메뉴 건너뛰기




Volumn , Issue , 2007, Pages 5661-5664

Evaluation of medical image watermarking with tamper detection and recovery (AW-TDR)

Author keywords

[No Author keywords available]

Indexed keywords

RECOVERY RATE; REGION OF INTEREST (ROI); TAMPER DETECTION AND RECOVERY (TDR);

EID: 57649174758     PISSN: 05891019     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/IEMBS.2007.4353631     Document Type: Conference Paper
Times cited : (16)

References (7)
  • 3
    • 0035248504 scopus 로고    scopus 로고
    • A Robust image authentication method distinguishing JPEG compression from malicious manipulation
    • Lin, C -. And Chang, S.-.,2001. A Robust image authentication method distinguishing JPEG compression from malicious manipulation. IEEE Transactions on Circuits and Systems for Video Technology,11(2),pp. 153-168.
    • (2001) IEEE Transactions on Circuits and Systems for Video Technology , vol.11 , Issue.2 , pp. 153-168
    • Lin, C.1    And Chang, S.2
  • 4
    • 0036611838 scopus 로고    scopus 로고
    • Hierarchical watermarking for secure image authentication with localization
    • Celik, M.U., Sharina, G., Tekalp, A.M., 2002. Hierarchical watermarking for secure image authentication with localization, IEEE Transactions on Image Processing,11(6), pp.585-594.
    • (2002) IEEE Transactions on Image Processing , vol.11 , Issue.6 , pp. 585-594
    • Celik, M.U.1    Sharina, G.2    Tekalp, A.M.3
  • 5
    • 0034140535 scopus 로고    scopus 로고
    • Fault resilient and compression tolerant digital signature for image authentication
    • Lou, D. C. and Liu, J. L., 2000. Fault resilient and compression tolerant digital signature for image authentication. IEEE Transactions on Consumer Electronics, 46(1),pp. 31-39.
    • (2000) IEEE Transactions on Consumer Electronics , vol.46 , Issue.1 , pp. 31-39
    • Lou, D.C.1    Liu, J.L.2
  • 7
    • 0033872149 scopus 로고    scopus 로고
    • Counterfeiting attacks on oblivious block-wise independent invisible watermarking schemes
    • M. Holliman, N. Memon, "Counterfeiting attacks on oblivious block-wise independent invisible watermarking schemes, IEEE Trans. Image Processing, 9(2000), pp. 432-441.
    • (2000) IEEE Trans. Image Processing , vol.9 , pp. 432-441
    • Holliman, M.1    Memon, N.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.