IEEE , vol.87 , Issue.7 , pp. 1167-1180
    • Kundur, D.1    Hatzinakos, D.2
  • 88
    • 0031338360 scopus 로고    scopus 로고
    • Effective and ineffective digital watermarks
    • October, Atlanta, GA
    • F. Mintzer, G.W. Braudaway and M.M. Yeung (1997) Effective and ineffective digital watermarks. October Proc. of ICIP'97 III 9-12. Atlanta, GA
    • (1997) Proc. of ICIP'97 , vol.III , pp. 9-12
    • Mintzer, F.1    Braudaway, G.W.2    Yeung, M.M.3
  • 89
    • 0003356542 scopus 로고    scopus 로고
    • A watermark for image integrity and ownership verification
    • Portland, OR
    • P.W. Wong (1997) A watermark for image integrity and ownership verification. Proc. of IS&T PINC Conf Portland, OR
    • (1997) Proc. of IS&T PINC Conf
    • Wong, P.W.1
  • 91
    • 84937061498 scopus 로고    scopus 로고
    • Image authentication and tamper proofing using mathematical morphology
    • Tampere, Finland, 5-8 September
    • A. Tefas and I. Pitas (2000) Image authentication and tamper proofing using mathematical morphology. Proc. of European Signal Processing Conf (EUSIPCO'2000) Tampere, Finland, 5-8 September
    • (2000) Proc. of European Signal Processing Conf (EUSIPCO'2000)
    • Tefas, A.1    Pitas, I.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.