메뉴 건너뛰기




Volumn 5284 LNCS, Issue , 2008, Pages 147-160

Block-chain based fragile watermarking scheme with superior localization

Author keywords

Block chain; False acceptance rate; False rejection rate; Fragile watermarking; Security strength

Indexed keywords

WATERMARKING;

EID: 56749105694     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-540-88961-8_11     Document Type: Conference Paper
Times cited : (25)

References (17)
  • 1
    • 33749166906 scopus 로고    scopus 로고
    • Multiscale fragile watermarking based on the Gaussian mixture model
    • Yuan, H., Zhang, X.-P.: Multiscale fragile watermarking based on the Gaussian mixture model. IEEE Trans. Image process 15(10), 3189-3200 (2006)
    • (2006) IEEE Trans. Image process , vol.15 , Issue.10 , pp. 3189-3200
    • Yuan, H.1    Zhang, X.-P.2
  • 2
    • 0032312612 scopus 로고    scopus 로고
    • A public key watermark for image verification and authentication
    • Chicago, IL, pp
    • Wong, P.: A public key watermark for image verification and authentication. In: Proc. IEEE Int. Conf. Image Process., Chicago, IL, pp. 425-429 (1998)
    • (1998) Proc. IEEE Int. Conf. Image Process , pp. 425-429
    • Wong, P.1
  • 3
    • 0033872149 scopus 로고    scopus 로고
    • Counterfeiting attacks on oblivious block-wise independent invisible watermarking schemes
    • Holliman, H., Memon, N.: Counterfeiting attacks on oblivious block-wise independent invisible watermarking schemes. IEEE Trans. Image Process 9(3), 432-441 (2000)
    • (2000) IEEE Trans. Image Process , vol.9 , Issue.3 , pp. 432-441
    • Holliman, H.1    Memon, N.2
  • 4
    • 0036530306 scopus 로고    scopus 로고
    • Cryptanalysis of the Yeung-Mintzer fragile watermarking technique
    • Fridrich, J., Goljan, M., Memon, N.: Cryptanalysis of the Yeung-Mintzer fragile watermarking technique. J. Electronic Imaging 11, 262-274 (2002)
    • (2002) J. Electronic Imaging , vol.11 , pp. 262-274
    • Fridrich, J.1    Goljan, M.2    Memon, N.3
  • 5
    • 0035473831 scopus 로고    scopus 로고
    • Secret and public key image watermarking schemes for image authentication and ownership verification
    • Wong, P., Memon, N.: Secret and public key image watermarking schemes for image authentication and ownership verification. IEEE Trans. Image Process. 10, 1593-1601 (2001)
    • (2001) IEEE Trans. Image Process , vol.10 , pp. 1593-1601
    • Wong, P.1    Memon, N.2
  • 6
    • 0036030626 scopus 로고    scopus 로고
    • Security of fragile authentication watermarks with localization
    • San Jose, CA, January
    • Fridrich, J.: Security of fragile authentication watermarks with localization. In: Proc. SPIE. Security and Watermarking of Multimedia Contents, San Jose, CA, vol. 4675, pp. 691-700 (January 2002)
    • (2002) Proc. SPIE. Security and Watermarking of Multimedia Contents , vol.4675 , pp. 691-700
    • Fridrich, J.1
  • 7
    • 0036611838 scopus 로고    scopus 로고
    • Hierarchical watermarking for secure image authentication with localization
    • Celik, M., Sharma, G., Saber, E., Tekalp, A.M.: Hierarchical watermarking for secure image authentication with localization. IEEE Trans. Image Process. 11(6), 585-595 (2002)
    • (2002) IEEE Trans. Image Process , vol.11 , Issue.6 , pp. 585-595
    • Celik, M.1    Sharma, G.2    Saber, E.3    Tekalp, A.M.4
  • 8
    • 0036544390 scopus 로고    scopus 로고
    • Barreto, P., Kim, H., Rijmen, V.: Toward secure public-key block-wise fragile authentication watermarking. IEE Proc. -Vision, Image and Signal Process. 149(2), 57-62 (2002)
    • Barreto, P., Kim, H., Rijmen, V.: Toward secure public-key block-wise fragile authentication watermarking. IEE Proc. -Vision, Image and Signal Process. 149(2), 57-62 (2002)
