메뉴 건너뛰기




Volumn 3, Issue 6 A, 2007, Pages 1379-1387

An image watermarking scheme with tamper detection and recovery

Author keywords

Image watermarking; JPEG compression; Ownership; Tamper detection and recovery

Indexed keywords


EID: 63849234523     PISSN: 13494198     EISSN: None     Source Type: Journal    
DOI: None     Document Type: Conference Paper
Times cited : (42)

References (24)
  • 1
    • 0027697301 scopus 로고
    • The trustworthy digital camera: Restoring credibility to the photographic image
    • Friedman, G. L., The trustworthy digital camera: restoring credibility to the photographic image, IEEE Transactions on Consumer Electronics, vol.39, pp.905-910, 1993.
    • (1993) IEEE Transactions on Consumer Electronics , vol.39 , pp. 905-910
    • Friedman, G.L.1
  • 2
    • 33847280382 scopus 로고    scopus 로고
    • An image fragile watermark scheme based on chaotic image pattern and pixel-pairs
    • Liu, S. H., H. X. Yao, W. Gao and Y. L. Liu, An image fragile watermark scheme based on chaotic image pattern and pixel-pairs, Applied Mathematics and Computation, vol.185, no.2, pp.869-882, 2007.
    • (2007) Applied Mathematics and Computation , vol.185 , Issue.2 , pp. 869-882
    • Liu, S.H.1    Yao, H.X.2    Gao, W.3    Liu, Y.L.4
  • 7
    • 33751435860 scopus 로고    scopus 로고
    • Robust SS watermarking with improved capacity
    • Maity, S. P., M. K. Kundu and T. S. Das, Robust SS watermarking with improved capacity, Pattern Recognition Letters, vol.28, no.3, pp.350-356, 2007.
    • (2007) Pattern Recognition Letters , vol.28 , Issue.3 , pp. 350-356
    • Maity, S.P.1    Kundu, M.K.2    Das, T.S.3
  • 8
    • 0034249378 scopus 로고    scopus 로고
    • A robust DCT-based watermarking for copyright protection
    • Lin, S. D. and C. F. Chen, A robust DCT-based watermarking for copyright protection, IEEE Transactions on Consumer Electronics, vol.46, no.3, pp.415-421, 2000.
    • (2000) IEEE Transactions on Consumer Electronics , vol.46 , Issue.3 , pp. 415-421
    • Lin, S.D.1    Chen, C.F.2
  • 9
    • 0036611838 scopus 로고    scopus 로고
    • Hierarchical watermarking for secure image authentication with localization
    • Celik, M. U., G. Sharma, E. Saber and A. M. Tekalp, Hierarchical watermarking for secure image authentication with localization, IEEE Transactions on Image Processing, vol.ll, no.6, pp.585-595, 2002.
    • (2002) IEEE Transactions on Image Processing , vol.100 , Issue.6 , pp. 585-595
    • Celik, M.U.1    Sharma, G.2    Saber, E.3    Tekalp, A.M.4
  • 11
    • 0037869332 scopus 로고    scopus 로고
    • Fragile watermarking scheme for image authentication
    • Lu, H., R. Shen and F. L. Chung, Fragile watermarking scheme for image authentication, IEE Electronics Letters, vol.39, no. 12, 2003.
    • (2003) IEE Electronics Letters , vol.39 , Issue.12
    • Lu, H.1    Shen, R.2    Chung, F.L.3
  • 12
    • 8344236008 scopus 로고    scopus 로고
    • Fragile image watermarking using a gradient image for improved localization and security
    • Suthaharan, S., Fragile image watermarking using a gradient image for improved localization and security, Pattern Recognition Letters, vol.25, pp.1893-1903, 2004.
    • (2004) Pattern Recognition Letters , vol.25 , pp. 1893-1903
    • Suthaharan, S.1
  • 14
    • 0036755019 scopus 로고    scopus 로고
    • On the design of content-based multimedia authentication systems
    • Wu, C. W., On the design of content-based multimedia authentication systems, IEEE Transactions on Multimedia, vol.4, no.3, pp.385-393, 2002.
    • (2002) IEEE Transactions on Multimedia , vol.4 , Issue.3 , pp. 385-393
    • Wu, C.W.1
  • 16
    • 25144448272 scopus 로고    scopus 로고
    • A hierarchical digital watermarking method for image tamper detection and recovery
    • Lin, P. L., C. K. Hsieh and P. W. Huang, A hierarchical digital watermarking method for image tamper detection and recovery, Pattern Recognition, vol.38, pp.2519-2529, 2005.
    • (2005) Pattern Recognition , vol.38 , pp. 2519-2529
    • Lin, P.L.1    Hsieh, C.K.2    Huang, P.W.3
  • 19
  • 22
    • 13944272999 scopus 로고    scopus 로고
    • A publicly verifiable copyright-proving scheme resistant to malicious attacks
    • Chen, T. H., G. Horng and W. B. Lee, A publicly verifiable copyright-proving scheme resistant to malicious attacks, IEEE Transactions on Industrial Electronics, vol.52, pp.327-334, 2005.
    • (2005) IEEE Transactions on Industrial Electronics , vol.52 , pp. 327-334
    • Chen, T.H.1    Horng, G.2    Lee, W.B.3
  • 24
    • 41849122894 scopus 로고    scopus 로고
    • Fault identification and fault-tolerant control for a class of networked control systems
    • Z. Mao and B. Jiang, Fault identification and fault-tolerant control for a class of networked control systems, Int. J. Innovative Computing, Information and Control, vol.3, no.5, pp.1121-1130, 2007.
    • (2007) Int. J. Innovative Computing, Information and Control , vol.3 , Issue.5 , pp. 1121-1130
    • Mao, Z.1    Jiang, B.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.