메뉴 건너뛰기




Volumn 4810 LNCS, Issue , 2007, Pages 377-384

A DWT blind image watermarking strategy with secret sharing

Author keywords

Blind image watermarking; Closed loop; Secret sharing; Stirmark

Indexed keywords

COMPUTER CRIME; DISCRETE WAVELET TRANSFORMS; INDEPENDENT COMPONENT ANALYSIS;

EID: 38349026282     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-540-77255-2_40     Document Type: Conference Paper
Times cited : (1)

References (17)
  • 1
    • 0346216903 scopus 로고    scopus 로고
    • Generic watermarking based on transform domain techniques
    • Shieh, C.S., Gray, H.C., Wang, F.H., Pan, J.S.: Generic watermarking based on transform domain techniques. Pattern Recognition 37(3), 555-565 (2004)
    • (2004) Pattern Recognition , vol.37 , Issue.3 , pp. 555-565
    • Shieh, C.S.1    Gray, H.C.2    Wang, F.H.3    Pan, J.S.4
  • 3
  • 4
    • 0033726714 scopus 로고    scopus 로고
    • Robust template matching for affine resistant image watermarks
    • Pereira, S., Pun, T.: Robust template matching for affine resistant image watermarks. IEEE Trans. On Image Processing 9(6), 1123-1129 (2000)
    • (2000) IEEE Trans. On Image Processing , vol.9 , Issue.6 , pp. 1123-1129
    • Pereira, S.1    Pun, T.2
  • 5
    • 0032664574 scopus 로고    scopus 로고
    • Perceptual watermarks for digital images and video
    • Wolfgang, R.B., Podichuk, C.I., Delp, E.J.: Perceptual watermarks for digital images and video. Proceedings of the IEEE 87(7), 1108-1126 (1999)
    • (1999) Proceedings of the IEEE , vol.87 , Issue.7 , pp. 1108-1126
    • Wolfgang, R.B.1    Podichuk, C.I.2    Delp, E.J.3
  • 6
    • 0032648596 scopus 로고    scopus 로고
    • Digital watermarking for telltale tamper proofing and authentication
    • Kundur, D., Hatzinakos, D.: Digital watermarking for telltale tamper proofing and authentication. Proceedings of the IEEE 87(7), 1167-1180 (1999)
    • (1999) Proceedings of the IEEE , vol.87 , Issue.7 , pp. 1167-1180
    • Kundur, D.1    Hatzinakos, D.2
  • 7
    • 0018545449 scopus 로고
    • How to share a secret
    • Shamir, A.: How to share a secret. Communications of ACM 22, 612-613 (1979)
    • (1979) Communications of ACM , vol.22 , pp. 612-613
    • Shamir, A.1
  • 8
    • 1642635190 scopus 로고    scopus 로고
    • A new (t,n) threshold image hiding scheme for sharing a secret color image
    • Chang, C.-C., Lin, I.-C.: A new (t,n) threshold image hiding scheme for sharing a secret color image. In: Proceedings of ICCT, pp. 196-202 (2003)
    • (2003) Proceedings of ICCT , pp. 196-202
    • Chang, C.-C.1    Lin, I.-C.2
  • 9
    • 33744535113 scopus 로고    scopus 로고
    • Digital image watermarking for joint ownership verification without a trusted dealer
    • Guo, H., Georganas, N.D.: Digital image watermarking for joint ownership verification without a trusted dealer. In: Proceedings of ICME, pp. 497-500 (2003)
    • (2003) Proceedings of ICME , pp. 497-500
    • Guo, H.1    Georganas, N.D.2
  • 13
    • 35048849170 scopus 로고    scopus 로고
    • Li, Z., Kwong, S., Ji-hong, Z., et al.: The Design Intelligent Watermark Detection Decoder Based on Independent Component Analysis. In: Kalker, T., Cox, I., Ro, Y.M. (eds.) IWDW 2003. LNCS, 2939, pp. 223-234. Springer, Heidelberg (2004)
    • Li, Z., Kwong, S., Ji-hong, Z., et al.: The Design Intelligent Watermark Detection Decoder Based on Independent Component Analysis. In: Kalker, T., Cox, I., Ro, Y.M. (eds.) IWDW 2003. LNCS, vol. 2939, pp. 223-234. Springer, Heidelberg (2004)
  • 17
    • 0036066362 scopus 로고    scopus 로고
    • Watermark detection and extraction using independent component analysis method
    • Yu, D., Sattar, F., Ma, K.K.: Watermark detection and extraction using independent component analysis method. EURASIP Journal on Applied Signal Processing (1), 92-104 (2002)
    • (2002) EURASIP Journal on Applied Signal Processing , vol.1 , pp. 92-104
    • Yu, D.1    Sattar, F.2    Ma, K.K.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.