메뉴 건너뛰기




Volumn 39, Issue 1, 2008, Pages 1-46

Methods for image authentication: A survey

Author keywords

Cryptography; Digital image signature; Fragile watermarking; Image authentication; Image content; Semi fragile watermarking

Indexed keywords

ARCHITECTURAL DESIGN; AUTHENTICATION; COMPUTER GRAPHICS; COMPUTER NETWORKS; CONTROL THEORY; CRYPTOGRAPHY; CUSTOMER SATISFACTION; DIGITAL ARITHMETIC; IMAGE ENHANCEMENT; IMAGE PROCESSING; IMAGING SYSTEMS; IMAGING TECHNIQUES; INDUSTRIAL ENGINEERING; INFORMATION TECHNOLOGY; MARKETING; MULTIMEDIA SYSTEMS; NUMBER THEORY; NUMERICAL METHODS; OPTICAL DATA PROCESSING; PROBLEM SOLVING; QUALITY ASSURANCE; QUALITY FUNCTION DEPLOYMENT; ROBUST CONTROL; SURVEYS; TOTAL QUALITY MANAGEMENT;

EID: 44949125398     PISSN: 13807501     EISSN: 15737721     Source Type: Journal    
DOI: 10.1007/s11042-007-0154-3     Document Type: Article
Times cited : (169)

References (163)
  • 1
    • 84943615552 scopus 로고    scopus 로고
    • An implementation of des and AES, secure against some attacks
    • Cryptographic hardware and embedded systems-CHES 2001. Proceedings on the third international workshop Paris, France
    • Akkar ML, Giraud C (2001) An implementation of DES and AES, secure against some attacks. In: Cryptographic hardware and embedded systems-CHES 2001. Proceedings on the third international workshop. Lecture notes in computer science, vol 2162. Paris, France, pp 309-318
    • (2001) Lecture Notes in Computer Science , vol.2162 , pp. 309-318
    • Akkar, M.L.1    Giraud, C.2
  • 3
    • 84937396363 scopus 로고    scopus 로고
    • Generating standard DSA signatures without long inversion
    • Advances in cryptology-ASIACRYPT'96. Proceedings on the international conference on the theory and applications of cryptology and information security, Kyongju, Korea Springer
    • Arjen K (1996) Generating standard DSA signatures without long inversion. In: Advances in cryptology-ASIACRYPT'96. Proceedings on the international conference on the theory and applications of cryptology and information security, Kyongju, Korea. Lecture notes in computer science, vol 1163. Springer, pp 57-64
    • (1996) Lecture Notes in Computer Science , vol.1163 , pp. 57-64
    • Arjen, K.1
  • 4
    • 0012085074 scopus 로고    scopus 로고
    • Information hiding
    • Aucsmith D (ed) Proceedings of the second international workshop, Portland, Oregon, USA Springer
    • Aucsmith D (ed) (1998) Information hiding. Proceedings of the second international workshop, Portland, Oregon, USA. Lecture notes in computer science, vol 1525. Springer, pp 306-318
    • (1998) Lecture Notes in Computer Science , vol.1525 , pp. 306-318
  • 5
    • 44949160921 scopus 로고    scopus 로고
    • Methods for detecting tampering in digital images
    • 1
    • Baldoza A, Sieffert M (2000) Methods for detecting tampering in digital images. AFRL Technology Horizons® 1(1):15-17
    • (2000) AFRL Technology Horizons® , vol.1 , pp. 15-17
    • Baldoza, A.1    Sieffert, M.2
  • 7
    • 0032308292 scopus 로고    scopus 로고
    • Compression tolerant image authentication
    • Chicago
    • Bhattacharjee S, Kutter M (2000) Compression tolerant image authentication. In: Proceedings of the ICIP-98, vol 1. Chicago, pp 435-439
