메뉴 건너뛰기




Volumn E90-B, Issue 11, 2007, Pages 3259-3262

A new binary image authentication scheme with small distortion and low false negative rates

Author keywords

Binary image; Fragile watermarking; Image authentication; Multimedia security

Indexed keywords

AUTHENTICATION; BINS;

EID: 58449112847     PISSN: 09168516     EISSN: 17451345     Source Type: Journal    
DOI: 10.1093/ietcom/e90-b.11.3259     Document Type: Article
Times cited : (4)

References (10)
  • 2
    • 0141953943 scopus 로고    scopus 로고
    • A new approach to authentication of binary images for multimedia communication with distortion reduction and security enhancement
    • Sept
    • C. Tzeng and W. Tsai, "A new approach to authentication of binary images for multimedia communication with distortion reduction and security enhancement," IEEE Commun. Lett., vol. 7, no. 9, pp. 443-445, Sept. 2003.
    • (2003) IEEE Commun. Lett , vol.7 , Issue.9 , pp. 443-445
    • Tzeng, C.1    Tsai, W.2
  • 3
    • 12344293379 scopus 로고    scopus 로고
    • A secure authentication watermarking for halftone and binary images
    • H. Kim and A. Afif, "A secure authentication watermarking for halftone and binary images," Int. J. Imaging Syst. Technol., vol. 14, no. 4, pp. 147-152, 2004.
    • (2004) Int. J. Imaging Syst. Technol , vol.14 , Issue.4 , pp. 147-152
    • Kim, H.1    Afif, A.2
  • 4
    • 85027184013 scopus 로고    scopus 로고
    • NIST Special Publication 800-57. (2006, May). Recommendation for Key Management-Part 1: General (Revised).
    • NIST Special Publication 800-57. (2006, May). Recommendation for Key Management-Part 1: General (Revised).
  • 5
    • 85027104076 scopus 로고    scopus 로고
    • Available
    • [Online]. Available: http://csrc.nist.gov/publications/nistpubs/800-57/ SP800-57-Part1.pdf
  • 6
    • 33749597759 scopus 로고    scopus 로고
    • A new public-key authentication watermarking for binary document images resistant to parity checks
    • H. Kim, "A new public-key authentication watermarking for binary document images resistant to parity checks," Proc. IEEE International Conference on Image Processing (ICIP), vol. 2, pp. 1074-1077, 2005.
    • (2005) Proc. IEEE International Conference on Image Processing (ICIP) , vol.2 , pp. 1074-1077
    • Kim, H.1
  • 7
    • 33645695834 scopus 로고    scopus 로고
    • Some notes on steganography
    • posted on Steganography Mailing List
    • R. Crandall, "Some notes on steganography," posted on Steganography Mailing List, 1998.
    • (1998)
    • Crandall, R.1
  • 8
    • 84937814312 scopus 로고    scopus 로고
    • High capacity despite better steganalysis (F5-A steganographic algorithm)
    • Proc. Information Hiding. 4th International Workshop, Springer-Verlag
    • A. Westfeld, "High capacity despite better steganalysis (F5-A steganographic algorithm)," Proc. Information Hiding. 4th International Workshop. LNCS, vol. 2137, pp. 289-302, Springer-Verlag, 2001.
    • (2001) LNCS , vol.2137 , pp. 289-302
    • Westfeld, A.1
  • 9
    • 3242759877 scopus 로고    scopus 로고
    • Data hiding in binary images for authentication and annotation
    • Aug
    • M. Wu and B. Liu, "Data hiding in binary images for authentication and annotation," IEEE Trans. Multimed., vol. 6, no. 4, pp. 528-538, Aug. 2004.
    • (2004) IEEE Trans. Multimed , vol.6 , Issue.4 , pp. 528-538
    • Wu, M.1    Liu, B.2
  • 10
    • 33748096430 scopus 로고    scopus 로고
    • Matrix embedding for large payload
    • Information Forensics and Security, Sept
    • J. Fridrich and D. Soukal, "Matrix embedding for large payload," IEEE Trans. Information Forensics and Security, vol. 1, no. 3, pp. 390-395, Sept. 2006.
    • (2006) IEEE Trans , vol.1 , Issue.3 , pp. 390-395
    • Fridrich, J.1    Soukal, D.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.