메뉴 건너뛰기




Volumn 41, Issue 11, 2008, Pages 3493-3496

Tampering with a watermarking-based image authentication scheme

Author keywords

Digital rights management; Encoding; Image authentication; Information hiding; Ownership; Tampering; Watermarking

Indexed keywords

ACCESS CONTROL; AUTHENTICATION; FEATURE EXTRACTION; IMAGE COMPRESSION; PAPERMAKING; PATTERN RECOGNITION;

EID: 48149104075     PISSN: 00313203     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.patcog.2008.05.009     Document Type: Article
Times cited : (33)

References (25)
  • 1
    • 48149099153 scopus 로고    scopus 로고
    • P.S.L.M. Barreto, H.Y. Kim, V. Rijmen, Toward secure public-key blockwise fragile authentication watermarking, in: IEE Proceedings-Vision, Image, and Signal Processing, vol. 27(5), 2006, pp. 439-446.
    • P.S.L.M. Barreto, H.Y. Kim, V. Rijmen, Toward secure public-key blockwise fragile authentication watermarking, in: IEE Proceedings-Vision, Image, and Signal Processing, vol. 27(5), 2006, pp. 439-446.
  • 2
    • 33750969337 scopus 로고    scopus 로고
    • Joint near-lossless compression and watermarking of still images for authentication and tamper localization
    • Caldelli R., Filippini F., and Barni M. Joint near-lossless compression and watermarking of still images for authentication and tamper localization. Signal Process. Image Commun. 21 10 (2006) 890-903
    • (2006) Signal Process. Image Commun. , vol.21 , Issue.10 , pp. 890-903
    • Caldelli, R.1    Filippini, F.2    Barni, M.3
  • 3
    • 0036611838 scopus 로고    scopus 로고
    • Hierarchical watermarking for secure image authentication with localization
    • Celik M.U., Sharma G., Saber E., and Tekalp A.M. Hierarchical watermarking for secure image authentication with localization. IEEE Trans. Image Process. 11 6 (2002) 585-595
    • (2002) IEEE Trans. Image Process. , vol.11 , Issue.6 , pp. 585-595
    • Celik, M.U.1    Sharma, G.2    Saber, E.3    Tekalp, A.M.4
  • 4
    • 34848926024 scopus 로고    scopus 로고
    • Four-scanning attack on hierarchical digital watermarking method for image tamper detection and recovery
    • Chang C.-C., Fan Y.-H., and Tai W.-L. Four-scanning attack on hierarchical digital watermarking method for image tamper detection and recovery. Pattern Recognition 41 2 (2008) 654-661
    • (2008) Pattern Recognition , vol.41 , Issue.2 , pp. 654-661
    • Chang, C.-C.1    Fan, Y.-H.2    Tai, W.-L.3
  • 5
    • 32644434350 scopus 로고    scopus 로고
    • A watermarking-based image ownership and tampering authentication scheme
    • Chang C.-C., Hu Y.-S., and Lu T.-C. A watermarking-based image ownership and tampering authentication scheme. Pattern Recognition Lett. 27 5 (2006) 439-446
    • (2006) Pattern Recognition Lett. , vol.27 , Issue.5 , pp. 439-446
    • Chang, C.-C.1    Hu, Y.-S.2    Lu, T.-C.3
  • 6
    • 0036489322 scopus 로고    scopus 로고
    • A data-hiding technique with authentication, integration, and confidentiality for electronic patient records
    • Chao H.M., Hsu C.M., and Miaou S.G. A data-hiding technique with authentication, integration, and confidentiality for electronic patient records. IEEE Trans. Inf. Technol. Biomed. 6 1 (2002) 46-53
    • (2002) IEEE Trans. Inf. Technol. Biomed. , vol.6 , Issue.1 , pp. 46-53
    • Chao, H.M.1    Hsu, C.M.2    Miaou, S.G.3
  • 7
    • 10644225222 scopus 로고    scopus 로고
    • A robust watermarking scheme using phase shift keying with the combination of amplitude boost and low amplitude block selection
    • Chen W.-Y., and Chen C.-H. A robust watermarking scheme using phase shift keying with the combination of amplitude boost and low amplitude block selection. Pattern Recognition 38 4 (2005) 587-598
