메뉴 건너뛰기




Volumn 16, Issue 1, 2007, Pages

Wavelet-based fragile watermarking scheme for image authentication

Author keywords

[No Author keywords available]

Indexed keywords

WATERMARK EMBEDDING PROCESS; WATERMARKABLE COEFFICIENT;

EID: 34248667015     PISSN: 10179909     EISSN: 1560229X     Source Type: Journal    
DOI: 10.1117/1.2712445     Document Type: Article
Times cited : (39)

References (27)
  • 1
    • 27744517664 scopus 로고    scopus 로고
    • Ergodic chaotic parameter modulation with application to digital image watermarking
    • S. Chen and H. Leung, "Ergodic chaotic parameter modulation with application to digital image watermarking," IEEE Trans. Image Process. 14(10), 1590-1602 (2005).
    • (2005) IEEE Trans. Image Process , vol.14 , Issue.10 , pp. 1590-1602
    • Chen, S.1    Leung, H.2
  • 2
    • 14344265162 scopus 로고    scopus 로고
    • Digital fragile watermarking scheme for authentication of JPEG images
    • C.-T. Li, "Digital fragile watermarking scheme for authentication of JPEG images," IEE Proc. Vision Image Signal Process. 151(6), 460-466 (2004).
    • (2004) IEE Proc. Vision Image Signal Process , vol.151 , Issue.6 , pp. 460-466
    • Li, C.-T.1
  • 3
    • 0141862035 scopus 로고    scopus 로고
    • An ill-posed operator for secure image authentication
    • E. Izquierdo and V. Guerra, "An ill-posed operator for secure image authentication," IEEE Trans. Circuits Syst. Vdeo Technol. 13(8), 842-852 (2003).
    • (2003) IEEE Trans. Circuits Syst. Vdeo Technol , vol.13 , Issue.8 , pp. 842-852
    • Izquierdo, E.1    Guerra, V.2
  • 4
    • 0041695400 scopus 로고    scopus 로고
    • Design of an efficient authentication method for modern image and video
    • D. Skraparlis, "Design of an efficient authentication method for modern image and video," IEEE Trans. Consum. Electron. 49(2), 417-426 (2003).
    • (2003) IEEE Trans. Consum. Electron , vol.49 , Issue.2 , pp. 417-426
    • Skraparlis, D.1
  • 5
    • 20444378085 scopus 로고    scopus 로고
    • Multipurpose image watermarking algorithm based on multistage vector quantization
    • Z. M. Lu, D. G. Xu, and S. H. Sun, "Multipurpose image watermarking algorithm based on multistage vector quantization," IEEE Trans. Image Process. 14(6), 822-831 (2005).
    • (2005) IEEE Trans. Image Process , vol.14 , Issue.6 , pp. 822-831
    • Lu, Z.M.1    Xu, D.G.2    Sun, S.H.3
  • 7
    • 33749622444 scopus 로고    scopus 로고
    • Localization and security enhancement of block-based image authentication
    • H. Ouda and M. R. El-Sakka, "Localization and security enhancement of block-based image authentication," in Proc. IEEE Int. Conf. Image Process, Vol. I, pp. 673-676 (2005).
    • (2005) Proc. IEEE Int. Conf. Image Process , vol.1 , pp. 673-676
    • Ouda, H.1    El-Sakka, M.R.2
  • 8
    • 13244283134 scopus 로고    scopus 로고
    • An asymmetric subspace watermarking method for copyright protection
    • J. Tzeng, W.-L. Hwang, and I.-L. Chern, "An asymmetric subspace watermarking method for copyright protection," IEEE Trans. Signal Process. 53(2), 784-792 (2005).
    • (2005) IEEE Trans. Signal Process , vol.53 , Issue.2 , pp. 784-792
    • Tzeng, J.1    Hwang, W.-L.2    Chern, I.-L.3
  • 9
    • 10644225222 scopus 로고    scopus 로고
    • A robust watermarking scheme using phase shift keying with the combination of amplitude boost and low amplitude block selection
    • W.-Y. Chen and C.-H. Chen, "A robust watermarking scheme using phase shift keying with the combination of amplitude boost and low amplitude block selection," Pattern Recogn. 38(4), 587-598 (2005).
    • (2005) Pattern Recogn , vol.38 , Issue.4 , pp. 587-598
    • Chen, W.-Y.1    Chen, C.-H.2
  • 10
    • 13144281779 scopus 로고    scopus 로고
    • Spatially localized image-dependent watermarking for statistical invisibility and collusion resistance
    • K. Su, D. Kundur, and D. Hatzinakos, "Spatially localized image-dependent watermarking for statistical invisibility and collusion resistance," IEEE Trans. Multimedia 7(1), 52-66 (2005).
    • (2005) IEEE Trans. Multimedia , vol.7 , Issue.1 , pp. 52-66
    • Su, K.1    Kundur, D.2    Hatzinakos, D.3