    • (2000) Proceedings of the ICIP-98 , vol.1 , pp. 435-439
    • Bhattacharjee, S.1    Kutter, M.2
  • 8
    • 0031233659 scopus 로고    scopus 로고
    • Invariance of stereo images via the theory of complex moments
    • 9
    • Bhattacharya D, Sinha S (1997) Invariance of stereo images via the theory of complex moments. Pattern Recogn 30(9):1373-1386
    • (1997) Pattern Recogn , vol.30 , pp. 1373-1386
    • Bhattacharya, D.1    Sinha, S.2
  • 11
    • 0022808786 scopus 로고
    • A computational approach to edge detection
    • 6
    • Canny JF (1986) A computational approach to edge detection. IEEE Trans Pattern Anal Mach Intell 8(6):679-698
    • (1986) IEEE Trans Pattern Anal Mach Intell , vol.8 , pp. 679-698
    • Canny, J.F.1
  • 12
    • 0034258869 scopus 로고    scopus 로고
    • Adaptive wavelet thresholding for image de-noising and compression
    • 9
    • Chang G, Yu SB, Vetterli M (2000) Adaptive wavelet thresholding for image de-noising and compression. IEEE Trans Image Process 9(9):1532-1546
    • (2000) IEEE Trans Image Process , vol.9 , pp. 1532-1546
    • Chang, G.1    Yu, S.B.2    Vetterli, M.3
  • 13
    • 84964426993 scopus 로고    scopus 로고
    • Combined digital signature and digital watermark scheme for image authentication
    • Chen T, Wang J, Zhou Y (2000) Combined digital signature and digital watermark scheme for image authentication. In: Proceedings of the ICII2001, vol 5, pp 78-82
    • (2000) Proceedings of the ICII2001 , vol.5 , pp. 78-82
    • Chen, T.1    Wang, J.2    Zhou, Y.3
  • 16
    • 0003302360 scopus 로고    scopus 로고
    • Public watermarks and resistance to tampering
    • Santa Barbara, California, USA
    • Cox IJ, Linnartz MG (1997) Public watermarks and resistance to tampering. In: Proceedings of the ICIP'97, Santa Barbara, California, USA
    • (1997) Proceedings of the ICIP'97
    • Cox, I.J.1    Linnartz, M.G.2
  • 17
    • 0031343598 scopus 로고    scopus 로고
    • Finite state transformations of images
    • Culik K, Kari J (1997) Finite state transformations of images. Computer and Graphics 34:151-166
    • (1997) Computer and Graphics , vol.34 , pp. 151-166
    • Culik, K.1    Kari, J.2
  • 18
    • 0011989986 scopus 로고    scopus 로고
    • Generalized finite automata and transducer
    • Culik K, Valenta V (1997) Generalized finite automata and transducer. J Autom Lang Comb 2:3-17
    • (1997) J Autom Lang Comb , vol.2 , pp. 3-17
    • Culik, K.1    Valenta, V.2
  • 21
    • 0031237840 scopus 로고    scopus 로고
    • Quadratic interpolation for image resampling
    • 9
    • Dodgson NA (1997) Quadratic interpolation for image resampling. IEEE Trans Image Process 6(9):1322-1326
    • (1997) IEEE Trans Image Process , vol.6 , pp. 1322-1326
    • Dodgson, N.A.1
  • 22
    • 44949216472 scopus 로고    scopus 로고
    • Un panorama des méthodes de tatouage permettant d'Assurer un service d'Intégrité
    • France
    • Dugelay J-L, Rey C (2002) Un panorama des Méthodes de Tatouage Permettant d'Assurer un Service d'Intégrité. Revue Traitement du Signal 18(4), France
    • (2002) Revue Traitement du Signal , vol.18 , Issue.4
    • Dugelay, J.-L.1    Rey, C.2
  • 23
    • 0010875798 scopus 로고
    • DSS theory: A model of constructs and relationships
