메뉴 건너뛰기




Volumn 36, Issue 2 PART 1, 2009, Pages 1300-1307

A fuzzy c-means clustering-based fragile watermarking scheme for image authentication

Author keywords

Fragile watermarking; Fuzzy c means clustering; Image authentication; Tamper detection

Indexed keywords

AUTHENTICATION; FUZZY SYSTEMS; IMAGE WATERMARKING;

EID: 56349129392     PISSN: 09574174     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.eswa.2007.11.018     Document Type: Article
Times cited : (105)

References (23)
  • 2
    • 0032308292 scopus 로고    scopus 로고
    • Bhattacharjee, S., & Kutter, M. (1998). Compression tolerant image authentication. In Proceedings of IEEE international conference on image processing (pp. 435-439).
    • Bhattacharjee, S., & Kutter, M. (1998). Compression tolerant image authentication. In Proceedings of IEEE international conference on image processing (pp. 435-439).
  • 4
    • 32644434350 scopus 로고    scopus 로고
    • A watermarking-based image ownership and tampering authentication scheme
    • Chang C.C., Hu Y.S., and Lu T.C. A watermarking-based image ownership and tampering authentication scheme. Pattern Recognition Letters 27 5 (2006) 439-446
    • (2006) Pattern Recognition Letters , vol.27 , Issue.5 , pp. 439-446
    • Chang, C.C.1    Hu, Y.S.2    Lu, T.C.3
  • 5
    • 85143190515 scopus 로고    scopus 로고
    • Eggers, J. J., & Girod, B. (2001). Blind watermarking applied to image authentication. In Proceedings of IEEE international conference on acoustics, speech and signal processing (pp. 1977-1980).
    • Eggers, J. J., & Girod, B. (2001). Blind watermarking applied to image authentication. In Proceedings of IEEE international conference on acoustics, speech and signal processing (pp. 1977-1980).
  • 6
    • 0034443602 scopus 로고    scopus 로고
    • Fridrich, J., Goljan, M., & Baldoza, A. C. (2000). New fragile authentication watermark for images. In Proceedings of IEEE international conference on image processing (pp. 446-449).
    • Fridrich, J., Goljan, M., & Baldoza, A. C. (2000). New fragile authentication watermark for images. In Proceedings of IEEE international conference on image processing (pp. 446-449).
  • 7
    • 0033872149 scopus 로고    scopus 로고
    • Counterfeiting attacks on oblivious block-wise independent invisible watermarking schemes
    • Holliman M., and Memon N. Counterfeiting attacks on oblivious block-wise independent invisible watermarking schemes. IEEE Transactions on Image Processing 9 3 (2000) 432-441
    • (2000) IEEE Transactions on Image Processing , vol.9 , Issue.3 , pp. 432-441
    • Holliman, M.1    Memon, N.2
  • 8
    • 0032648596 scopus 로고    scopus 로고
    • Kundur, D., & Hatzinakos, D. (1999) Digital watermarking for telltale tamper proofing and authentication. In Proceedings of the IEEE special issue on identification and protection of multimedia information (pp. 1167-1180).
    • Kundur, D., & Hatzinakos, D. (1999) Digital watermarking for telltale tamper proofing and authentication. In Proceedings of the IEEE special issue on identification and protection of multimedia information (pp. 1167-1180).
  • 9
    • 33947277938 scopus 로고    scopus 로고
    • Digital watermarking scheme exploiting nondeterministic dependence for image authentication
    • Li C.-T., and Yuan Y. Digital watermarking scheme exploiting nondeterministic dependence for image authentication. Optical Engineering 45 12 (2006) 127001
    • (2006) Optical Engineering , vol.45 , Issue.12 , pp. 127001
    • Li, C.-T.1    Yuan, Y.2
  • 10
    • 0033688392 scopus 로고    scopus 로고
    • Lin, C. Y., & Chang, S. F. (2000). Semi-fragile watermarking for authenticating JPEG visual content. In Proceedings of SPIE conference on security and watermarking of multimedia contents II (pp. 140-151).
