메뉴 건너뛰기




Volumn , Issue , 2004, Pages 541-545

Image authentication using relation measures of wavelet coefficients

Author keywords

Collage attack; Digital watermarking; Image authentication; Semi fragile watermarks; Wavelets

Indexed keywords

COLLAGE ATTACK; IMAGE AUTHENTICATION; SEMI-FRAGILE WATERMARKS; WAVELET COEFFICIENTS;

EID: 4544381080     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1007/s10255-004-0191-x     Document Type: Conference Paper
Times cited : (15)

References (22)
  • 1
    • 0032312612 scopus 로고    scopus 로고
    • A Public key watermarking for image verification and authentication
    • P.W. Wong (1998), "A Public Key Watermarking for Image Verification and Authentication," Int. Conf. Image Processing, pp. 455-459.
    • (1998) Int. Conf. Image Processing , pp. 455-459
    • Wong, P.W.1
  • 2
    • 0033872149 scopus 로고    scopus 로고
    • Counterfeiting attacks on oblivious block-wise independent invisible watermarking schemes
    • M. Holliman and N. Memon (2000), "Counterfeiting Attacks on Oblivious Block-Wise Independent Invisible Watermarking Schemes," IEEE Trans. Image Processing, Vol. 9, pp. 432-441.
    • (2000) IEEE Trans. Image Processing , vol.9 , pp. 432-441
    • Holliman, M.1    Memon, N.2
  • 3
    • 0032650557 scopus 로고    scopus 로고
    • Content-based digital signature for motion pictures authentication and content-fragile watermarking
    • J. Dittmann, A. Steinmetz, and R. Steinmetz (1999), "Content-Based Digital Signature for Motion Pictures Authentication and Content-Fragile Watermarking," Int. Conf. Multimedia Computing and Systems, Vol.2, pp. 209-213.
    • (1999) Int. Conf. Multimedia Computing and Systems , vol.2 , pp. 209-213
    • Dittmann, J.1    Steinmetz, A.2    Steinmetz, R.3
  • 4
    • 0036611838 scopus 로고    scopus 로고
    • Hierarchical watermarking for secure image authentication with localization
    • M.U. Celik, G. Sharma, E. Saber, and A.M. Tekalp (2002), "Hierarchical Watermarking for Secure Image Authentication With Localization," IEEE Trans. Image Processing, Vol. 11, No. 6, pp. 585-595.
    • (2002) IEEE Trans. Image Processing , vol.11 , Issue.6 , pp. 585-595
    • Celik, M.U.1    Sharma, G.2    Saber, E.3    Tekalp, A.M.4
  • 5
    • 0032648596 scopus 로고    scopus 로고
    • Digital watermarking for telltale tamper proofing and authentication
    • D. Kundur and D. Hatzinakos (1999), "Digital Watermarking for Telltale Tamper Proofing and Authentication," Proceedings of the IEEE, Vol. 87, pp.1167-1180.
    • (1999) Proceedings of the IEEE , vol.87 , pp. 1167-1180
    • Kundur, D.1    Hatzinakos, D.2
  • 6
    • 0031378592 scopus 로고    scopus 로고
    • An invisible watermarking technique for image verification
    • M. Yeung, and F. Mintzer (1997), "An Invisible Watermarking Technique for Image Verification," Int. Conf. Image Processing, pp. 680-683.
    • (1997) Int. Conf. Image Processing , pp. 680-683
    • Yeung, M.1    Mintzer, F.2
  • 8
    • 0035786867 scopus 로고    scopus 로고
    • Digital watermarking technique for image authentication by neighboring block similarity measure
    • N. Chotikakamthorn and W. Sangiamkun (2001), "Digital Watermarking Technique for Image Authentication by Neighboring Block Similarity Measure," Int. Conf. Electrical and Electronic Technology, pp. 743-747.
    • (2001) Int. Conf. Electrical and Electronic Technology , pp. 743-747
    • Chotikakamthorn, N.1    Sangiamkun, W.2
  • 9
    • 0035388316 scopus 로고    scopus 로고
    • Mean quantization-based fragile watermarking for image authentication
    • G.J. Yu, C.S. Lu, and H.Y.M. Liao (2001), "Mean Quantization-Based Fragile Watermarking for Image Authentication," Optical Engineering, Vol. 40, No. 7, pp. 1396-1408.
