메뉴 건너뛰기




Volumn 3, Issue 5, 2007, Pages 1161-1172

A novel multipurpose image watermarking scheme based on block-relation

Author keywords

Image authentication; Image compression; Image restoration; Watermarking

Indexed keywords


EID: 63649094632     PISSN: 13494198     EISSN: None     Source Type: Journal    
DOI: None     Document Type: Article
Times cited : (12)

References (21)
  • 7
    • 1542752845 scopus 로고    scopus 로고
    • Applying projection and B-spline to image authentication and remedy
    • Lin, C. H. and W. S. Hsieh, Applying projection and B-spline to image authentication and remedy, IEEE Transactions on Consumer Electronics, vol.49, pp.1234-1238, 2003.
    • (2003) IEEE Transactions on Consumer Electronics , vol.49 , pp. 1234-1238
    • Lin, C.H.1    Hsieh, W.S.2
  • 8
    • 1842438950 scopus 로고    scopus 로고
    • Robust image authentication method distinguishing JPEG compression from malicious manipulation,
    • 486-97-19
    • Lin, C. Y. and S. F. Chang, Robust image authentication method distinguishing JPEG compression from malicious manipulation, CU/CTR Technical Report 486-97-19, 1997.
    • (1997) CU/CTR Technical Report
    • Lin, C.Y.1    Chang, S.F.2
  • 9
    • 20444507347 scopus 로고    scopus 로고
    • Robust image authentication method surviving JPEG lossy compression
    • Lin, C. Y. and S. F. Chang, Robust image authentication method surviving JPEG lossy compression, Proc. of IS & T/SPIE, 1998.
    • (1998) Proc. of IS & T/SPIE
    • Lin, C.Y.1    Chang, S.F.2
  • 13
    • 25144448272 scopus 로고    scopus 로고
    • A hierarchical digital watermarking method for image tamper detection and recovery
    • Lin, P. L., C. K. Hsieh and P. W. Huang, A hierarchical digital watermarking method for image tamper detection and recovery, Pattern Recognition, vol.38, no.12, pp.2519-2529, 2005.
    • (2005) Pattern Recognition , vol.38 , Issue.12 , pp. 2519-2529
    • Lin, P.L.1    Hsieh, C.K.2    Huang, P.W.3
  • 14
    • 0037818310 scopus 로고    scopus 로고
    • Structural digital signature for image authentication: An incidental distortion resistant scheme
    • Lu, C. S. and H. Y. M. Liao, Structural digital signature for image authentication: An incidental distortion resistant scheme, IEEE Transactions on Multimedia, vol.5, no.2, 2003.
    • (2003) IEEE Transactions on Multimedia , vol.5 , Issue.2
    • Lu, C.S.1    Liao, H.Y.M.2
  • 18
    • 5644253212 scopus 로고    scopus 로고
    • Blind image data hiding based on self reference
    • Wang, Y. and A. Permain, Blind image data hiding based on self reference, Pattern Recognition Letters, vol.25, no.15, pp.1681-1689, 2004.
    • (2004) Pattern Recognition Letters , vol.25 , Issue.15 , pp. 1681-1689
    • Wang, Y.1    Permain, A.2
  • 19
    • 0347927731 scopus 로고    scopus 로고
    • Detection and restoration of tampered JPEG images
    • Wu, H. C. and C. C. Chang, Detection and restoration of tampered JPEG images, The Journal of System and Software, vol.64, no.2, pp.151-161, 2002.
    • (2002) The Journal of System and Software , vol.64 , Issue.2 , pp. 151-161
    • Wu, H.C.1    Chang, C.C.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.