메뉴 건너뛰기




Volumn 5, Issue 1, 2005, Pages 149-165

SELF RECOVERY AUTHENTICATION of IMAGES in the DWT DOMAIN

Author keywords

data hiding; image authentication; multimedia security; self recovery; Watermarking

Indexed keywords

AUTHENTICATION; CRYPTOGRAPHY; DIGITAL STORAGE; DIGITAL WATERMARKING; DISCRETE WAVELET TRANSFORMS; IMAGE COMPRESSION; OBJECT DETECTION; REMOTE SENSING; SECURITY SYSTEMS; SIGNAL RECONSTRUCTION;

EID: 34249002876     PISSN: 02194678     EISSN: None     Source Type: Journal    
DOI: 10.1142/S0219467805001707     Document Type: Article
Times cited : (34)

References (15)
  • 1
    • 0036488364 scopus 로고    scopus 로고
    • Compressive data hiding: An unconventional approach for improved color image coding
    • February
    • P. Campisi, D. Kundur, D. Hatzinakos and A. Neri, \Compressive data hiding: An unconventional approach for improved color image coding," EURASIP Journal on Applied Signal Processing 2002(2), 152{163 (February 2002).
    • (2002) EURASIP Journal on Applied Signal Processing , vol.2002 , Issue.2 , pp. 152-163
    • Campisi, P.1    Kundur, D.2    Hatzinakos, D.3    Neri, A.4
  • 2
    • 0033601683 scopus 로고    scopus 로고
    • A technique for image data hiding and reconstruc-tion without host image
    • , San Jose, CA, USA January
    • J. J. Chae and B. S. Manjunath, \A technique for image data hiding and reconstruc-tion without host image," in Security and Watermarking of Multimedia Content; Proc. SPIE Vol. 3657, San Jose, CA, USA, pp. 386{396 (January 1999).
    • (1999) Security and Watermarking of Multimedia Content; Proc. SPIE , vol.3657 , pp. 386-396
    • Chae, J.J.1    Manjunath, B.S.2
  • 4
    • 17744413513 scopus 로고    scopus 로고
    • Robust turbo-based data hiding forimage and video sources
    • , Rochester, NY, USA October
    • J. Chou and K. Ramchandran, \Robust turbo-based data hiding forimage and video sources," in Proc. ICIP02; IEEE Int. Conf. Image Processing, Vol. II, Rochester, NY, USA, pp. 133{136 (October 2002).
    • (2002) Proc. ICIP02; IEEE Int. Conf. Image Processing , vol.2 , pp. 133-136
    • Chou, J.1    Ramchandran, K.2
  • 5
    • 0033309988 scopus 로고    scopus 로고
    • Images with self-correcting capabilities
    • , Kobe, Japan October
    • J. Fridrich and M. Goljan, \Images with self-correcting capabilities," in Proc. ICIP99; IEEE Int. Conf. Image Processing, Vol. III, Kobe, Japan, pp. 792{796 (October 1999).
    • (1999) Proc. ICIP99; IEEE Int. Conf. Image Processing , vol.3 , pp. 792-796
    • Fridrich, J.1    Goljan, M.2
  • 6
    • 0032648596 scopus 로고    scopus 로고
    • Digital watermarking for telltale tamper prooffing and authentication
    • July
    • D. Kundur and D. Hatzinakos, \Digital watermarking for telltale tamper prooffing and authentication," in Proceeding of IEEE 87(7), 1167{1180 (July 1999).
    • (1999) Proceeding of IEEE , vol.87 , Issue.7 , pp. 1167-1180
    • Kundur, D.1    Hatzinakos, D.2
  • 7
    • 0033688392 scopus 로고    scopus 로고
    • Semi-fragile watermarking for authenticating JPEG visual content
    • , San Jose, CA, USA January
    • C.-Y. Lin and S.-F. Chang, \Semi-fragile watermarking for authenticating JPEG visual content," in Security and Watarmerking of Multimedia Content II; Proc. SPIE Vol. 3971, San Jose, CA, USA, pp. 140{151 (January 2000).
    • (2000) Security and Watarmerking of Multimedia Content II; Proc. SPIE , vol.3971 , pp. 140-151
    • Lin, C.-Y.1    Chang, S.-F.2
  • 8
    • 0035248504 scopus 로고    scopus 로고
    • A robust image authentication method distinguishing JPEG compression from malicious manipulation
    • February
    • C.-Y. Lin and S.-F. Chang, \A robust image authentication method distinguishing JPEG compression from malicious manipulation," IEEE Transactions on Circuits and Systems for Video Technology 11(2), 153{168 (February 2001).
    • (2001) IEEE Transactions on Circuits and Systems for Video Technology , vol.11 , Issue.2 , pp. 153-168
    • Lin, C.-Y.1    Chang, S.-F.2
  • 10
  • 11
    • 0036627368 scopus 로고    scopus 로고
    • A survey of watermarking algorithms for image authen-tication
    • June
    • C. Rey and J. L. Dugelay, \A survey of watermarking algorithms for image authen-tication," EURASIP Journal on Applied Signal Processing 2002(6), 613{621 (June 2002).
    • (2002) EURASIP Journal on Applied Signal Processing , vol.2002 , Issue.6 , pp. 613-621
    • Rey, C.1    Dugelay, J.L.2
  • 12
    • 84940644968 scopus 로고
    • A mathematical theory of communications
    • July
    • C. E. Shannon, \A mathematical theory of communications," Bell Sys. Techn. Journal 27, 379{423 (July 1948).
    • (1948) Bell Sys. Techn. Journal , vol.27 , pp. 379-423
    • Shannon, C.E.1
  • 13
    • 84856043672 scopus 로고
    • A mathematical theory of communications
    • October
    • C. E. Shannon, \A mathematical theory of communications," Bell Sys. Techn. Journal 27, 623{656 (October 1948).
    • (1948) Bell Sys. Techn. Journal , vol.27 , pp. 623-656
    • Shannon, C.E.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.