    • (2005) Pattern Recognition , vol.38 , Issue.4 , pp. 587-598
    • Chen, W.-Y.1    Chen, C.-H.2
  • 8
    • 0032074580 scopus 로고    scopus 로고
    • Resolving rightful ownership with invisible watermarking techniques: limitations, attacks, and implications
    • Craver S., Memon N., Yeo B.-L., and Yeung M.M. Resolving rightful ownership with invisible watermarking techniques: limitations, attacks, and implications. IEEE J. Sel. Areas Commun. 16 4 (1998) 573-586
    • (1998) IEEE J. Sel. Areas Commun. , vol.16 , Issue.4 , pp. 573-586
    • Craver, S.1    Memon, N.2    Yeo, B.-L.3    Yeung, M.M.4
  • 9
    • 34250863233 scopus 로고    scopus 로고
    • Speaker identification security improvement by means of speech watermarking
    • Faundez-Zanuy M., Hagmuller M., and Kubin G. Speaker identification security improvement by means of speech watermarking. Pattern Recognition 40 11 (2007) 3027-3034
    • (2007) Pattern Recognition , vol.40 , Issue.11 , pp. 3027-3034
    • Faundez-Zanuy, M.1    Hagmuller, M.2    Kubin, G.3
  • 10
    • 25144524731 scopus 로고    scopus 로고
    • Quickly tracing detection for spread spectrum watermark based on effect estimation of the affine transform
    • Feng G.-R., Jiang L.-G., Wang D.-J., and He C. Quickly tracing detection for spread spectrum watermark based on effect estimation of the affine transform. Pattern Recognition 38 12 (2005) 2530-2536
    • (2005) Pattern Recognition , vol.38 , Issue.12 , pp. 2530-2536
    • Feng, G.-R.1    Jiang, L.-G.2    Wang, D.-J.3    He, C.4
  • 11
    • 33845427446 scopus 로고    scopus 로고
    • A novel image watermarking scheme based on amplitude attack
    • Hsieh C.-H., and Liao C.-J. A novel image watermarking scheme based on amplitude attack. Pattern Recognition 40 4 (2007) 1342-1354
    • (2007) Pattern Recognition , vol.40 , Issue.4 , pp. 1342-1354
    • Hsieh, C.-H.1    Liao, C.-J.2
  • 12
    • 34547699505 scopus 로고    scopus 로고
    • Fusion of color edge detection and color quantization for color image watermarking using principal axes analysis
    • Kuo C.-T., and Cheng S.-C. Fusion of color edge detection and color quantization for color image watermarking using principal axes analysis. Pattern Recognition 40 12 (2007) 3691-3704
    • (2007) Pattern Recognition , vol.40 , Issue.12 , pp. 3691-3704
    • Kuo, C.-T.1    Cheng, S.-C.2
  • 13
    • 0035372202 scopus 로고    scopus 로고
    • Lossless image compression and encryption using SCAN
    • Maniccam S.S., and Bourbakis N. Lossless image compression and encryption using SCAN. Pattern Recognition 34 6 (2001) 1229-1245
    • (2001) Pattern Recognition , vol.34 , Issue.6 , pp. 1229-1245
    • Maniccam, S.S.1    Bourbakis, N.2
  • 14
    • 0348108146 scopus 로고    scopus 로고
    • Lossless compression and information hiding in images
    • Maniccam S.S., and Bourbakis N. Lossless compression and information hiding in images. Pattern Recognition 37 3 (2004) 475-486
    • (2004) Pattern Recognition , vol.37 , Issue.3 , pp. 475-486
    • Maniccam, S.S.1    Bourbakis, N.2
  • 15
    • 10044224284 scopus 로고    scopus 로고
    • Secure semi-blind watermarking based on iteration mapping and image features
    • Ni R., Ruan Q., and Cheng H.D. Secure semi-blind watermarking based on iteration mapping and image features. Pattern Recognition 38 3 (2005) 357-368
    • (2005) Pattern Recognition , vol.38 , Issue.3 , pp. 357-368
    • Ni, R.1    Ruan, Q.2    Cheng, H.D.3
  • 16
    • 2442530553 scopus 로고    scopus 로고
    • Localized image watermarking based on feature points of scale-space representation
