메뉴 건너뛰기




Volumn , Issue , 2007, Pages 630-636

Content-based image authentication: Current status, issues, and challenges

Author keywords

Content based authentication; Image hash; Performance trade off; Security

Indexed keywords

AUTHENTICATION; DIGITAL ARITHMETIC; INFORMATION THEORY; INTERNET PROTOCOLS; RELIABILITY; SEMANTICS;

EID: 47749122959     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ICSC.2007.100     Document Type: Conference Paper
Times cited : (3)

References (21)
  • 1
    • 1942486239 scopus 로고    scopus 로고
    • Geometric Invariance in Image Watermarking
    • Feb
    • Alghoniemy, M. and Tewfik, A. H., "Geometric Invariance in Image Watermarking," IEEE Trans. Image Process, Vol. 13, No. 2, pp. 145-153, Feb. 2004.
    • (2004) IEEE Trans. Image Process , vol.13 , Issue.2 , pp. 145-153
    • Alghoniemy, M.1    Tewfik, A.H.2
  • 4
    • 0033872149 scopus 로고    scopus 로고
    • Counterfeiting Attacks on Oblivious Block-wise Independent Invisible Watermarking Schemas
    • Holliman, M. and Memon, N., "Counterfeiting Attacks on Oblivious Block-wise Independent Invisible Watermarking Schemas," IEEE Trans. on Image Processing, Vol. 9, No. 3, pp. 432-441, 2000.
    • (2000) IEEE Trans. on Image Processing , vol.9 , Issue.3 , pp. 432-441
    • Holliman, M.1    Memon, N.2
  • 6
    • 20444458213 scopus 로고    scopus 로고
    • Image Authentication Surviving Acceptable Modifications Using Statistical Measures and K-Mean Segmentation
    • June
    • Kailasanathan, C. and Naini, R. C., "Image Authentication Surviving Acceptable Modifications Using Statistical Measures and K-Mean Segmentation," IEEE-EURASIP Work. Nonlinear Sig. and Image Proc., June 2001.
    • (2001) IEEE-EURASIP Work. Nonlinear Sig. and Image Proc
    • Kailasanathan, C.1    Naini, R.C.2
  • 7
    • 20444500587 scopus 로고    scopus 로고
    • Robust Perceptual Image Hashing via Matrix Invariants
    • Singapore, Oct
    • Kozat, S. S., Venkatesan, R. and Mihçak, M. K., "Robust Perceptual Image Hashing via Matrix Invariants," in Proc. IEEE Int. Conf. Image Processing, Singapore, Vol. 5, pp. 3443-3446, Oct. 2004.
    • (2004) Proc. IEEE Int. Conf. Image Processing , vol.5 , pp. 3443-3446
    • Kozat, S.S.1    Venkatesan, R.2    Mihçak, M.K.3
  • 8
    • 0141638481 scopus 로고    scopus 로고
    • Invariant Image Watermark Using Zernike Moments
    • Aug
    • Kim, H.S. and Lee, H. K., "Invariant Image Watermark Using Zernike Moments," IEEE Trans. Circuits Syst. Video Technol., Vol. 13, No. 8, pp. 766-775, Aug. 2003.
    • (2003) IEEE Trans. Circuits Syst. Video Technol , vol.13 , Issue.8 , pp. 766-775
    • Kim, H.S.1    Lee, H.K.2
  • 9
    • 0035248504 scopus 로고    scopus 로고
    • A Robust Image Authentication Method Distinguishing JPEG Compression from Malicious Manipulation
    • Lin, C. Y. and Chang, S. F., "A Robust Image Authentication Method Distinguishing JPEG Compression from Malicious Manipulation," IEEE Trans. on Circuits and Systems for Video Technology, Vol.11, No.2, pp. 153-168, 2001.
    • (2001) IEEE Trans. on Circuits and Systems for Video Technology , vol.11 , Issue.2 , pp. 153-168
    • Lin, C.Y.1    Chang, S.F.2
  • 10
    • 33744760329 scopus 로고    scopus 로고
    • The Randlet Transform: Applications to Universal Perceptual Hashing and Image Authentication
    • Monticello, IL
    • Malkin, M. and Venkatesan, R., "The Randlet Transform: Applications to Universal Perceptual Hashing and Image Authentication", in Proc. Allerton Conf., Monticello, IL, 2004.
    • (2004) Proc. Allerton Conf
    • Malkin, M.1    Venkatesan, R.2
  • 12
    • 0035163017 scopus 로고    scopus 로고
    • On the Security of the SARI Image Authentication System
    • Radhakrishnan, R. and Memon, N., "On the Security of the SARI Image Authentication System," in Proc. IEEE Int. Conf. on Image Proc., Vol. 3, pp 971-974, 2001.
    • (2001) Proc. IEEE Int. Conf. on Image Proc , vol.3 , pp. 971-974
    • Radhakrishnan, R.1    Memon, N.2
  • 14
    • 0036627368 scopus 로고    scopus 로고
    • A Survey of Watermarking Algorithms for Image Authentication
    • Rey, C. and Dugelay, J. L., "A Survey of Watermarking Algorithms for Image Authentication," EURASIP Journal on Applied Signal Processing, Vol. 6, No. 3, pp 613-621, 2002.
    • (2002) EURASIP Journal on Applied Signal Processing , vol.6 , Issue.3 , pp. 613-621
    • Rey, C.1    Dugelay, J.L.2
  • 15
    • 0030409375 scopus 로고    scopus 로고
    • A Robust Content Based Digital Signature for Image Authentication
    • Lausanne, Switzerland, Sep
    • Schneider, M. and Chang, S. F., "A Robust Content Based Digital Signature for Image Authentication," in Proc. IEEE Int. Conf. Image Processing, Lausanne, Switzerland, Vol. 3, pp. 227-230, Sep. 1996.
    • (1996) Proc. IEEE Int. Conf. Image Processing , vol.3 , pp. 227-230
    • Schneider, M.1    Chang, S.F.2
  • 19
    • 0032312612 scopus 로고    scopus 로고
    • A Public Key Watermark for Image Verification and Authentication
    • Wong, P. W., "A Public Key Watermark for Image Verification and Authentication," in Proc. IEEE ICIP, pp. 425-429, 1998.
    • (1998) Proc. IEEE ICIP , pp. 425-429
    • Wong, P.W.1
  • 21
    • 24944469705 scopus 로고    scopus 로고
    • On the Security of an SVD-Based Ownership Watermarking
    • Wu, Y., "On the Security of an SVD-Based Ownership Watermarking," IEEE Trans. on Multimedia, Vol. 7, No. 4, pp624-627, 2005.
    • (2005) IEEE Trans. on Multimedia , vol.7 , Issue.4 , pp. 624-627
    • Wu, Y.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.