    • (2001) Optical Engineering , vol.40 , Issue.7 , pp. 1396-1408
    • Yu, G.J.1    Lu, C.S.2    Liao, H.Y.M.3
  • 11
    • 0034444323 scopus 로고    scopus 로고
    • Wavelet packet and adaptive spatial transformation of watermark for digital image authentication
    • September 10-13, Vancouver, Canada
    • M.J. Tsai, K.Y. Yu, and Y.Z. Chen (2000), "Wavelet Packet and Adaptive Spatial Transformation of Watermark for Digital Image Authentication," Int. Conf. Image Processing, September 10-13, Vancouver, Canada.
    • (2000) Int. Conf. Image Processing
    • Tsai, M.J.1    Yu, K.Y.2    Chen, Y.Z.3
  • 12
    • 0034443405 scopus 로고    scopus 로고
    • Robust image watermark with wavelet transform and spread spectrum techniques
    • Y.P. Wang, M.J. Chen, and P.Y. Cheng (2000), "Robust Image Watermark with Wavelet Transform and Spread Spectrum Techniques," Int. Conf. Systems and Computers, Vol. 2, pp. 1846-1850.
    • (2000) Int. Conf. Systems and Computers , vol.2 , pp. 1846-1850
    • Wang, Y.P.1    Chen, M.J.2    Cheng, P.Y.3
  • 15
    • 0032292342 scopus 로고    scopus 로고
    • Watermarking for image authentication
    • M. Wu and B. Liu (1998), "Watermarking for Image Authentication," Int. Conf. Image Processing, Vol. 2, pp. 437-441.
    • (1998) Int. Conf. Image Processing , vol.2 , pp. 437-441
    • Wu, M.1    Liu, B.2
  • 16
    • 0035473830 scopus 로고    scopus 로고
    • Multipurpose watermarking for image authentication and protection
    • G.J. Yu, C.S. Lu, and H.Y.M. Liao (2001), "Multipurpose Watermarking for Image Authentication and Protection," IEEE Trans. Image Processing, Vol. 10, pp. 1579-1592.
    • (2001) IEEE Trans. Image Processing , vol.10 , pp. 1579-1592
    • Yu, G.J.1    Lu, C.S.2    Liao, H.Y.M.3
  • 18
    • 0034140162 scopus 로고    scopus 로고
    • Digital watermarking using zerotree of DCT
    • C.F. Wu and W.S. Hsieh (2000), "Digital Watermarking Using Zerotree of DCT," IEEE Trans. Consumer Electronics, Vol. 46, pp. 87-94.
    • (2000) IEEE Trans. Consumer Electronics , vol.46 , pp. 87-94
    • Wu, C.F.1    Hsieh, W.S.2
  • 19
    • 0037153490 scopus 로고    scopus 로고
    • Image fragile watermarking based on fusion of multi-resolution tamper detection
    • J. Hu, J. Huang, D. Huang, and Y.Q. Shi (2002), "Image Fragile Watermarking Based on Fusion of Multi-Resolution Tamper Detection," Electronics Letters, Vol. 38, pp. 1512-1513.
    • (2002) Electronics Letters , vol.38 , pp. 1512-1513
    • Hu, J.1    Huang, J.2    Huang, D.3    Shi, Y.Q.4
  • 20
    • 0037818310 scopus 로고    scopus 로고
    • Structural digital signature for image authentication: An incidental distortion resistant scheme
    • G.J. Yu, C.S. Lu, and H.Y.M. Liao (2003), "Structural Digital Signature for Image Authentication: An Incidental Distortion Resistant Scheme," IEEE Trans. Multimedia, Vol. 5, pp.161-173.
    • (2003) IEEE Trans. Multimedia , vol.5 , pp. 161-173
    • Yu, G.J.1    Lu, C.S.2    Liao, H.Y.M.3
  • 21
    • 0037096996 scopus 로고    scopus 로고
    • A public verifiable copy protection technique for still images
    • W.B. Lee and T.H. Chen (2002), "A Public Verifiable Copy Protection Technique for Still Images," Journal of systems and Software, Vol. 62, No. 3, pp. 195-204.
    • (2002) Journal of Systems and Software , vol.62 , Issue.3 , pp. 195-204
    • Lee, W.B.1    Chen, T.H.2
  • 22
    • 0141909303 scopus 로고    scopus 로고
    • Blind watermarking method based on DWT middle frequency pair
    • Q. Yuan, H. Yao, W. Gao, and S. Joo (2002) "Blind Watermarking Method Based on DWT Middle Frequency Pair," Int. Conf. Multimedia and Expo, Vol. 2, pp.473-476.
    • (2002) Int. Conf. Multimedia and Expo , vol.2 , pp. 473-476
    • Yuan, Q.1    Yao, H.2    Gao, W.3    Joo, S.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.