메뉴 건너뛰기




Volumn 3, Issue 3, 2007, Pages 631-640

A GA-based nearly optimal image authentication approach

Author keywords

Genetic algorithm (GA); Image authentication

Indexed keywords


EID: 47549103010     PISSN: 13494198     EISSN: None     Source Type: Journal    
DOI: None     Document Type: Article
Times cited : (32)

References (17)
  • 2
    • 33947720908 scopus 로고    scopus 로고
    • Toward a robust image authentication method surviving JPEG lossy compression
    • Chen, C. C. and C. S. Lin, Toward a robust image authentication method surviving JPEG lossy compression, Journal of Information Science and Engineering, vol.23, no.2, pp.511-524, 2007.
    • (2007) Journal of Information Science and Engineering , vol.23 , Issue.2 , pp. 511-524
    • Chen, C.C.1    Lin, C.S.2
  • 3
    • 0038612961 scopus 로고    scopus 로고
    • DCT-based image watermarking using subsampling
    • Chu, W. C, DCT-based image watermarking using subsampling, IEEE Transactions on Multimedia, vol.5, pp.34-38, 2003
    • (2003) IEEE Transactions on Multimedia , vol.5 , pp. 34-38
    • Chu, W.C.1
  • 10
    • 0035248504 scopus 로고    scopus 로고
    • A robust image authentication method distinguishing JPEG compression from malicious manipulation
    • Lin, C. Y. and S. F. Chang, A robust image authentication method distinguishing JPEG compression from malicious manipulation, IEEE Transactions on Circuits and Systems of Video Technology, vol. 11, pp.153-168, 2001.
    • (2001) IEEE Transactions on Circuits and Systems of Video Technology , vol.11 , pp. 153-168
    • Lin, C.Y.1    Chang, S.F.2
  • 11
    • 0034249378 scopus 로고    scopus 로고
    • A robust DCT-based watermarking for copyright protection
    • Lin, S. D. and C. F. Chen, A robust DCT-based watermarking for copyright protection, IEEE Transactions on Consumer Electronics, vol.46, no.3, pp.415-421, 2000.
    • (2000) IEEE Transactions on Consumer Electronics , vol.46 , Issue.3 , pp. 415-421
    • Lin, S.D.1    Chen, C.F.2
  • 12
    • 0346216903 scopus 로고    scopus 로고
    • Genetic Watermarking based on transformdomain techniques
    • Shieh, C. S., H. C. Huang, F. H. Wang and J. S. Pan, Genetic Watermarking based on transformdomain techniques, Pattern Recognition, vol.37, no.3, pp.555-565, 2004.
    • (2004) Pattern Recognition , vol.37 , Issue.3 , pp. 555-565
    • Shieh, C.S.1    Huang, H.C.2    Wang, F.H.3    Pan, J.S.4
  • 13
    • 84949210459 scopus 로고    scopus 로고
    • A SVD and quantization based semi-fragile watermarking technique for image authentication
    • Sun, R., H. Sun and T. Yao, A SVD and quantization based semi-fragile watermarking technique for image authentication, Proc. of the IEEE International Conference on Signal Processing, vol.2, pp.1592-1595, 2002.
    • (2002) Proc. of the IEEE International Conference on Signal Processing , vol.2 , pp. 1592-1595
    • Sun, R.1    Sun, H.2    Yao, T.3
  • 14
    • 0142029533 scopus 로고    scopus 로고
    • Using set partitioning in hierarchical trees to authenticate digital images
    • Tsai, P., Y. C. Hu and C. C. Chang, Using set partitioning in hierarchical trees to authenticate digital images, Signal Processing: Image Communication, vol.18, pp.813-822, 2003.
    • (2003) Signal Processing: Image Communication , vol.18 , pp. 813-822
    • Tsai, P.1    Hu, Y.C.2    Chang, C.C.3
  • 15
    • 0035473831 scopus 로고    scopus 로고
    • Secret and public key image watermarking schemes for image authentication and ownership verification
    • Wong, P. W. and N. Memon, Secret and public key image watermarking schemes for image authentication and ownership verification, IEEE Transactions on Image Processing, vol.10, pp.1593-1601, 2001.
    • (2001) IEEE Transactions on Image Processing , vol.10 , pp. 1593-1601
    • Wong, P.W.1    Memon, N.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.