    • 1
    • Eierman M, Niederman A, Adams FC (1995) DSS theory: a model of constructs and relationships. Decis Support Syst 14(1):1-26
    • (1995) Decis Support Syst , vol.14 , pp. 1-26
    • Eierman, M.1    Niederman, A.2    Adams, F.C.3
  • 24
    • 0026682116 scopus 로고
    • Which new RSA-signatures can be computed from certain given RSA-signatures
    • 1
    • Evertse J-H, Van-Heyst E (1992) Which new RSA-signatures can be computed from certain given RSA-signatures? J Cryptol 5(1):41-52
    • (1992) J Cryptol , vol.5 , pp. 41-52
    • Evertse, J.-H.1    Van-Heyst, E.2
  • 29
    • 0032292847 scopus 로고    scopus 로고
    • Image watermarking for tamper detection
    • Chicago, USA
    • Fridrich J (1998a) Image watermarking for tamper detection. In: Proceedings of the ICIP'98, Chicago, USA
    • (1998) Proceedings of the ICIP'98
    • Fridrich, J.1
  • 37
    • 0027697301 scopus 로고
    • The trustworthy digital camera: Restoring credibility to the photographic image
    • Friedman G (1993) The trustworthy digital camera: restoring credibility to the photographic image. IEEE Trans Consum Electron 39:905-910
    • (1993) IEEE Trans Consum Electron , vol.39 , pp. 905-910
    • Friedman, G.1
  • 38
    • 2442682088 scopus 로고    scopus 로고
    • Spread spectrum digital watermarking algorithm using gold codes
    • 2
    • Gao Q, Li R, Wang H (2004) Spread spectrum digital watermarking algorithm using gold codes. Journal of Xi'an Jiaotong University 38(2):119-123
    • (2004) Journal of xi'An Jiaotong University , vol.38 , pp. 119-123
    • Gao, Q.1    Li, R.2    Wang, H.3
  • 39
    • 84947926543 scopus 로고    scopus 로고
    • Robust threshold DSS signatures
    • Advances in cryptology-EUROCRYPT '96. In: Proceedings on the international conference on the theory and application of cryptographic techniques Springer
    • Gennaro R, Jarecki S, Krawczyk H (1996) Robust threshold DSS signatures. Advances in cryptology-EUROCRYPT '96. In: Proceedings on the international conference on the theory and application of cryptographic techniques. Lecture notes in computer science, vol 1070. Springer, pp 354-71
    • (1996) Lecture Notes in Computer Science , vol.1070 , pp. 354-71
    • Gennaro, R.1    Jarecki, S.2    Krawczyk, H.3
  • 42
    • 0002843657 scopus 로고
    • Decomposition of function into wavelets of constant shape and related transforms
    • Streit L (ed) World Scientific
    • Grossmann A, Morlet J (1987) Decomposition of function into wavelets of constant shape and related transforms. In: Streit L (ed) Mathematics and physics, lectures on recent results. World Scientific
    • (1987) Mathematics and Physics, Lectures on Recent Results
    • Grossmann, A.1    Morlet, J.2
  • 44
    • 0026851046 scopus 로고
    • Technical features of the JBIG standard for progressive bi-level image compression
    • 2
    • Hampel H, Arps R, Chamzas C (1992) Technical features of the JBIG standard for progressive bi-level image compression. Signal Process Image Commun 4(2):103-111
    • (1992) Signal Process Image Commun , vol.4 , pp. 103-111
    • Hampel, H.1    Arps, R.2    Chamzas, C.3
  • 45
    • 0028762624 scopus 로고
    • New digital signature scheme based on discrete logarithm
    • 5
