메뉴 건너뛰기




Volumn 4, Issue 11, 2008, Pages 3005-3026

Multiple watermarking based on visual secret sharing

Author keywords

Digital wavelet transform; Discrete fourier transform; Multiple watermarking; Publicly verifiable; Visual secret sharing

Indexed keywords


EID: 63549090936     PISSN: 13494198     EISSN: None     Source Type: Journal    
DOI: None     Document Type: Article
Times cited : (34)

References (32)
  • 1
    • 0032760474 scopus 로고    scopus 로고
    • Protecting digital-image copyrights: A framework
    • G. Voyatzis and I. Pitas, Protecting digital-image copyrights: A framework, IEEE Computer Graphics and Applications, vol. 19, no. 1, pp. 18-24, 1999.
    • (1999) IEEE Computer Graphics and Applications , vol.19 , Issue.1 , pp. 18-24
    • Voyatzis, G.1    Pitas, I.2
  • 2
    • 63649142647 scopus 로고    scopus 로고
    • H. Yin, Z. Chen and Z. Yuan, A blind watermarking algorithm based on hyperchaos and coset by quantizing wavelet transform coefficients, International Journal of Innovative Computing, Information and Control, 3, no. 6(B), pp. 1635-1643, 2007.
    • H. Yin, Z. Chen and Z. Yuan, A blind watermarking algorithm based on hyperchaos and coset by quantizing wavelet transform coefficients, International Journal of Innovative Computing, Information and Control, vol. 3, no. 6(B), pp. 1635-1643, 2007.
  • 3
    • 63849234523 scopus 로고    scopus 로고
    • S. D. Lin and Y. Kuo, An image watermarking scheme with tamper detection and recovery, International Journal of Innovative Computing, Information and Control, 3, no. 6(A), pp. 1379-1387, 2007.
    • S. D. Lin and Y. Kuo, An image watermarking scheme with tamper detection and recovery, International Journal of Innovative Computing, Information and Control, vol. 3, no. 6(A), pp. 1379-1387, 2007.
  • 6
    • 0035473830 scopus 로고    scopus 로고
    • Multipurpose watermarking for image authentication and protection
    • C. S. Lu and H. Y. M. Liao, Multipurpose watermarking for image authentication and protection, IEEE Transactions on Image Processing, vol. 10, no. 10, pp. 1579-1592, 2001.
    • (2001) IEEE Transactions on Image Processing , vol.10 , Issue.10 , pp. 1579-1592
    • Lu, C.S.1    Liao, H.Y.M.2
  • 7
    • 20444378085 scopus 로고    scopus 로고
    • Multipurpose image watermarking algorithm based on multistage vector quantization
    • Z. M. Lu, D. G. Xu and S. H. Sun, Multipurpose image watermarking algorithm based on multistage vector quantization, IEEE Transactions on Image Processing, vol. 14, no. 6, pp. 822-831, 2005.
    • (2005) IEEE Transactions on Image Processing , vol.14 , Issue.6 , pp. 822-831
    • Lu, Z.M.1    Xu, D.G.2    Sun, S.H.3
  • 9
    • 0036556071 scopus 로고    scopus 로고
    • Combinational image watermarking in the spatial and frequency domains
    • F. Y. Shih and S. Y. T. Wu, Combinational image watermarking in the spatial and frequency domains, Pattern Recognition, vol. 36, pp. 969-975, 2003.
    • (2003) Pattern Recognition , vol.36 , pp. 969-975
    • Shih, F.Y.1    Wu, S.Y.T.2
  • 11
    • 84926193517 scopus 로고
    • Visual cryptography
    • Proc. of the Advances in Cryptography-EUROCRYOT94
    • M. Naor and A. Shamir, Visual cryptography, Proc. of the Advances in Cryptography-EUROCRYOT94, LNCS 950, pp. 1-12, 1995.
    • (1995) LNCS , vol.950 , pp. 1-12
    • Naor, M.1    Shamir, A.2
  • 15
    • 0032626169 scopus 로고    scopus 로고
    • Securing digital signatures for non-repudiation
    • J. Zhou and K.Y. Lam, Securing digital signatures for non-repudiation, Computer Communications, vol. 22, pp. 710-716, 1999.
    • (1999) Computer Communications , vol.22 , pp. 710-716
    • Zhou, J.1    Lam, K.Y.2
  • 16
    • 0036605019 scopus 로고    scopus 로고
    • An image intellectual property protection scheme for gray-level images using visual secret sharing strategy
    • C. C. Chang and J. C. Chuang, An image intellectual property protection scheme for gray-level images using visual secret sharing strategy, Pattern Recognition Letters, vol. 23, no. 8, pp. 931-941, 2002.
    • (2002) Pattern Recognition Letters , vol.23 , Issue.8 , pp. 931-941
