메뉴 건너뛰기




Volumn 22, Issue 6, 2007, Pages 795-804

Wavelet based image authentication and recovery

Author keywords

Authentication and self recovery; Discrete cosine transform (DCT); Integer wavelet transform (IWT); JPEG compression; Semi fragile watermark

Indexed keywords

INTEGER WAVELET TRANSFORMS; SELF RECOVERY;

EID: 36548999210     PISSN: 10009000     EISSN: None     Source Type: Journal    
DOI: 10.1007/s11390-007-9103-x     Document Type: Article
Times cited : (33)

References (19)
  • 3
    • 33845420452 scopus 로고    scopus 로고
    • Watermarking is not cryptography
    • Springer
    • Ingemar J Cox, Gwenaë Doërr, Teddy Furon. Watermarking is not cryptography. LNCS 4283, Springer, 2006, pp.1-15.
    • (2006) LNCS , vol.4283 , pp. 1-15
    • Cox, I.J.1    Doërr, G.2    Furon, T.3
  • 4
    • 21844468273 scopus 로고    scopus 로고
    • Achieving computational and unconditional security in authentication watermarking: Analysis, insights, and algorithm
    • San Jose, California
    • Fei C, Kundur D, Kwong R H. Achieving computational and unconditional security in authentication watermarking: Analysis, insights, and algorithm. In Proc. SPIE: Security and Watermarking of Multimedia Contents VII, Vol. 5681, San Jose, California, 2005, pp.697-708.
    • (2005) Proc. SPIE: Security and Watermarking of Multimedia Contents VII , vol.5681 , pp. 697-708
    • Fei, C.1    Kundur, D.2    Kwong, R.H.3
  • 6
    • 0032634857 scopus 로고    scopus 로고
    • Multimedia watermarking techniques
    • 7
    • Hartung F, Kutter M. Multimedia watermarking techniques. In Proc. IEEE, USA, 1999, 87(7): 1079-1107.
    • (1999) Proc. IEEE, USA , vol.87 , pp. 1079-1107
    • Hartung, F.1    Kutter, M.2
  • 7
    • 0027697301 scopus 로고
    • The trustworthy digital camera: Restoring credibility to the photographic image
    • 4
    • Friedman G L. The trustworthy digital camera: Restoring credibility to the photographic image. IEEE Transaction on Consumer Electronics, Rosemont, IL, USA, 1993, 39(4): 905-910.
    • (1993) IEEE Transaction on Consumer Electronics, Rosemont, IL, USA , vol.39 , pp. 905-910
    • Friedman, G.L.1
  • 9
    • 0344235334 scopus 로고    scopus 로고
    • Fragile watermark based on the Gaussian mixture model in the wavelet domain for image authentication
    • Barcelona, Spain
    • Hua Fiun, Xiuo-Ping Zhang. Fragile watermark based on the Gaussian mixture model in the wavelet domain for image authentication. IEEE International Conference on Image Processing, Barcelona, Spain, Vol. 1, 2003, pp.505-508.
    • (2003) IEEE International Conference on Image Processing , vol.1 , pp. 505-508
    • Fiun, H.1    Zhang, X.2
  • 10
    • 31344433959 scopus 로고    scopus 로고
    • New semi-fragile image authentication watermarking techniques using random bias and non-uniform quantization
    • 1
    • Kurato Maeno, Qibin Sun, Shih-Fu Chang, Masayuki Suto. New semi-fragile image authentication watermarking techniques using random bias and non-uniform quantization. IEEE Transactions on Multimedia, 2006, 8(1): 32-45.
    • (2006) IEEE Transactions on Multimedia , vol.8 , pp. 32-45
    • Kurato, M.1    Qibin, S.2    Shih-Fu, C.3    Masayuki, S.4
  • 11
    • 33845568061 scopus 로고    scopus 로고
    • A secure semi-fragile watermarking for image authentication based on integer wavelet transform with parameters
    • Newcastle, New South Wales, Australia
    • Xiaoyun Wu, Junquan Hu, Zhixiong Gu, Jiwu Huang. A secure semi-fragile watermarking for image authentication based on integer wavelet transform with parameters. In Proc. the Australasian Workshop on Grid Computing and E-Research, Newcastle, New South Wales, Australia, Vol. 44, 2005, pp.75-80.
    • (2005) Proc. the Australasian Workshop on Grid Computing and E-Research , vol.44 , pp. 75-80
    • Wu, X.1    Hu, J.2    Gu, Z.3    Huang, J.4
  • 15
    • 84864177287 scopus 로고    scopus 로고
    • http://www.math.cuhk.edu.hk/-rchan/paper/impulse/de-finitions.html
  • 16
    • 0035167831 scopus 로고    scopus 로고
    • Watermark security via wavelet filter parameterization
    • Thessaloniki, Greece
    • Meerwald, Uhl A. Watermark security via wavelet filter parameterization. In Proc. IEEE International Conference on Image Processing, Thessaloniki, Greece, Vol. 3, 2001, pp.1027-1030.
    • (2001) Proc. IEEE International Conference on Image Processing , vol.3 , pp. 1027-1030
    • Meerwald1    Uhl, A.2
  • 17
    • 85013615185 scopus 로고    scopus 로고
    • A novel approach to decoding: Exploiting anticipated attack information using genetic programming
    • 5
    • Khan A. A novel approach to decoding: Exploiting anticipated attack information using genetic programming. International Journal of Knowledge-Based Intelligent Engineering Systems, 2006, 10(5): 337-347.
    • (2006) International Journal of Knowledge-Based Intelligent Engineering Systems , vol.10 , pp. 337-347
    • Khan, A.1
  • 19
    • 34249668816 scopus 로고    scopus 로고
    • Genetic perceptual shaping: Utilizing cover image and conceivable attack information using genetic programming
    • 4
    • A Khan, Anwar M Mirza. Genetic perceptual shaping: Utilizing cover image and conceivable attack information using genetic programming. Information Fusion, Elsevier Science, 2007, 8(4): 354-365.
    • (2007) Information Fusion, Elsevier Science , vol.8 , pp. 354-365
    • Khan, A.1    Mirza Anwar, M.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.