    • Harn L (1994) New digital signature scheme based on discrete logarithm. Electron Lett 30(5):396-398
    • (1994) Electron Lett , vol.30 , pp. 396-398
    • Harn, L.1
  • 48
    • 0033872149 scopus 로고    scopus 로고
    • Counterfeiting attacks on oblivious block-wise independant invisible watermarking schemes
    • Holliman M, Memon N (1997) Counterfeiting attacks on oblivious block-wise independant invisible watermarking schemes. IEEE Trans Image Process 6:432-441
    • (1997) IEEE Trans Image Process , vol.6 , pp. 432-441
    • Holliman, M.1    Memon, N.2
  • 50
    • 0033885611 scopus 로고    scopus 로고
    • A digital watermark for images using the wavelet transform
    • 2
    • Inoue H, Miyazaki A, Katsura T (2000) A digital watermark for images using the wavelet transform. Integr Comput Aided Eng 7(2):105-115
    • (2000) Integr Comput Aided Eng , vol.7 , pp. 105-115
    • Inoue, H.1    Miyazaki, A.2    Katsura, T.3
  • 54
    • 0001769898 scopus 로고    scopus 로고
    • Attacks on fast double block length hash functions
    • 1
    • Knudsen LR, Xuejia L (1998) Attacks on fast double block length hash functions. J Cryptol 11(1):59-72
    • (1998) J Cryptol , vol.11 , pp. 59-72
    • Knudsen, L.R.1    Xuejia, L.2
  • 57
    • 0032648596 scopus 로고    scopus 로고
    • Digital watermarking for telltale tamper proofing and authentication
    • 7
    • Kundur D, Hatzinakos D (1999) Digital watermarking for telltale tamper proofing and authentication. Proc IEEE 87(7):1167-1180
    • (1999) Proc IEEE , vol.87 , pp. 1167-1180
    • Kundur, D.1    Hatzinakos, D.2
  • 58
    • 0001001980 scopus 로고    scopus 로고
    • Digital watermaking of color images using amplitude modulation
    • 2
    • Kutter M, Jordan F, Bossen F (1998) Digital watermaking of color images using amplitude modulation. J Electron Imaging 7(2):326-332
    • (1998) J Electron Imaging , vol.7 , pp. 326-332
    • Kutter, M.1    Jordan, F.2    Bossen, F.3
  • 66
    • 0008719828 scopus 로고    scopus 로고
    • Lossless compression of continuous-tone images by combined inter-bit-plane decorrelation and JBIG coding
    • 2
    • Liang S, Rangayyan RM (1997) Lossless compression of continuous-tone images by combined inter-bit-plane decorrelation and JBIG coding. J Electron Imaging 6(2):198-207
    • (1997) J Electron Imaging , vol.6 , pp. 198-207
    • Liang, S.1    Rangayyan, R.M.2
  • 68
    • 1842438950 scopus 로고    scopus 로고
    • A robust image authentication method distinguishing JPEG compression from malicious manipulation
    • Lin CY, Chang SF (1997) A robust image authentication method distinguishing JPEG compression from malicious manipulation. CU/CTR Technical Report 486-97-19
    • (1997) CU/CTR Technical Report 486-97-19
    • Lin, C.Y.1    Chang, S.F.2
  • 72
    • 0035763338 scopus 로고    scopus 로고
    • Using self-authentication-and-recovery for error concealment in wireless environments
    • Lin CY, Sow D, Chang SF (2001) Using self-authentication-and-recovery for error concealment in wireless environments. In: Proceedings of SPIE, vol 4518
    • (2001) Proceedings of SPIE , vol.4518
    • Lin, C.Y.1    Sow, D.2    Chang, S.F.3
  • 73
    • 0018918171 scopus 로고
    • An algorithm for vector quantizer design
