메뉴 건너뛰기




Volumn E91-D, Issue 1, 2008, Pages 54-61

A color image authentication method using partitioned palette and Morphological operations

Author keywords

Image authentication; Morphological operation; Palette; Tamper proofing

Indexed keywords

COLOR; MATHEMATICAL MORPHOLOGY;

EID: 61449136709     PISSN: 09168532     EISSN: 17451361     Source Type: Journal    
DOI: 10.1093/ietisy/e91-d.1.54     Document Type: Article
Times cited : (10)

References (18)
  • 1
    • 0742288850 scopus 로고    scopus 로고
    • A watermarking scheme based on principal component analysis technique
    • C. C. Chang and C. S. Chan, "A watermarking scheme based on principal component analysis technique," Informatica, vol. 14, no. 4, pp. 431-444, 2003.
    • (2003) Informatica , vol.14 , Issue.4 , pp. 431-444
    • Chang, C.C.1    Chan, C.S.2
  • 2
    • 0036611838 scopus 로고    scopus 로고
    • Hierarchical water-marking for secure image authentication with localization
    • M. U. Celik, G. Sharmar, and A. M. Tekalp, "Hierarchical water-marking for secure image authentication with localization," IEEE Trans. Image Process., vol. 11, no. 6, pp. 585-594, 2002.
    • (2002) IEEE Trans. Image Process , vol.11 , Issue.6 , pp. 585-594
    • Celik, M.U.1    Sharmar, G.2    Tekalp, A.M.3
  • 3
    • 0021412027 scopus 로고
    • Vector quantization
    • R. M. Gray, "Vector quantization," IEEE ASSP Mag., vol. 1, no. 1, pp. 4-29, 1984.
    • (1984) IEEE ASSP Mag , vol.1 , Issue.1 , pp. 4-29
    • Gray, R.M.1
  • 4
    • 0000335798 scopus 로고    scopus 로고
    • Digital watermarking of images using neural networks
    • M. S. Hwang, C. C. Chang, and K. F. Hwang, "Digital watermarking of images using neural networks," J. Electron. Imaging, vol. 9, no. 4, pp. 548-555, 2000.
    • (2000) J. Electron. Imaging , vol.9 , Issue.4 , pp. 548-555
    • Hwang, M.S.1    Chang, C.C.2    Hwang, K.F.3
  • 5
    • 0036616689 scopus 로고    scopus 로고
    • A digital image watermarking scheme on vector quantisation
    • June
    • M. Jo and H. Kim, "A digital image watermarking scheme on vector quantisation," IEICE Trans. Inf. & Syst., vol. E85-D, no. 6, pp. 1054-1056, June 2002.
    • (2002) IEICE Trans. Inf. & Syst , vol.E85-D , Issue.6 , pp. 1054-1056
    • Jo, M.1    Kim, H.2
  • 6
    • 23844453141 scopus 로고    scopus 로고
    • Watermarking text document images using edge direction histograms
    • Y. W. Kim and I. S. Oh, "Watermarking text document images using edge direction histograms," Pattern Recognit. Lett., vol. 25, no. 11, pp. 1243-1251, 2004.
    • (2004) Pattern Recognit. Lett , vol.25 , Issue.11 , pp. 1243-1251
    • Kim, Y.W.1    Oh, I.S.2
  • 7
    • 0018918171 scopus 로고
    • An algorithm for vector quantizer design
    • Y. Linde, A. Buzo, and R. M. Gray, "An algorithm for vector quantizer design," IEEE Trans. Commun., vol. 28, no. 1, pp. 84-95, 1980.
    • (1980) IEEE Trans. Commun , vol.28 , Issue.1 , pp. 84-95
    • Linde, Y.1    Buzo, A.2    Gray, R.M.3
  • 8
    • 0035248504 scopus 로고    scopus 로고
    • A robust image authentication method distinguishing JPEG compression from malicious manipulation
    • C. Y. Lin and S. F. Chang, "A robust image authentication method distinguishing JPEG compression from malicious manipulation," IEEE Trans. Circuits Syst. Video Technol., vol. 11, no. 2, pp. 153-168, 2001.
    • (2001) IEEE Trans. Circuits Syst. Video Technol , vol.11 , Issue.2 , pp. 153-168
    • Lin, C.Y.1    Chang, S.F.2
  • 9
    • 25144448272 scopus 로고    scopus 로고
    • A hierarchical digital water-marking method for image tamper detection and recovery
    • P. L. Lin, C. K. Hsieh, and P. W. Huang, "A hierarchical digital water-marking method for image tamper detection and recovery," Pattern Recognit., vol. 38, no. 11, pp. 2519-2529, 2005.
    • (2005) Pattern Recognit , vol.38 , Issue.11 , pp. 2519-2529