  • 13
    • 0034442403 scopus 로고    scopus 로고
    • Image authenticity and integrity verification via content-based watermarks and a public key cryptosystem
    • C.-T. Li, D. C. Lou, and T. H. Chen, "Image authenticity and integrity verification via content-based watermarks and a public key cryptosystem," in Proc. IEEE Int. Conf. Image Processing, Vol. III, pp. 694-697 (2000).
    • (2000) Proc. IEEE Int. Conf. Image Processing , vol.3 , pp. 694-697
    • Li, C.-T.1    Lou, D.C.2    Chen, T.H.3
  • 14
    • 0032117545 scopus 로고    scopus 로고
    • Invisible watermarking for image verification
    • M. Yeung and F. Minzter, "Invisible watermarking for image verification," J. Electron. Imaging 7(3), 578-591 (1998).
    • (1998) J. Electron. Imaging , vol.7 , Issue.3 , pp. 578-591
    • Yeung, M.1    Minzter, F.2
  • 16
    • 34248651529 scopus 로고    scopus 로고
    • Secret and public key authentication watermarking schemes that resist vector quantization attack
    • P. W. Wong and N. Memom, "Secret and public key authentication watermarking schemes that resist vector quantization attack," in Proc. SPIE Security and Watermarking of Multimedia Contents, Vol. II, pp. 40-47 (2000).
    • (2000) Proc. SPIE Security and Watermarking of Multimedia Contents , vol.2 , pp. 40-47
    • Wong, P.W.1    Memom, N.2
  • 17
    • 0033872149 scopus 로고    scopus 로고
    • Counterfeiting attacks on oblivious block-wise independent invisible watermarking schemes
    • M. Holliman and N. Memon, "Counterfeiting attacks on oblivious block-wise independent invisible watermarking schemes," IEEE Trans. Image Process. 9(3), 432-411 (2000).
    • (2000) IEEE Trans. Image Process , vol.9 , Issue.3 , pp. 432-411
    • Holliman, M.1    Memon, N.2
  • 19
    • 0037721337 scopus 로고    scopus 로고
    • One-dimensional neighborhood forming strategy for fragile watermarking
    • C.-T. Li and F. M. Yang, "One-dimensional neighborhood forming strategy for fragile watermarking," J. Electron. Imaging 12(2), 284-291 (2003).
    • (2003) J. Electron. Imaging , vol.12 , Issue.2 , pp. 284-291
    • Li, C.-T.1    Yang, F.M.2
  • 20
    • 0032292342 scopus 로고    scopus 로고
    • Watermarking for image authentication
    • M. Wu and B. Liu, "Watermarking for image authentication," in Proc. IEEE Int. Conf. Image Processing, Vol. II, pp. 437-441 (1998).
    • (1998) Proc. IEEE Int. Conf. Image Processing , vol.2 , pp. 437-441
    • Wu, M.1    Liu, B.2
  • 21
    • 0035509773 scopus 로고    scopus 로고
    • A class of authentication digital watermarks for secure multimedia communication
    • L. Xie and G. R. Arce, "A class of authentication digital watermarks for secure multimedia communication," IEEE Trans. Image Process. 10(11), 1754-1764 (2001).
    • (2001) IEEE Trans. Image Process , vol.10 , Issue.11 , pp. 1754-1764
    • Xie, L.1    Arce, G.R.2
  • 23
  • 24
    • 0344235334 scopus 로고    scopus 로고
    • Fragile watermark based on the Gaussian mixture model in the wavelet domain for image authentication
    • H. Yuan and X. P. Zhang, "Fragile watermark based on the Gaussian mixture model in the wavelet domain for image authentication," in Proc. IEEE Int. Conf. Image Processing, Vol. I, pp. 566-569 (2003).
    • (2003) Proc. IEEE Int. Conf. Image Processing , vol.1 , pp. 566-569
    • Yuan, H.1    Zhang, X.P.2
  • 25
    • 0042823356 scopus 로고    scopus 로고
    • Wavelet packets-based digital watermarking for image verification and authentication
    • A. H. Paquet, R. K. Ward, and I. Pitas, "Wavelet packets-based digital watermarking for image verification and authentication," Signal Process. 83, 2117-2132 (2003).
    • (2003) Signal Process , vol.83 , pp. 2117-2132
    • Paquet, A.H.1    Ward, R.K.2    Pitas, I.3
  • 27
    • 0026852760 scopus 로고
    • Image compression using the 2-D wavelet transform
    • A. S. Lewis and G. Knowles, "Image compression using the 2-D wavelet transform," IEEE Trans. Image Process. 1, 244-250 (1992).
    • (1992) IEEE Trans. Image Process , vol.1 , pp. 244-250
    • Lewis, A.S.1    Knowles, G.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.