    • Linde Y, Buzo A, Gray RM (1980) An algorithm for vector quantizer design. IEEE Trans Commun 28:84-95
    • (1980) IEEE Trans Commun , vol.28 , pp. 84-95
    • Linde, Y.1    Buzo, A.2    Gray, R.M.3
  • 74
    • 0033747098 scopus 로고    scopus 로고
    • ECC performance evaluation for MDFE read channel
    • 2
    • Liu B, Wang X (2000) ECC performance evaluation for MDFE read channel. Chin J Electron 9(2):144-148
    • (2000) Chin J Electron , vol.9 , pp. 144-148
    • Liu, B.1    Wang, X.2
  • 77
    • 0034140535 scopus 로고    scopus 로고
    • Fault resilient and compression tolerant digital signature for image authentication
    • Lou DC, Liu JL (2000) Fault resilient and compression tolerant digital signature for image authentication. IEEE Trans Consum Electron 46:31-39
    • (2000) IEEE Trans Consum Electron , vol.46 , pp. 31-39
    • Lou, D.C.1    Liu, J.L.2
  • 78
    • 0013106830 scopus 로고    scopus 로고
    • Structural digital signature for image authentication: An incidental distortion resistant scheme
    • Lu C-S (2000) Structural digital signature for image authentication: an incidental distortion resistant scheme. In: Proceedings of the ACM multimedia workshops, pp 115-118
    • (2000) Proceedings of the ACM Multimedia Workshops , pp. 115-118
    • Lu, C.-S.1
  • 79
    • 0037869332 scopus 로고    scopus 로고
    • Fragile watermarking scheme for image authentication
    • 12
    • Lu H, Shen R, Chung F-L (2003) Fragile watermarking scheme for image authentication. Electron Lett 39(12):898-900
    • (2003) Electron Lett , vol.39 , pp. 898-900
    • Lu, H.1    Shen, R.2    Chung, F.-L.3
  • 80
    • 0037426973 scopus 로고    scopus 로고
    • Semi-fragile image watermarking method based on index constrained vector quantization
    • 1
    • Lu Z-M, Liu C-H, Xu D-G (2003) Semi-fragile image watermarking method based on index constrained vector quantization. Electron Lett 39(1):35-36
    • (2003) Electron Lett , vol.39 , pp. 35-36
    • Lu, Z.-M.1    Liu, C.-H.2    Xu, D.-G.3
  • 81
    • 20444378085 scopus 로고    scopus 로고
    • Multipurpose image watermarking algorithm based on multistage vector quantization
    • 6
    • Lu Z-M, Xu D-G, Sun S-H (2005) Multipurpose image watermarking algorithm based on multistage vector quantization. IEEE Trans Image Process. 14(6):822-831
    • (2005) IEEE Trans Image Process , vol.14 , pp. 822-831
    • Lu, Z.-M.1    Xu, D.-G.2    Sun, S.-H.3
  • 82
    • 0030130001 scopus 로고    scopus 로고
    • A new approach to image feature detection with applications
    • Manjunath BS, Shekhar C, Chellappa R (1996) A new approach to image feature detection with applications. Pattern Recogn 31:627-640
    • (1996) Pattern Recogn , vol.31 , pp. 627-640
    • Manjunath, B.S.1    Shekhar, C.2    Chellappa, R.3
  • 91
    • 0242410360 scopus 로고    scopus 로고
    • A practical (t, n) threshold proxy signature scheme based on the RSA cryptosystem
    • 6
    • Min-Shiang H, Jui-Lin L, Iuon-Chang L (2003) A practical (t, n) threshold proxy signature scheme based on the RSA cryptosystem. IEEE Trans Knowl Data Eng 15(6):1552-1560
    • (2003) IEEE Trans Knowl Data Eng , vol.15 , pp. 1552-1560
    • Min-Shiang, H.1    Jui-Lin, L.2    Iuon-Chang, L.3
  • 95
