메뉴 건너뛰기




Volumn 27, Issue 2, 2008, Pages 155-170

Self embedding watermarking using halftoning technique

Author keywords

Digital halftoning; Image recovery; Self embedding; Tamper detection

Indexed keywords

DATA PROCESSING; IMAGE COMPRESSION; IMAGE RECONSTRUCTION; PIXELS;

EID: 42449153192     PISSN: 0278081X     EISSN: 15315878     Source Type: Journal    
DOI: 10.1007/s00034-008-9024-0     Document Type: Article
Times cited : (20)

References (18)
  • 1
    • 0034769478 scopus 로고    scopus 로고
    • Content-fragile Watermarking for Image Authentication
    • J. Dittmann, Content-fragile Watermarking for Image Authentication, Proceedings of SPIE, vol. 4314, pp. 175-184, 2001.
    • (2001) Proceedings of SPIE , vol.4314 , pp. 175-184
    • Dittmann, J.1
  • 2
    • 0000830553 scopus 로고
    • Error-diffusion Algorithm with Edge Enhancement
    • R. Eschbach and K. Knox, Error-diffusion Algorithm with Edge Enhancement, Journal of the Optical Society of America A, vol. 8, no. 12, pp. 1844-1850, 1991.
    • (1991) Journal of the Optical Society of America A , vol.8 , Issue.12 , pp. 1844-1850
    • Eschbach, R.1    Knox, K.2
  • 3
    • 0038733830 scopus 로고    scopus 로고
    • Variations on Error Diffusion: Retrospectives and Future Trends
    • B. L. Evans, V. Monga, and N. Damera-Venkata, Variations on Error Diffusion: Retrospectives and Future Trends, Proceedings of SPIE, vol. 5008, pp. 371-389, 2003.
    • (2003) Proceedings of SPIE , vol.5008 , pp. 371-389
    • Evans, B.L.1    Monga, V.2    Damera-Venkata, N.3
  • 5
    • 0036030626 scopus 로고    scopus 로고
    • Security of Fragile Authentication Watermarks with Localization, Security and Watermarking of Multimedia Contents IV
    • J. Fridrich, Security of Fragile Authentication Watermarks with Localization, Security and Watermarking of Multimedia Contents IV, Proceedings of SPIE, vol. 4675, pp. 691-700, 2002.
    • (2002) Proceedings of SPIE , vol.4675 , pp. 691-700
    • Fridrich, J.1
  • 7
    • 0016931797 scopus 로고
    • A Survey of Techniques for the Display of Continuous-tone Pictures on Bilevel Displays
    • J. F. Jarvis, C. N. Judice, and W. H. Ninke, A Survey of Techniques for the Display of Continuous-tone Pictures on Bilevel Displays, Computer Graphics and Image Processing, vol. 5, pp. 13-40, 1976.
    • (1976) Computer Graphics and Image Processing , vol.5 , pp. 13-40
    • Jarvis, J.F.1    Judice, C.N.2    Ninke, W.H.3
  • 9
    • 0034787545 scopus 로고    scopus 로고
    • SARI: Self-Authentication-and-Recovery Image Watermarking System
    • C. Y. Lin and S. F. Chang, SARI: Self-Authentication-and-Recovery Image Watermarking System, ACM Multimedia 2001, pp. 628-629, 2001.
    • (2001) ACM Multimedia 2001 , pp. 628-629
    • Lin, C.Y.1    Chang, S.F.2
  • 12
    • 0035765883 scopus 로고    scopus 로고
    • Correlation Watermark for Image Authentication and Alternation Locations Detection
    • A. H. Ouda and M. R. El-Sakka, Correlation Watermark for Image Authentication and Alternation Locations Detection, Proceedings of SPIE, vol. 4475, pp. 234-241, 2001.
    • (2001) Proceedings of SPIE , vol.4475 , pp. 234-241
    • Ouda, A.H.1    El-Sakka, M.R.2
  • 14
    • 0003545763 scopus 로고
    • MECCA-A Multiple Error Correcting Computation Algorithm for Bilevel Image Hardcopy Reproduction
    • IBM Res. Lab., Zurich, Switzerland
    • P. Stucki, MECCA-A Multiple Error Correcting Computation Algorithm for Bilevel Image Hardcopy Reproduction, Research Report RZ1060, IBM Res. Lab., Zurich, Switzerland, 1981.
    • (1981) Research Report RZ1060
    • Stucki, P.1
  • 17
    • 33749378971 scopus 로고    scopus 로고
    • Content-based Watermarking in Image Authentication Allowing Remedying of Tampered Images
    • F. H. Yeh and G. C. Lee, Content-based Watermarking in Image Authentication Allowing Remedying of Tampered Images, Optical Engineering, vol. 45, no. 7, 077004, 2006.
    • (2006) Optical Engineering , vol.45 , Issue.7 , pp. 077004
    • Yeh, F.H.1    Lee, G.C.2
  • 18
    • 1242353030 scopus 로고    scopus 로고
    • Tracking Image Tampering by De-filtering
    • X. F. Zhao, W. N. Wang, and K. F. Chen, Tracking Image Tampering by De-filtering, Proceedings of SPIE, vol. 5286, pp. 899-902, 2003.
    • (2003) Proceedings of SPIE , vol.5286 , pp. 899-902
    • Zhao, X.F.1    Wang, W.N.2    Chen, K.F.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.