메뉴 건너뛰기




Volumn 29, Issue 5, 2007, Pages 561-570

A majority-voting based watermarking scheme for color image tamper detection and recovery

Author keywords

Fragile watermarking; Majority voting; Tamper detection; Tampered image recovery

Indexed keywords

AUTHENTICATION; COLOR IMAGE PROCESSING; EMBEDDED SYSTEMS; IMAGE RECOGNITION; VECTOR QUANTIZATION;

EID: 34248661818     PISSN: 09205489     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.csi.2006.11.009     Document Type: Article
Times cited : (75)

References (22)
  • 2
    • 0036611838 scopus 로고    scopus 로고
    • Hierarchical watermarking for secure image authentication with localization
    • Celik M.U., Sharma G., Saber E., and Tekalp A.M. Hierarchical watermarking for secure image authentication with localization. IEEE Trans Image Process 11 6 (2000) 585-595
    • (2000) IEEE Trans Image Process , vol.11 , Issue.6 , pp. 585-595
    • Celik, M.U.1    Sharma, G.2    Saber, E.3    Tekalp, A.M.4
  • 3
    • 0347927731 scopus 로고    scopus 로고
    • Detection and restoration of tampered JPEG compressed images
    • Wu H.C., and Chang C.C. Detection and restoration of tampered JPEG compressed images. J Syst Softw 64 2 (2002) 151-161
    • (2002) J Syst Softw , vol.64 , Issue.2 , pp. 151-161
    • Wu, H.C.1    Chang, C.C.2
  • 6
    • 0029292158 scopus 로고
    • Information Authentication for a Slippery New Age
    • Walton S. Information Authentication for a Slippery New Age. Dr Dobb's J 20 4 (1995) 18-26
    • (1995) Dr Dobb's J , vol.20 , Issue.4 , pp. 18-26
    • Walton, S.1
  • 10
    • 0035473831 scopus 로고    scopus 로고
    • Secret and public key image watermarking schemes for image authentication and ownership verification
    • Wong P.W., and Memon N. Secret and public key image watermarking schemes for image authentication and ownership verification. IEEE Trans Image Process 10 10 (2001) 1593-1601
    • (2001) IEEE Trans Image Process , vol.10 , Issue.10 , pp. 1593-1601
    • Wong, P.W.1    Memon, N.2
  • 11
    • 0036627368 scopus 로고    scopus 로고
    • A survey of watermarking algorithms for image authentication
    • Rey C., and Dugelay J.L. A survey of watermarking algorithms for image authentication. EURASTP J Appl Signal Process 6 (2002) 613-621
    • (2002) EURASTP J Appl Signal Process , vol.6 , pp. 613-621
    • Rey, C.1    Dugelay, J.L.2
  • 12
    • 8344236008 scopus 로고    scopus 로고
    • Fragile image watermarking using a gradient image for improved localization and security
    • Suthaharan S. Fragile image watermarking using a gradient image for improved localization and security. Pattern Recogn Lett 25 16 (2004) 1893-1903
    • (2004) Pattern Recogn Lett , vol.25 , Issue.16 , pp. 1893-1903
    • Suthaharan, S.1
  • 13
    • 25144448272 scopus 로고    scopus 로고
    • A hierarchical digital watermarking method for image tamper detection and recovery
    • Lin P.-L., Hsieh C.-K., and Huang P.-W. A hierarchical digital watermarking method for image tamper detection and recovery. Pattern Recogn 38 12 (2005) 2519-2529
    • (2005) Pattern Recogn , vol.38 , Issue.12 , pp. 2519-2529
    • Lin, P.-L.1    Hsieh, C.-K.2    Huang, P.-W.3
  • 19
    • 0033872149 scopus 로고    scopus 로고
    • Counterfeiting attacks on oblivious block-wise independent invisible watermarking schemes
    • Holliman M., and Memon N. Counterfeiting attacks on oblivious block-wise independent invisible watermarking schemes. IEEE Trans Image Process 9 3 (2000) 432-441
    • (2000) IEEE Trans Image Process , vol.9 , Issue.3 , pp. 432-441
    • Holliman, M.1    Memon, N.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.