    • 84948995055 scopus 로고
    • Can DSA be improved? Complexity trade-offs with the digital signature standard
    • Workshop on the theory and application of cryptographic techniques
    • Naccache D, M'raïhi D, Vaudenay S, Raphaeli D (1995) Can DSA be improved? Complexity trade-offs with the digital signature standard. In: Proceedings of advances in cryptology-EUROCRYPT '94. Workshop on the theory and application of cryptographic techniques, pp 77-85
    • (1995) Proceedings of Advances in Cryptology-EUROCRYPT '94 , pp. 77-85
    • Naccache, D.1    M'Raïhi, D.2    Vaudenay, S.3    Raphaeli, D.4
  • 97
    • 0018306059 scopus 로고
    • A threshold selection method from gray-level histograms
    • 1
    • Otsu N (1979) A threshold selection method from gray-level histograms. IEEE Trans Syst Man Cybern 9(1):62-66
    • (1979) IEEE Trans Syst Man Cybern , vol.9 , pp. 62-66
    • Otsu, N.1
  • 102
    • 0343163041 scopus 로고    scopus 로고
    • Digital signature schemes: General framework and fail-stop signatures
    • Springer, Berlin, Allemagne
    • Pfitzmann B (1996) Digital signature schemes: general framework and fail-stop signatures. Lecture notes in computer science, vol 1100. Springer, Berlin, Allemagne
    • (1996) Lecture Notes in Computer Science , vol.1100
    • Pfitzmann, B.1
  • 109
    • 0003195066 scopus 로고
    • The MD4 message digest algorithm
    • MIT and RSA Data Security, Inc
    • Rivest R (1992) The MD4 message digest algorithm. RFC 1320, MIT and RSA Data Security, Inc
    • (1992) RFC , vol.1320
    • Rivest, R.1
  • 110
    • 0017930809 scopus 로고
    • A method for obtaining digital signatures and public-key cryptosystems
    • 2
    • Rivest RL, Shamir A, Adleman LM (1978) A method for obtaining digital signatures and public-key cryptosystems. Commun ACM 21(2):120-126
    • (1978) Commun ACM , vol.21 , pp. 120-126
    • Rivest, R.L.1    Shamir, A.2    Adleman, L.M.3
  • 111
    • 38649102081 scopus 로고
    • Performance of symmetric ciphers and one-way hash functions. Fast software encryption
    • Roe M (1994) Performance of symmetric ciphers and one-way hash functions. Fast software encryption. In: Proceedings of the Cambridge security workshop, pp 83-89
    • (1994) Proceedings of the Cambridge Security Workshop , pp. 83-89
    • Roe, M.1
  • 112
    • 1842688775 scopus 로고    scopus 로고
    • MD2 is not secure without the checksum byte
    • 3
    • Rogier N, Chauvaud P (1997) MD2 is not secure without the checksum byte. Designs Codes Cryptogr 12(3):245-251
    • (1997) Designs Codes Cryptogr , vol.12 , pp. 245-251
    • Rogier, N.1    Chauvaud, P.2
  • 113
    • 0012081094 scopus 로고    scopus 로고
    • RSA-based undeniable signatures
    • 4
    • Rosario G, Krawczyk H (2000) RSA-based undeniable signatures. J Cryptol 13(4):397-416
    • (2000) J Cryptol , vol.13 , pp. 397-416
    • Rosario, G.1    Krawczyk, H.2
  • 114
    • 0027557552 scopus 로고
    • Modified gold codes
    • 2
    • Rothaus O (1993) Modified gold codes. IEEE Trans Inf Theory 39(2)654-656
    • (1993) IEEE Trans Inf Theory , vol.39 , pp. 654-656
    • Rothaus, O.1
  • 116
    • 0019021287 scopus 로고
    • Crosscorrelation properties of pseudorandom and related sequences