    • Lin, C. Y., & Chang, S. F. (2000). Semi-fragile watermarking for authenticating JPEG visual content. In Proceedings of SPIE conference on security and watermarking of multimedia contents II (pp. 140-151).
  • 11
    • 56349163138 scopus 로고    scopus 로고
    • Lin, E. T., & Delp, E. J. (1999). A review of fragile image watermarks. In Proceedings of the ACM multimedia and security workshop (pp. 25-29).
    • Lin, E. T., & Delp, E. J. (1999). A review of fragile image watermarks. In Proceedings of the ACM multimedia and security workshop (pp. 25-29).
  • 12
    • 0033717154 scopus 로고    scopus 로고
    • Lin, E. T., Podilchuk, C. I., & Delp, E. J. (2000). Detection of image alterations using semi-fragile watermarks. In Proceedings of SPIE conference on security and watermarking of multimedia contents II (pp. 152-163).
    • Lin, E. T., Podilchuk, C. I., & Delp, E. J. (2000). Detection of image alterations using semi-fragile watermarks. In Proceedings of SPIE conference on security and watermarking of multimedia contents II (pp. 152-163).
  • 13
    • 25144448272 scopus 로고    scopus 로고
    • A hierarchical digital watermarking method for image tamper detection and recovery
    • Lin P.-L., Hsieh C.-K., and Huang P.-W. A hierarchical digital watermarking method for image tamper detection and recovery. Pattern Recognition 38 12 (2005) 2519-2529
    • (2005) Pattern Recognition , vol.38 , Issue.12 , pp. 2519-2529
    • Lin, P.-L.1    Hsieh, C.-K.2    Huang, P.-W.3
  • 14
    • 0035473830 scopus 로고    scopus 로고
    • Multipurpose watermarking for image authentication and protection
    • Lu C.-S., and Liao H.-Y. Multipurpose watermarking for image authentication and protection. IEEE Transactions on Image Processing 10 10 (2001) 1579-1592
    • (2001) IEEE Transactions on Image Processing , vol.10 , Issue.10 , pp. 1579-1592
    • Lu, C.-S.1    Liao, H.-Y.2
  • 19
    • 8344236008 scopus 로고    scopus 로고
    • Fragile image watermarking using a gradient image for improved localization and security
    • Suthaharan S. Fragile image watermarking using a gradient image for improved localization and security. Pattern Recognition Letters 25 16 (2004) 1893-1903
    • (2004) Pattern Recognition Letters , vol.25 , Issue.16 , pp. 1893-1903
    • Suthaharan, S.1
  • 20
    • 0032312612 scopus 로고    scopus 로고
    • Wong, P. W. (1998). A public key watermark for image verification and authentication. In Proceedings of IEEE international conference on image processing (pp. 455-459).
    • Wong, P. W. (1998). A public key watermark for image verification and authentication. In Proceedings of IEEE international conference on image processing (pp. 455-459).
  • 21
    • 0035473831 scopus 로고    scopus 로고
    • Secret and public key image watermarking schemes for image authentication and ownership verification
    • Wong P.W., and Memon N. Secret and public key image watermarking schemes for image authentication and ownership verification. IEEE Transactions on Image Processing 10 10 (2001) 1593-1601
    • (2001) IEEE Transactions on Image Processing , vol.10 , Issue.10 , pp. 1593-1601
    • Wong, P.W.1    Memon, N.2
  • 22
    • 0032292342 scopus 로고    scopus 로고
    • Wu, M., & Liu, B. (1998). Watermarking for image authentication. In Proceedings of IEEE international conference on image processing (pp. 437-441).
    • Wu, M., & Liu, B. (1998). Watermarking for image authentication. In Proceedings of IEEE international conference on image processing (pp. 437-441).
  • 23
    • 0031378592 scopus 로고    scopus 로고
    • Yeung, M., & Mintzer, F. (1997). An invisible watermarking technique for image verification. In Proceedings of IEEE international conference on image processing (pp. 680-683).
    • Yeung, M., & Mintzer, F. (1997). An invisible watermarking technique for image verification. In Proceedings of IEEE international conference on image processing (pp. 680-683).


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.