메뉴 건너뛰기




Volumn , Issue , 2007, Pages 166-170

A signal processing and randomization perspective of robust and secure image hashing

Author keywords

[No Author keywords available]

Indexed keywords

TECHNICAL PRESENTATIONS;

EID: 47849104702     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/SSP.2007.4301240     Document Type: Conference Paper
Times cited : (18)

References (20)
  • 2
    • 0035248504 scopus 로고    scopus 로고
    • A Robust Image Authentication Method Distinguishing JPEG Compression from Malicious Manipulation
    • Feb
    • C-Y. Lin and S-F. Chang, "A Robust Image Authentication Method Distinguishing JPEG Compression from Malicious Manipulation," IEEE Trans. on Circuits and Systems of Video Technology, Vol. 11, No. 2, pp. 153-168, Feb. 2001.
    • (2001) IEEE Trans. on Circuits and Systems of Video Technology , vol.11 , Issue.2 , pp. 153-168
    • Lin, C.-Y.1    Chang, S.-F.2
  • 3
    • 84944325291 scopus 로고    scopus 로고
    • An Extendible Hash for Multi-precision Similarity Querying of Image Databases
    • Roma, Italy
    • S. Lin, M. T. Ozsu, V. Oria and R. Ng, "An Extendible Hash for Multi-precision Similarity Querying of Image Databases," in Proceedings of 27th VLDB Conference, Roma, Italy, 2001.
    • (2001) Proceedings of 27th VLDB Conference
    • Lin, S.1    Ozsu, M.T.2    Oria, V.3    Ng, R.4
  • 5
    • 47849114125 scopus 로고    scopus 로고
    • Capturing Online Video Pirates - Can video fingerprinting and watermarking technology stop copyright violators?
    • Aug
    • W. Roush: "Capturing Online Video Pirates - Can video fingerprinting and watermarking technology stop copyright violators?" MIT Technology Review, Aug. 2006.
    • (2006) MIT Technology Review
    • Roush, W.1
  • 7
    • 13144275283 scopus 로고    scopus 로고
    • Statistical Invisibility for Collusion-resistant Digital Video Watermarking
    • Feb
    • K. Su, D. Kundur and D. Hatzinakos, "Statistical Invisibility for Collusion-resistant Digital Video Watermarking," IEEE Trans. on Multimedia, Vol. 7, No. 1, pp. 43-51, Feb. 2005.
    • (2005) IEEE Trans. on Multimedia , vol.7 , Issue.1 , pp. 43-51
    • Su, K.1    Kundur, D.2    Hatzinakos, D.3
  • 9
    • 0030409375 scopus 로고    scopus 로고
    • A Robust Content Based Digital Signature for Image Authentication
    • Sept
    • M. Schneider and S-F. Chang, "A Robust Content Based Digital Signature for Image Authentication," Proc. IEEE Int'l Conf. on Image Proc. (ICIP), Vol. 3, pp. 227-230, Sept. 1996.
    • (1996) Proc. IEEE Int'l Conf. on Image Proc. (ICIP) , vol.3 , pp. 227-230
    • Schneider, M.1    Chang, S.-F.2
  • 10
    • 85007375266 scopus 로고    scopus 로고
    • Towards Robust, Content Based Techniques for Image Authentication
    • Dec
    • M. P. Queluz, "Towards Robust, Content Based Techniques for Image Authentication," IEEE Workshop on Multimedia Signal Proc. (MMSP), pp. 297-302, Dec. 1998.
    • (1998) IEEE Workshop on Multimedia Signal Proc. (MMSP) , pp. 297-302
    • Queluz, M.P.1
  • 13
    • 0035362493 scopus 로고    scopus 로고
    • Approximate Image Message Authentication Codes
    • June
    • L. Xie, G. R. Arce and R. F. Graveman, "Approximate Image Message Authentication Codes," IEEE Trans. on Multimedia, Vol. 3, No. 2, pp. 242-252, June 2001.
    • (2001) IEEE Trans. on Multimedia , vol.3 , Issue.2 , pp. 242-252
    • Xie, L.1    Arce, G.R.2    Graveman, R.F.3
  • 20
    • 84890522850 scopus 로고
    • Communication Theory of Secrecy Systems
    • C. E. Shannon, "Communication Theory of Secrecy Systems," Bell System Technical Journal, Vol. 28-4, pp. 656-715, 1949.
    • (1949) Bell System Technical Journal , vol.28 -4 , pp. 656-715
    • Shannon, C.E.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.