메뉴 건너뛰기




Volumn 89, Issue 8, 2009, Pages 1557-1566

Adjacent-block based statistical detection method for self-embedding watermarking techniques

Author keywords

Adjacent block; Fragile watermarking; Self embedding; Statistical detection method (SDM)

Indexed keywords

ADJACENT-BLOCK; ANALYTICAL ANALYSIS; FRAGILE WATERMARKING; HOST IMAGES; IMAGE BLOCKS; SELF-EMBEDDING; STATISTIC-BASED; STATISTICAL DETECTION METHOD (SDM); TAKE ALLS; TAMPER DETECTIONS; WATERMARKING TECHNIQUES;

EID: 64549124300     PISSN: 01651684     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.sigpro.2009.02.009     Document Type: Article
Times cited : (81)

References (18)
  • 7
    • 34248661818 scopus 로고    scopus 로고
    • A majority-voting based watermarking scheme for color image tamper detection and recovery
    • Wang M.-S., and Chen W.-C. A majority-voting based watermarking scheme for color image tamper detection and recovery. Computer Standards & Interfaces 29 (2007) 561-570
    • (2007) Computer Standards & Interfaces , vol.29 , pp. 561-570
    • Wang, M.-S.1    Chen, W.-C.2
  • 8
    • 25144448272 scopus 로고    scopus 로고
    • A hierarchical digital watermarking method for image tamper detection and recovery
    • Lin P.-L., Hsieh C.-K., and Huang P.-W. A hierarchical digital watermarking method for image tamper detection and recovery. Pattern Recognition 38 12 (2005) 2519-2529
    • (2005) Pattern Recognition , vol.38 , Issue.12 , pp. 2519-2529
    • Lin, P.-L.1    Hsieh, C.-K.2    Huang, P.-W.3
  • 9
    • 48149100935 scopus 로고    scopus 로고
    • Dual watermark for image tamper detection and recovery
    • Lee T.-Y., and Lin S.D. Dual watermark for image tamper detection and recovery. Pattern Recognition 41 (2008) 3497-3506
    • (2008) Pattern Recognition , vol.41 , pp. 3497-3506
    • Lee, T.-Y.1    Lin, S.D.2
  • 10
    • 0035473831 scopus 로고    scopus 로고
    • Secret and public key image watermarking schemes for image authentication and ownership verification
    • Wong P.W., and Memon N. Secret and public key image watermarking schemes for image authentication and ownership verification. IEEE Transactions on Image Processing 10 (2001) 1593-1601
    • (2001) IEEE Transactions on Image Processing , vol.10 , pp. 1593-1601
    • Wong, P.W.1    Memon, N.2
  • 11
    • 8344236008 scopus 로고    scopus 로고
    • Fragile image watermarking using a gradient image for improved localization and security
    • Suthaharan S. Fragile image watermarking using a gradient image for improved localization and security. Pattern Recognition Letters 25 (2004) 1893-1903
    • (2004) Pattern Recognition Letters , vol.25 , pp. 1893-1903
    • Suthaharan, S.1
  • 12
    • 0036611838 scopus 로고    scopus 로고
    • Hierarchical watermarking for secure image authentication with localization
    • Celik M., Sharma G., Saber E., and Tekalp A.M. Hierarchical watermarking for secure image authentication with localization. IEEE Transactions on Image Processing 11 6 (2002) 585-595
    • (2002) IEEE Transactions on Image Processing , vol.11 , Issue.6 , pp. 585-595
    • Celik, M.1    Sharma, G.2    Saber, E.3    Tekalp, A.M.4
  • 13
    • 0033872149 scopus 로고    scopus 로고
    • Counterfeiting attacks on oblivious block-wise independent invisible watermarking schemes
    • Holliman M., and Memon N. Counterfeiting attacks on oblivious block-wise independent invisible watermarking schemes. IEEE Transactions on Image Processing 3 9 (2000) 432-441
    • (2000) IEEE Transactions on Image Processing , vol.3 , Issue.9 , pp. 432-441
    • Holliman, M.1    Memon, N.2
  • 14
    • 0036530306 scopus 로고    scopus 로고
    • Cryptanalysis of the Yeung-Mintzer fragile watermarking technique
    • Fridrich J., Goljan M., and Memon N. Cryptanalysis of the Yeung-Mintzer fragile watermarking technique. Journal of Electronic Imaging 11 4 (2002) 262-274
    • (2002) Journal of Electronic Imaging , vol.11 , Issue.4 , pp. 262-274
    • Fridrich, J.1    Goljan, M.2    Memon, N.3
  • 15
    • 34848926024 scopus 로고    scopus 로고
    • Four-scanning attack on hierarchical digital watermarking method for image tamper detection and recovery
    • Chang C.-C., Fan Y.-H., and Tai W.-L. Four-scanning attack on hierarchical digital watermarking method for image tamper detection and recovery. Pattern Recognition 41 (2008) 654-661
    • (2008) Pattern Recognition , vol.41 , pp. 654-661
    • Chang, C.-C.1    Fan, Y.-H.2    Tai, W.-L.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.