메뉴 건너뛰기




Volumn , Issue , 2005, Pages

Secure quantization based data embedding

Author keywords

Data hiding; Secure data hiding; Steganography

Indexed keywords

ALGORITHMS; DATA REDUCTION; EMBEDDED SYSTEMS; MATHEMATICAL PROGRAMMING; SECURITY OF DATA;

EID: 42749102841     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/MMSP.2005.248651     Document Type: Conference Paper
Times cited : (5)

References (31)
  • 3
    • 0036504565 scopus 로고    scopus 로고
    • Denoising and copy attacks resilient watermarking by exploiting prior knowledge at detector
    • March
    • C.S. Lu, H-Y. Liao, and M. Kutter, "Denoising and copy attacks resilient watermarking by exploiting prior knowledge at detector," IEEE Transactions on Image Processing, Vol. 11, Issue 3, March 2002, pp. 280-292.
    • (2002) IEEE Transactions on Image Processing , vol.11 , Issue.3 , pp. 280-292
    • Lu, C.S.1    Liao, H.-Y.2    Kutter, M.3
  • 5
    • 0033521798 scopus 로고    scopus 로고
    • Image watermarking scheme using visual model and BN distribution
    • 4 Feb
    • S.W. Kim, S. Suthaharan, H.K. Lee, and K.R. Rao, "Image watermarking scheme using visual model and BN distribution," Electronic Letters, Vol. 35, Issue 3, 4 Feb 1999, pp. 212-214.
    • (1999) Electronic Letters , vol.35 , Issue.3 , pp. 212-214
    • Kim, S.W.1    Suthaharan, S.2    Lee, H.K.3    Rao, K.R.4
  • 6
    • 0035473831 scopus 로고    scopus 로고
    • Secret and public key image watermarking schemes for image authentication and ownership verification
    • Oct
    • P.W. Wong, and N. Memon, "Secret and public key image watermarking schemes for image authentication and ownership verification," IEEE Transactions on Image Processing, Vol. 10, Issue 10, Oct 2001, pp. 1593-1601.
    • (2001) IEEE Transactions on Image Processing , vol.10 , Issue.10 , pp. 1593-1601
    • Wong, P.W.1    Memon, N.2
  • 7
    • 8844263220 scopus 로고    scopus 로고
    • Benchmarking of image watermarking algorithms for digital rights management
    • June
    • B. Macq, J. Dittmann, and E.J. Delp, "Benchmarking of image watermarking algorithms for digital rights management," Proceedings of the IEEE, Vol. 92, Issue 6, June 2004, pp. 971-984.
    • (2004) Proceedings of the IEEE , vol.92 , Issue.6 , pp. 971-984
    • Macq, B.1    Dittmann, J.2    Delp, E.J.3
  • 11
    • 0036611838 scopus 로고    scopus 로고
    • Hierarchical watermarking for secure image authentication with localization
    • June
    • M. Utku-Celik, G. Sharma, E. Saber, and A. Murat-Tekalp, "Hierarchical watermarking for secure image authentication with localization," IEEE Transactions on Image Processing, Vol. 11, issue 6, June 2002, pp. 585-595.
    • (2002) IEEE Transactions on Image Processing , vol.11 , Issue.6 , pp. 585-595
    • Utku-Celik, M.1    Sharma, G.2    Saber, E.3    Murat-Tekalp, A.4
  • 12
    • 0003830991 scopus 로고    scopus 로고
    • Multiresolution digital watermarking: Algorithms and implications for multimedia signals,
    • Ph.D. dissertation, Univ. Toronto, Toronto ON, Canada
    • D. Kundur, "Multiresolution digital watermarking: Algorithms and implications for multimedia signals," Ph.D. dissertation, Univ. Toronto, Toronto ON, Canada, 1999.
    • (1999)
    • Kundur, D.1
  • 13
    • 0004127894 scopus 로고    scopus 로고
    • Data hiding in multimedia - Theory and applications,
    • Ph.D. dissertation, New Jersey Inst. Technol, Newark
    • M. Ramkumar, "Data hiding in multimedia - Theory and applications," Ph.D. dissertation, New Jersey Inst. Technol., Newark, 2000.
    • (2000)
    • Ramkumar, M.1
  • 15
    • 0035333687 scopus 로고    scopus 로고
    • Quantization index modulation: A class of provably good methods for digital watermarking and information embedding
    • B. Chen and G.W. Wornell, "Quantization index modulation: A class of provably good methods for digital watermarking and information embedding," IEEE Trans. Inform. Theory, vol. 47, pp. 1423-1443, 2001.
    • (2001) IEEE Trans. Inform. Theory , vol.47 , pp. 1423-1443
    • Chen, B.1    Wornell, G.W.2
  • 19
    • 84949753383 scopus 로고    scopus 로고
    • On the design of copyright protection protocols for multimedia distribution using symmetric and public-key watermarking
    • 3-7 Sept
    • S. Katzenbeisser, "On the design of copyright protection protocols for multimedia distribution using symmetric and public-key watermarking," Proceedings. 12th International Workshop on Database and Expert Systems Applications, 3-7 Sept. 2001, pp. 815-819.
    • (2001) Proceedings. 12th International Workshop on Database and Expert Systems Applications , pp. 815-819
    • Katzenbeisser, S.1
  • 26
    • 34250683240 scopus 로고    scopus 로고
    • analysis of information hiding, Online, Available
    • P. Moulin and J. A. O'Sullivan. (1999) Information-theoretic analysis of information hiding. [Online]. Available: http://www.ifp.uiuc.edu/~moulin/paper. html
    • (1999) Information-theoretic
    • Moulin, P.1    O'Sullivan, J.A.2
  • 27
  • 29
    • 0141638479 scopus 로고    scopus 로고
    • Joint Security and Robustness Enhancement for Quantization Based Data Embedding
    • Aug
    • M. Wu. "Joint Security and Robustness Enhancement for Quantization Based Data Embedding". IEEE Trans. on Circuits and Systems for Video Technology, 13, 8 (Aug. 2003), pp. 831-841.
    • (2003) IEEE Trans. on Circuits and Systems for Video Technology , vol.13 , Issue.8 , pp. 831-841
    • Wu, M.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.