    • Lin, P.L.1    Hsieh, C.K.2    Huang, P.W.3
  • 10
    • 0034140535 scopus 로고    scopus 로고
    • Fault resilient and compression tolerant digital signature for image authentication
    • D. C. Lou and J. L. Liu, "Fault resilient and compression tolerant digital signature for image authentication," IEEE Trans. Consum. Electron., vol. 46, no. 1, pp. 31-39, 2000.
    • (2000) IEEE Trans. Consum. Electron , vol.46 , Issue.1 , pp. 31-39
    • Lou, D.C.1    Liu, J.L.2
  • 11
    • 0037818310 scopus 로고    scopus 로고
    • Structural digital signature for image authentication: An incidental distortion resistant scheme
    • C. S. Lu and H. Y. Liao, "Structural digital signature for image authentication: An incidental distortion resistant scheme," IEEE Trans. Multimed., vol. 5, no. 2, pp. 161-173, 2003.
    • (2003) IEEE Trans. Multimed , vol.5 , Issue.2 , pp. 161-173
    • Lu, C.S.1    Liao, H.Y.2
  • 12
    • 33750303836 scopus 로고    scopus 로고
    • An efficient image authentication method based on hamming code
    • C. S. Chan and C. C. Chang, "An efficient image authentication method based on hamming code," Pattern Recognit., vol. 40, no. 2, pp. 681-690, 2006.
    • (2006) Pattern Recognit , vol.40 , Issue.2 , pp. 681-690
    • Chan, C.S.1    Chang, C.C.2
  • 13
    • 0036556071 scopus 로고    scopus 로고
    • Combinational image watermarking in the spatial and frequency domains
    • F. Y. Shih and S. Y. T. Wu, "Combinational image watermarking in the spatial and frequency domains," Pattern Recognit., vol. 36, no. 4, pp. 969-975, 2003.
    • (2003) Pattern Recognit , vol.36 , Issue.4 , pp. 969-975
    • Shih, F.Y.1    Wu, S.Y.T.2
  • 14
    • 0142029533 scopus 로고    scopus 로고
    • Using set partitioning in hierarchical trees to authenticate digital image
    • P. Y. Tsai, Y. C. Hu, and C. C. Chang, "Using set partitioning in hierarchical trees to authenticate digital image," Signal Process., Image Commun., vol. 18, no. 9, pp. 813-822, 2003.
    • (2003) Signal Process., Image Commun , vol.18 , Issue.9 , pp. 813-822
    • Tsai, P.Y.1    Hu, Y.C.2    Chang, C.C.3
  • 15
    • 0345356532 scopus 로고    scopus 로고
    • A color image watermarking scheme based on color quantization
    • P. Y. Tsai, Y. C. Hu, and C. C. Chang, "A color image watermarking scheme based on color quantization," Signal Process., vol. 84, no. 4, pp. 95-106, 2004.
    • (2004) Signal Process , vol.84 , Issue.4 , pp. 95-106
    • Tsai, P.Y.1    Hu, Y.C.2    Chang, C.C.3
  • 16
    • 0035473831 scopus 로고    scopus 로고
    • Secret and public key image water-marking schemes for image authentication and ownership verification
    • P. W. Wong and N. Memon, "Secret and public key image water-marking schemes for image authentication and ownership verification," IEEE Trans. Image Process., vol. 10, no. 10, pp. 1593-1601, 2001.
    • (2001) IEEE Trans. Image Process , vol.10 , Issue.10 , pp. 1593-1601
    • Wong, P.W.1    Memon, N.2
  • 17
    • 12344332735 scopus 로고    scopus 로고
    • An adjusted-purpose digital watermarking technique
    • Y. T. Wu and Y. F. Shih, "An adjusted-purpose digital watermarking technique," Pattern Recognit., vol. 37, no. 12, pp. 2349-2359, 2004.
    • (2004) Pattern Recognit , vol.37 , Issue.12 , pp. 2349-2359
    • Wu, Y.T.1    Shih, Y.F.2
  • 18
    • 3042638288 scopus 로고    scopus 로고
    • A combined approach to integrity protection and verification of palette images using fragile water-marks and digital signatures
    • June
    • C. H. Tzeng and W. H. Tsai, "A combined approach to integrity protection and verification of palette images using fragile water-marks and digital signatures," IEICE Trans. Fundamentals, vol. E87-A, no. 6, pp. 1612-1619, June 2004.
    • (2004) IEICE Trans. Fundamentals , vol.E87-A , Issue.6 , pp. 1612-1619
    • Tzeng, C.H.1    Tsai, W.H.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.