  • 9
    • 8344236008 scopus 로고    scopus 로고
    • Fragile image watermarking using a gradient image for improved localization and security
    • Suthaharan, S.: Fragile image watermarking using a gradient image for improved localization and security. Pattern Recognition Letters 25, 1893-1903 (2004)
    • (2004) Pattern Recognition Letters , vol.25 , pp. 1893-1903
    • Suthaharan, S.1
  • 10
    • 0042823352 scopus 로고    scopus 로고
    • Secure hybrid robust watermarking resistant against tampering and copy attack
    • Deguillaume, F., Voloshynovskiy, S., Pun, T.: Secure hybrid robust watermarking resistant against tampering and copy attack. Signal Process 83, 2133-2170 (2003)
    • (2003) Signal Process , vol.83 , pp. 2133-2170
    • Deguillaume, F.1    Voloshynovskiy, S.2    Pun, T.3
  • 11
    • 34548064855 scopus 로고    scopus 로고
    • Reversible image watermarking based on integer-to-integer wavelet transform
    • Lee, S., Yoo, C.D., Kalker, T.: Reversible image watermarking based on integer-to-integer wavelet transform. IEEE Trans. Inf. forensics security 2(3), 321-330 (2007)
    • (2007) IEEE Trans. Inf. forensics security , vol.2 , Issue.3 , pp. 321-330
    • Lee, S.1    Yoo, C.D.2    Kalker, T.3
  • 12
    • 25144448272 scopus 로고    scopus 로고
    • A hierarchical digital watermarking method for image tamper detection and recovery
    • Lin, P.L., Hsieh, C.K., Huang, P.W.: A hierarchical digital watermarking method for image tamper detection and recovery. Pattern Recognition 38(12), 2519-2529 (2005)
    • (2005) Pattern Recognition , vol.38 , Issue.12 , pp. 2519-2529
    • Lin, P.L.1    Hsieh, C.K.2    Huang, P.W.3
  • 13
    • 34548765996 scopus 로고    scopus 로고
    • Statistical fragile watermarking capable of locating individual tampered pixels
    • Zhang, X., Wang, S.: Statistical fragile watermarking capable of locating individual tampered pixels. IEEE Signal Process. Lett. 14(10), 727-731 (2007)
    • (2007) IEEE Signal Process. Lett , vol.14 , Issue.10 , pp. 727-731
    • Zhang, X.1    Wang, S.2
  • 14
    • 56749091354 scopus 로고    scopus 로고
    • He, H.J., Zhang, J.S., Wang, H.X.: Synchronous counterfeiting attacks on self-embedding watermarking schemes. Intern. J. Comput. Sci. Network Security 6(1), 251-257 (2006)
    • He, H.J., Zhang, J.S., Wang, H.X.: Synchronous counterfeiting attacks on self-embedding watermarking schemes. Intern. J. Comput. Sci. Network Security 6(1), 251-257 (2006)
  • 15
    • 0033309988 scopus 로고    scopus 로고
    • Images with self-correcting capabilities
    • Kobe, Japan, October 25-28
    • Fridrich, J., Goljan, M.: Images with self-correcting capabilities. In: Proc. ICIP 1999, Kobe, Japan, October 25-28 (1999)
    • (1999) Proc. ICIP
    • Fridrich, J.1    Goljan, M.2
  • 16
    • 12344315777 scopus 로고    scopus 로고
    • Security of an ill-posed operator for image authentication
    • Wu, Y., Deng, R.H.: Security of an ill-posed operator for image authentication. IEEE Trans. Circuits Syst. Video Technol. 15(1), 161-163 (2005)
    • (2005) IEEE Trans. Circuits Syst. Video Technol , vol.15 , Issue.1 , pp. 161-163
    • Wu, Y.1    Deng, R.H.2
  • 17
    • 33845423997 scopus 로고    scopus 로고
    • He, H., Zhang, J., Tai, H.-M.: A wavelet-based fragile watermarking scheme for secure image authentication. In: Shi, Y.Q., Jeon, B. (eds.) IWDW 2006. LNCS, 4283, pp. 422-432. Springer, Heidelberg (2006)
    • He, H., Zhang, J., Tai, H.-M.: A wavelet-based fragile watermarking scheme for secure image authentication. In: Shi, Y.Q., Jeon, B. (eds.) IWDW 2006. LNCS, vol. 4283, pp. 422-432. Springer, Heidelberg (2006)


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.