    • Seo J.S., Chang C.D., and Yoo D. Localized image watermarking based on feature points of scale-space representation. Pattern Recognition 37 7 (2004) 1365-1375
    • (2004) Pattern Recognition , vol.37 , Issue.7 , pp. 1365-1375
    • Seo, J.S.1    Chang, C.D.2    Yoo, D.3
  • 17
    • 33845397101 scopus 로고    scopus 로고
    • A robust associative watermarking technique based on similarity diagrams
    • Shen J.-J., and Hsu P.-W. A robust associative watermarking technique based on similarity diagrams. Pattern Recognition 40 4 (2007) 1355-1367
    • (2007) Pattern Recognition , vol.40 , Issue.4 , pp. 1355-1367
    • Shen, J.-J.1    Hsu, P.-W.2
  • 18
    • 34848924292 scopus 로고    scopus 로고
    • Automatic image authentication and recovery using fractal code embedding and image inpainting
    • Wang S.-S., and Tsai S.-L. Automatic image authentication and recovery using fractal code embedding and image inpainting. Pattern Recognition 41 2 (2008) 701-712
    • (2008) Pattern Recognition , vol.41 , Issue.2 , pp. 701-712
    • Wang, S.-S.1    Tsai, S.-L.2
  • 19
    • 12344332735 scopus 로고    scopus 로고
    • An adjusted-purpose digital watermarking technique
    • Wu Y.-T., and Shih F.Y. An adjusted-purpose digital watermarking technique. Pattern Recognition 37 12 (2004) 2349-2359
    • (2004) Pattern Recognition , vol.37 , Issue.12 , pp. 2349-2359
    • Wu, Y.-T.1    Shih, F.Y.2
  • 20
    • 34547662251 scopus 로고    scopus 로고
    • Digital watermarking based on chaotic map and reference register
    • Wu Y.-T., and Shih F.Y. Digital watermarking based on chaotic map and reference register. Pattern Recognition 40 12 (2007) 3753-3763
    • (2007) Pattern Recognition , vol.40 , Issue.12 , pp. 3753-3763
    • Wu, Y.-T.1    Shih, F.Y.2
  • 21
    • 34547663506 scopus 로고    scopus 로고
    • Circularly orthogonal moments for geometrically robust image watermarking
    • Xin Y., Liao S., and Pawlak M. Circularly orthogonal moments for geometrically robust image watermarking. Pattern Recognition 40 12 (2007) 3740-3752
    • (2007) Pattern Recognition , vol.40 , Issue.12 , pp. 3740-3752
    • Xin, Y.1    Liao, S.2    Pawlak, M.3
  • 22
    • 33244461499 scopus 로고    scopus 로고
    • Multiresolution fragile watermarking using complex chirp signals for content authentication
    • Yu D., Sattar F., and Barkat B. Multiresolution fragile watermarking using complex chirp signals for content authentication. Pattern Recognition 39 5 (2006) 935-952
    • (2006) Pattern Recognition , vol.39 , Issue.5 , pp. 935-952
    • Yu, D.1    Sattar, F.2    Barkat, B.3
  • 23
    • 18544365818 scopus 로고    scopus 로고
    • PCA-based watermarking scheme for tamper-proof of web pages
    • Zhao Q., and Lu H. PCA-based watermarking scheme for tamper-proof of web pages. Pattern Recognition 38 8 (2005) 1321-1323
    • (2005) Pattern Recognition , vol.38 , Issue.8 , pp. 1321-1323
    • Zhao, Q.1    Lu, H.2
  • 24
    • 33845400381 scopus 로고    scopus 로고
    • PCA-based web page watermarking
    • Zhao Q., and Lu H. PCA-based web page watermarking. Pattern Recognition 40 4 (2007) 1334-1341
    • (2007) Pattern Recognition , vol.40 , Issue.4 , pp. 1334-1341
    • Zhao, Q.1    Lu, H.2
  • 25
    • 34249908633 scopus 로고    scopus 로고
    • A new semi-fragile image watermarking with robust tampering restoration using irregular sampling
    • Zhu X., Ho A.T.S., and Marziliano P. A new semi-fragile image watermarking with robust tampering restoration using irregular sampling. Signal Process. Image Commun. 22 5 (2007) 515-528
    • (2007) Signal Process. Image Commun. , vol.22 , Issue.5 , pp. 515-528
    • Zhu, X.1    Ho, A.T.S.2    Marziliano, P.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.