    • Chang, C.C.1    Chuang, J.C.2
  • 17
    • 0035605439 scopus 로고    scopus 로고
    • Copyright protection scheme of images based on visual cryptography
    • C. C. Chang and H. C. Wu, Copyright protection scheme of images based on visual cryptography, Imaging Science Journal, vol. 49, pp. 141-150, 2001.
    • (2001) Imaging Science Journal , vol.49 , pp. 141-150
    • Chang, C.C.1    Wu, H.C.2
  • 18
    • 33646415682 scopus 로고    scopus 로고
    • Owner-customer right protection mechanism using a watermarking scheme and a watermarking protocol
    • T. H. Chen and D. S. Tsai, Owner-customer right protection mechanism using a watermarking scheme and a watermarking protocol, Pattern Recognition, vol. 39, no. 8, pp. 1530-1541, 2006.
    • (2006) Pattern Recognition , vol.39 , Issue.8 , pp. 1530-1541
    • Chen, T.H.1    Tsai, D.S.2
  • 19
    • 0034251536 scopus 로고    scopus 로고
    • Repeating image watermarking technique by the visual cryptography
    • C. C. Wang, S. C. Tai and C. S. Yu, Repeating image watermarking technique by the visual cryptography, IEICE Transactions on Fundamentals, vol. E83-A, no. 8, pp. 1589-1598, 2000.
    • (2000) IEICE Transactions on Fundamentals , vol.E83-A , Issue.8 , pp. 1589-1598
    • Wang, C.C.1    Tai, S.C.2    Yu, C.S.3
  • 20
  • 23
    • 0035510211 scopus 로고    scopus 로고
    • Circularly symmetric watermark embedding in 2-D DFT domain
    • V. Solachidis and I. Pitas, Circularly symmetric watermark embedding in 2-D DFT domain, IEEE Transactions on Image Processing, vol. 10, no. 11, pp. 1741-1753, 2001.
    • (2001) IEEE Transactions on Image Processing , vol.10 , Issue.11 , pp. 1741-1753
    • Solachidis, V.1    Pitas, I.2
  • 24
    • 0032187555 scopus 로고    scopus 로고
    • A virtual image cryptosystem based upon vector quantization
    • T. S. Chen, C. C. Chang and M. S. Hwang, A virtual image cryptosystem based upon vector quantization, IEEE Transactions on Image Processing, vol. 7, no. 10, pp. 1485-1488, 1998.
    • (1998) IEEE Transactions on Image Processing , vol.7 , Issue.10 , pp. 1485-1488
    • Chen, T.S.1    Chang, C.C.2    Hwang, M.S.3
  • 25
    • 13944272999 scopus 로고    scopus 로고
    • A publicly verifiable copyright-proving scheme resistant to malicious attacks
    • T. H. Chen, G. Horng and W. B. Lee, A publicly verifiable copyright-proving scheme resistant to malicious attacks, IEEE Transactions on Industrial Electronics, vol. 52, no. 1, pp. 327-334, 2005.
    • (2005) IEEE Transactions on Industrial Electronics , vol.52 , Issue.1 , pp. 327-334
    • Chen, T.H.1    Horng, G.2    Lee, W.B.3
  • 27
    • 34147183148 scopus 로고    scopus 로고
    • A cheating prevention scheme for binary visual cryptography with homogeneous secret images
    • D. S Tsai, T. H. Chen and G. Horng, A cheating prevention scheme for binary visual cryptography with homogeneous secret images, Pattern Recognition, vol. 40, no. 8, pp. 2356-2366, 2007.
    • (2007) Pattern Recognition , vol.40 , Issue.8 , pp. 2356-2366
    • Tsai, D.S.1    Chen, T.H.2    Horng, G.3
  • 29
    • 0442280816 scopus 로고    scopus 로고
    • New visual secret sharing schemes using probabilistic method
    • C. N. Yang, New visual secret sharing schemes using probabilistic method, Pattern Recognition Letters, vol. 25, pp. 481-494, 2004.
    • (2004) Pattern Recognition Letters , vol.25 , pp. 481-494
    • Yang, C.N.1
  • 31
    • 0037411307 scopus 로고    scopus 로고
    • Visual cryptography for color images
    • Y. C. Hou, Visual cryptography for color images, Pattern Recognition, vol. 36, pp. 1619-1629, 2003.
    • (2003) Pattern Recognition , vol.36 , pp. 1619-1629
    • Hou, Y.C.1
  • 32
    • 18344378898 scopus 로고    scopus 로고
    • Visual cryptography for color images without pixel expansion
    • Y. C. Hou, C. F. Lin and C. Y. Chang, Visual cryptography for color images without pixel expansion, Journal of Technology, vol. 16, no. 4, pp. 595-603, 2001.
    • (2001) Journal of Technology , vol.16 , Issue.4 , pp. 595-603
    • Hou, Y.C.1    Lin, C.F.2    Chang, C.Y.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.