메뉴 건너뛰기




Volumn 20, Issue 5, 2009, Pages 303-311

Iterative compensation schemes for multimedia content authentication

Author keywords

Authentication; Compensated signature embedding; Convex sets; Image integrity; Multimedia authentication; POCS; Signature embedding; Watermarking

Indexed keywords

COMPENSATED SIGNATURE EMBEDDING; CONVEX SETS; IMAGE INTEGRITY; MULTIMEDIA AUTHENTICATION; POCS; SIGNATURE EMBEDDING;

EID: 65649138758     PISSN: 10473203     EISSN: 10959076     Source Type: Journal    
DOI: 10.1016/j.jvcir.2009.03.010     Document Type: Article
Times cited : (19)

References (26)
  • 1
    • 11244354474 scopus 로고    scopus 로고
    • Hierarchical watermarking scheme for image authentication and recovery
    • June
    • P. Lin, C. Hsieh, P. Huang, Hierarchical watermarking scheme for image authentication and recovery, in: IEEE Int. Conf. Multimedia Expo., June 2004, pp. 963-966.
    • (2004) IEEE Int. Conf. Multimedia Expo , pp. 963-966
    • Lin, P.1    Hsieh, C.2    Huang, P.3
  • 2
    • 67649097476 scopus 로고    scopus 로고
    • Image authentication using content base watermark
    • May
    • H. Liu, J. Lin, J. Huang, Image authentication using content base watermark, in: IEEE Int. Symp. Circ. Syst., May 2005, pp. 4014-4017.
    • (2005) IEEE Int. Symp. Circ. Syst , pp. 4014-4017
    • Liu, H.1    Lin, J.2    Huang, J.3
  • 3
    • 0036627368 scopus 로고    scopus 로고
    • A survey of watermarking algorithms for image authentication
    • Rey C., and Dugelay J. A survey of watermarking algorithms for image authentication. EURASIP J. Appl. Signal Proc. 1 (2002) 613-621
    • (2002) EURASIP J. Appl. Signal Proc. , Issue.1 , pp. 613-621
    • Rey, C.1    Dugelay, J.2
  • 4
    • 48149093483 scopus 로고    scopus 로고
    • Robust hash for detecting and localizing image tampering
    • Oct
    • S. Roy, Q. Sun, Robust hash for detecting and localizing image tampering, in: IEEE Int. Conf. Image Proc., Oct. 2007, pp. 117-120.
    • (2007) IEEE Int. Conf. Image Proc , pp. 117-120
    • Roy, S.1    Sun, Q.2
  • 5
    • 0033688392 scopus 로고    scopus 로고
    • Semi-fragile watermarking for authenticating JPEG visual content
    • Lin C.Y., and Chang S.F. Semi-fragile watermarking for authenticating JPEG visual content. Proc. SPIE 3971 (2000)
    • (2000) Proc. SPIE , vol.3971
    • Lin, C.Y.1    Chang, S.F.2
  • 7
    • 0032308292 scopus 로고    scopus 로고
    • Compression tolerant image authentication
    • Oct
    • S. Bhattacharjee, M. Kutter, Compression tolerant image authentication, in: IEEE Int. Conf. Image Proc., vol. 1, Oct. 1998, pp. 435-439.
    • (1998) IEEE Int. Conf. Image Proc , vol.1 , pp. 435-439
    • Bhattacharjee, S.1    Kutter, M.2
  • 8
    • 50049118062 scopus 로고    scopus 로고
    • Fragile watermark for tamper detection using structural distortion
    • June
    • P. Thangavel, T. Kumaran, Fragile watermark for tamper detection using structural distortion, in: IEEE Int. Symp. Ind. Electron., June 2007, pp. 1755-1760.
    • (2007) IEEE Int. Symp. Ind. Electron , pp. 1755-1760
    • Thangavel, P.1    Kumaran, T.2
  • 10
    • 0035159824 scopus 로고    scopus 로고
    • A hierarchical image authentication watermark with improved localization and security
    • Oct
    • M. Celik, G. Sharma, E. Saber, A. Tekalp, A hierarchical image authentication watermark with improved localization and security, in: IEEE Int. Conf. Image Proc., Oct. 2001, pp. 502-505.
    • (2001) IEEE Int. Conf. Image Proc , pp. 502-505
    • Celik, M.1    Sharma, G.2    Saber, E.3    Tekalp, A.4
  • 11
    • 33845582720 scopus 로고    scopus 로고
    • Region of interest fragile watermarking for image authentication
    • Comput. Sci, June
    • Y. Chu, Y. Zhang, S. Zhang, X. Ye, Region of interest fragile watermarking for image authentication, in: IEEE First Int. Multi-Symp. Comput. Comput. Sci., June 2006, pp. 726-731.
    • (2006) IEEE First Int. Multi-Symp. Comput , pp. 726-731
    • Chu, Y.1    Zhang, Y.2    Zhang, S.3    Ye, X.4
  • 12
    • 20844440573 scopus 로고    scopus 로고
    • A fragile watermarking scheme for image authentication with localization and recovery
    • Dec