    • Sarwate DV, Pursley MB (1980) Crosscorrelation properties of pseudorandom and related sequences. Proc IEEE 68:593-619
    • (1980) Proc IEEE , vol.68 , pp. 593-619
    • Sarwate, D.V.1    Pursley, M.B.2
  • 119
    • 0001574510 scopus 로고    scopus 로고
    • Image coding based on morphological representation of wavelet data
    • 9
    • Sergio D, Servetto KR, Orchard MT (1999) Image coding based on morphological representation of wavelet data. IEEE Trans Image Process 8(9):1161-1174
    • (1999) IEEE Trans Image Process , vol.8 , pp. 1161-1174
    • Sergio, D.1    Servetto, K.R.2    Orchard, M.T.3
  • 120
    • 0036450244 scopus 로고    scopus 로고
    • Fragile and semi-fragile image authentication based on image self-similarity image processing
    • Sherif, NE-D, Mansour M (2002) Fragile and semi-fragile image authentication based on image self-similarity image processing. In: Proceedings of the international conference on image processing, vol 2, pp 897-900
    • (2002) Proceedings of the International Conference on Image Processing , vol.2 , pp. 897-900
    • Sherif1    Ne-D2    Mansour, M.3
  • 121
    • 35248891585 scopus 로고    scopus 로고
    • New DSA-verifiable signcryption schemes
    • Proceedings of the 5th international conference on information security and cryptology-ICISC 2002 Springer
    • Shin JB, Lee K, Shim K (2002) New DSA-verifiable signcryption schemes. In: Proceedings of the 5th international conference on information security and cryptology-ICISC 2002. Lecture notes in computer science, vol 2587. Springer, pp 35-47
    • (2002) Lecture Notes in Computer Science , vol.2587 , pp. 35-47
    • Shin, J.B.1    Lee, K.2    Shim, K.3
  • 126
    • 0036448095 scopus 로고    scopus 로고
    • Semi-fragile image authentication using generic wavelet domain features and ECC
    • Sun Q, Chang SF (2002) Semi-fragile image authentication using generic wavelet domain features and ECC. In: Proceedings of the ICIP
    • (2002) Proceedings of the ICIP
    • Sun, Q.1    Chang, S.F.2
  • 127
    • 20444390631 scopus 로고    scopus 로고
    • A secure and robust digital signature scheme for JPEG 2000 image authentication
    • 3
    • Sun Q, Chang SF (2005) A secure and robust digital signature scheme for JPEG 2000 image authentication. IEEE Trans Multimedia 7(3):480-494
    • (2005) IEEE Trans Multimedia , vol.7 , pp. 480-494
    • Sun, Q.1    Chang, S.F.2
  • 128
    • 0025432029 scopus 로고
    • Duplex modified-READ coding scheme for facsimile transmission of documents
    • 5
    • Tanaka K, Nakamura Y, Matsui K (1990) Duplex modified-READ coding scheme for facsimile transmission of documents. Electron Commun Jpn Part 1 Commun 73(5):46-56
    • (1990) Electron Commun Jpn Part 1 Commun , vol.73 , pp. 46-56
    • Tanaka, K.1    Nakamura, Y.2    Matsui, K.3
  • 129
    • 0028419042 scopus 로고
    • Incoherent asynchronous optical CDMA using gold codes
    • 9
    • Tancevski L, Bazgaloski L, Andonovic I (1994) Incoherent asynchronous optical CDMA using gold codes. Electron Lett 30(9):721-723
    • (1994) Electron Lett , vol.30 , pp. 721-723
    • Tancevski, L.1    Bazgaloski, L.2    Andonovic, I.3
  • 132
    • 44949212670 scopus 로고    scopus 로고
    • Image processing toolbox
    • The Mathworks Inc.