    • P. Lin, P. Huang, A. Peng, A fragile watermarking scheme for image authentication with localization and recovery, in: IEEE Proc. Sixth Int. Symp. Multimedia Soft. Eng., Dec. 2004, pp. 146-153.
    • (2004) IEEE Proc. Sixth Int. Symp. Multimedia Soft. Eng , pp. 146-153
    • Lin, P.1    Huang, P.2    Peng, A.3
  • 13
    • 21544477794 scopus 로고    scopus 로고
    • Fragile blockwise image authentication thwarting vector quantization attack
    • Dec
    • Y. Hasan, A. Hassan, Fragile blockwise image authentication thwarting vector quantization attack, in: IEEE Proc. Fourth Int. Symp. Signal Proc. Info. Tech., Dec. 2004, pp. 530-533.
    • (2004) IEEE Proc. Fourth Int. Symp. Signal Proc. Info. Tech , pp. 530-533
    • Hasan, Y.1    Hassan, A.2
  • 14
    • 48149085381 scopus 로고    scopus 로고
    • Compensated signature embedding based multimedia content authentication system
    • Sept
    • S. Ababneh, A. Khokhar, R. Ansari, Compensated signature embedding based multimedia content authentication system, in: IEEE Int. Conf. Image Proc., Sept. 2007, pp. 393-396.
    • (2007) IEEE Int. Conf. Image Proc , pp. 393-396
    • Ababneh, S.1    Khokhar, A.2    Ansari, R.3
  • 15
    • 51549110367 scopus 로고    scopus 로고
    • Improved image authentication using closed-form compensation and spread-spectrum watermarking
    • ICASSP, Apr
    • S. Ababneh, R. Ansari, A. Khokhar, Improved image authentication using closed-form compensation and spread-spectrum watermarking, in: IEEE Int. Conf. Acoustics, Speech, Signal Proc. (ICASSP), Apr. 2008.
    • (2008) IEEE Int. Conf. Acoustics, Speech, Signal Proc
    • Ababneh, S.1    Ansari, R.2    Khokhar, A.3
  • 17
    • 0020191832 scopus 로고
    • Image restoration by the method of convex projections: Part 1-Theory
    • Youla D., and Webb H. Image restoration by the method of convex projections: Part 1-Theory. IEEE Trans. Med. Imaging 1 2 (1982) 81-94
    • (1982) IEEE Trans. Med. Imaging , vol.1 , Issue.2 , pp. 81-94
    • Youla, D.1    Webb, H.2
  • 18
    • 33845635183 scopus 로고    scopus 로고
    • A set theoretic framework for watermarking and its application to semifragile tamper detection
    • Altun O., Sharma G., Celik M., and Bocko M. A set theoretic framework for watermarking and its application to semifragile tamper detection. IEEE Trans. Inform. Forensics Security 1 4 (2006) 479-492
    • (2006) IEEE Trans. Inform. Forensics Security , vol.1 , Issue.4 , pp. 479-492
    • Altun, O.1    Sharma, G.2    Celik, M.3    Bocko, M.4
  • 19
    • 0027541192 scopus 로고
    • The Foundations of Set Theoretic Estimation
    • Combettes F.L. The Foundations of Set Theoretic Estimation. Proc. IEEE 81 2 (1993) 182-208
    • (1993) Proc. IEEE , vol.81 , Issue.2 , pp. 182-208
    • Combettes, F.L.1
  • 20
  • 22
    • 0035333687 scopus 로고    scopus 로고
    • Quantization index modulation: a class of provably good methods for digital watermarking and information embedding
    • Chen B., and Wornell G. Quantization index modulation: a class of provably good methods for digital watermarking and information embedding. IEEE Trans. Inform. Theory 47 4 (2001) 1423-1443
    • (2001) IEEE Trans. Inform. Theory , vol.47 , Issue.4 , pp. 1423-1443
    • Chen, B.1    Wornell, G.2
  • 23
    • 0003968504 scopus 로고
    • Watson A. (Ed), MIT Press, Cambridge, MA
    • In: Watson A. (Ed). Digital Images and Human Vision (1993), MIT Press, Cambridge, MA
    • (1993) Digital Images and Human Vision
  • 24
    • 33745613004 scopus 로고    scopus 로고
    • JPEG2000 encoding with perceptual distortion control
    • Zhen L., Karam L., and Watson A. JPEG2000 encoding with perceptual distortion control. IEEE Trans. Image Process. 15 7 (2006) 1763-1778
    • (2006) IEEE Trans. Image Process. , vol.15 , Issue.7 , pp. 1763-1778
    • Zhen, L.1    Karam, L.2    Watson, A.3
  • 25
    • 0034172308 scopus 로고    scopus 로고
    • Perceptual coding of digital audio
    • Painter T., and Spanias A. Perceptual coding of digital audio. Proc. IEEE 88 4 (2000) 451-515
    • (2000) Proc. IEEE , vol.88 , Issue.4 , pp. 451-515
    • Painter, T.1    Spanias, A.2
  • 26
    • 65649119126 scopus 로고    scopus 로고
    • Available online
    • Available online: .


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.