    • The Mathworks Inc. image processing toolbox. User's guide. Version 3
    • User's Guide. Version 3
  • 133
  • 136
    • 0022266946 scopus 로고
    • Moment-preserving thresholding: A new approach
    • Tsai WH (1985) Moment-preserving thresholding: a new approach. Comput Vis Graph Image Process 29:377-393
    • (1985) Comput Vis Graph Image Process , vol.29 , pp. 377-393
    • Tsai, W.H.1
  • 142
    • 0029292158 scopus 로고
    • Information authentication for a slippery new age
    • 4
    • Walton S (1995) Information authentication for a slippery new age. Dr Dobb's J 20(4):18-26
    • (1995) Dr Dobb's J , vol.20 , pp. 18-26
    • Walton, S.1
  • 143
    • 0036529692 scopus 로고    scopus 로고
    • A new ECC/RLL coding scheme
    • 2
    • Wang X, Liu B (2002) A new ECC/RLL coding scheme. Chin J Electron 11(2):186-191
    • (2002) Chin J Electron , vol.11 , pp. 186-191
    • Wang, X.1    Liu, B.2
  • 147
    • 0002956093 scopus 로고    scopus 로고
    • A watermark for image integrity and ownership verification
    • Portland, OR, USA
    • Wong PW (1998a) A watermark for image integrity and ownership verification. In: Proceedings of the IS&T PIC conference, Portland, OR, USA
    • (1998) Proceedings of the IS&T PIC Conference
    • Wong, P.W.1
  • 148
    • 0032312612 scopus 로고    scopus 로고
    • A public key watermark for image verification and authentication
    • Chicago, IL, USA
    • Wong PW (1998b) A public key watermark for image verification and authentication. In: Proceedings of the ICIP, Chicago, IL, USA
    • (1998) Proceedings of the ICIP
    • Wong, P.W.1
  • 150
    • 0035473831 scopus 로고    scopus 로고
    • Secret and public key image watermarking schemes for image authentication and ownership verification
    • Wong PW, Memon N (2001) Secret and public key image watermarking schemes for image authentication and ownership verification. IEEE Trans Image Process 10:1593-1601
    • (2001) IEEE Trans Image Process , vol.10 , pp. 1593-1601
    • Wong, P.W.1    Memon, N.2
  • 152
    • 0036755019 scopus 로고    scopus 로고
    • On the design of content based multimedia authentication systems
    • 3
    • Wu CW (2002) On the design of content based multimedia authentication systems. IEEE Trans Multimedia 4(3):385-393
    • (2002) IEEE Trans Multimedia , vol.4 , pp. 385-393
    • Wu, C.W.1
  • 155
    • 0003031033 scopus 로고    scopus 로고
    • A blind wavelet based digital signature for image authentication
    • Xie L, Arce GR, (1998b) A blind wavelet based digital signature for image authentication. In: Proceedings of the EUSIPCO-98
    • (1998) Proceedings of the EUSIPCO-98
    • Xie, L.1    Arce, G.R.2
  • 156
    • 0032291652 scopus 로고    scopus 로고
    • Joint wavelet compression and authentication watermarking
    • Xie L, Arce GR (1998c) Joint wavelet compression and authentication watermarking. In: Proceedings of the ICIP'98
    • (1998) Proceedings of the ICIP'98
    • Xie, L.1    Arce, G.R.2
  • 158
    • 0043201448 scopus 로고    scopus 로고
    • Digital watermarking introduction
    • 7
    • Yeung MM (1998) Digital watermarking introduction. Commun ACM 41(7):31-33
    • (1998) Commun ACM , vol.41 , pp. 31-33
    • Yeung, M.M.1
  • 159
    • 0031378592 scopus 로고    scopus 로고
    • An invisible watermarking technique for image verification
    • Santa Barbara, CA
    • Yeung M, Mintzer F (1997) An invisible watermarking technique for image verification. In: Proceedings of the ICIP'97, Santa Barbara, CA
    • (1997) Proceedings of the ICIP'97
    • Yeung, M.1    Mintzer, F.2
  • 161
    • 0027624160 scopus 로고
    • A computational vision approach to image registration
    • Zheng Q, Chellappa R (1993) A computational vision approach to image registration. IEEE Trans Image Process 2(3):311-326
    • (1993) IEEE Trans Image Process , vol.2 , Issue.3 , pp. 311-326
    • Zheng, Q.1    Chellappa, R.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.