메뉴 건너뛰기




Volumn E91-A, Issue 6, 2008, Pages 1426-1437

Wavelet based multipurpose color image watermarking by using dual watermarks with human vision system models

Author keywords

HVS; Semi fragile watermarking; Tamper detection; Visible watermarking

Indexed keywords

COPYRIGHTS; DIGITAL WATERMARKING; DISCRETE WAVELET TRANSFORMS; GAUSSIAN NOISE (ELECTRONIC); IMAGE COMPRESSION; SIGNAL PROCESSING; VISIBILITY; WAVELET ANALYSIS; WAVELET TRANSFORMS; WHITE NOISE;

EID: 67349131541     PISSN: 09168508     EISSN: 17451337     Source Type: Journal    
DOI: 10.1093/ietfec/e91-a.6.1426     Document Type: Article
Times cited : (12)

References (29)
  • 1
    • 85027205004 scopus 로고    scopus 로고
    • World Intellectual Property Organization (WIPO)
    • World Intellectual Property Organization (WIPO), http://www.wipo.int.
  • 2
    • 0031362116 scopus 로고    scopus 로고
    • Secure spread spectrum watermarking for multimedia
    • Dec
    • I.J. Cox, J. Kilian, J., F.T. Leighton, and T. Shamoon, "Secure spread spectrum watermarking for multimedia," IEEE Trans. Image Process., vol.6, no.12, pp. 1673-1687, Dec. 1997.
    • (1997) IEEE Trans. Image Process. , vol.6 , Issue.12 , pp. 1673-1687
    • Cox, I.J.1    Kilian, J.2    Leighton, F.T.3    Shamoon, T.4
  • 3
    • 33645996701 scopus 로고    scopus 로고
    • A contrast-sensitive visible watermarking scheme
    • April-June
    • B.B. Huang and S.X. Tang, "A contrast-sensitive visible watermarking scheme," IEEE Multimed., vol.13, no.2, pp. 60-66, April-June 2006.
    • (2006) IEEE Multimed. , vol.13 , Issue.2 , pp. 60-66
    • Huang, B.B.1    Tang, S.X.2
  • 5
    • 0032319685 scopus 로고    scopus 로고
    • Embedding visible video watermarks in the compressed domain
    • Oct
    • J. Meng and S.-F. Chang, "Embedding visible video watermarks in the compressed domain," Proc. ICIP, vol.1, pp. 474-477, Oct. 1998.
    • (1998) Proc. ICIP , vol.1 , pp. 474-477
    • Meng, J.1    Chang, S.-F.2
  • 7
    • 0010813216 scopus 로고    scopus 로고
    • A visible watermarking mechanism using a statistic approach
    • P.-M. Chen, "A visible watermarking mechanism using a statistic approach," Proc. 5th Int. Conf. Signal Processing, vol.2, pp. 910-913, 2000.
    • (2000) Proc. 5th Int. Conf. Signal Processing , vol.2 , pp. 910-913
    • Chen, P.-M.1
  • 8
    • 0035959799 scopus 로고    scopus 로고
    • Wavelet domain adaptive visiblewatermarking
    • Sept
    • Y. Hu and S. Kwong, "Wavelet domain adaptive visiblewatermarking, "Electron. Lett., vol.37, no.20, pp 1219-1220, Sept. 2001.
    • (2001) Electron. Lett. , vol.37 , Issue.20 , pp. 1219-1220
    • Hu, Y.1    Kwong, S.2
  • 9
    • 33645970598 scopus 로고    scopus 로고
    • An image fusion-based visible watermarking algorithm
    • IEEE Press
    • Y. Hu and S. Kwong, "An image fusion-based visible watermarking algorithm," Proc. 2003 Int'l Symp. Circuits and Systems, pp. 25-28,IEEE Press, 2003.
    • (2003) Proc. 2003 Int'l Symp. Circuits and Systems , pp. 25-28
    • Hu, Y.1    Kwong, S.2
  • 10
    • 11444253716 scopus 로고    scopus 로고
    • Translucent digital watermark based on wavelets and error-correct code
    • Nov
    • L. Yong, L.Z. Cheng, Y. Wu, and Z.H. Xu, "Translucent digital watermark based on wavelets and error-correct code," Chinese J. of Computers, vol.27, no.11, pp. 1533-1539, Nov. 2004.
    • (2004) Chinese J. of Computers , vol.27 , Issue.11 , pp. 1533-1539
    • Yong, L.1    Cheng, L.Z.2    Wu, Y.3    Xu, Z.H.4
  • 12
    • 33645985020 scopus 로고    scopus 로고
    • Human visual system models in digitalimage watermarking
    • D. Levicky and P. Foris, "Human visual system models in digitalimage watermarking," Radioengineering, vol.13, no.4, pp. 38-43, 2004.
    • (2004) Radioengineering , vol.13 , Issue.4 , pp. 38-43
    • Levicky, D.1    Foris, P.2
  • 14
    • 1842421975 scopus 로고    scopus 로고
    • Comparative evaluation of semifragile watermarking algorithms
    • O. Ekici, B. Sankur, B. Colkun, U. Nazi, and M. Akcay, "Comparative evaluation of semifragile watermarking algorithms," J. Electronic Imaging, vol.13, no.1, pp. 209-216, 2004.
    • (2004) J. Electronic Imaging , vol.13 , Issue.1 , pp. 209-216
    • Ekici, O.1    Sankur, B.2    Colkun, B.3    Nazi, U.4    Akcay, M.5
  • 15
    • 33644995185 scopus 로고    scopus 로고
    • Analysis and design of securewatermark-based authentication systems
    • March
    • C. Fei, D. Kundur, and R. Kwong, "Analysis and design of securewatermark-based authentication systems," IEEE Trans. Information Forensics and Security, vol.1, no.1, pp. 43-55, March 2006.
    • (2006) IEEE Trans. Information Forensics and Security , vol.1 , Issue.1 , pp. 43-55
    • Fei, C.1    Kundur, D.2    Kwong, R.3
  • 16
    • 0032648596 scopus 로고    scopus 로고
    • Digital watermarking for telltale amper proofing and authentication
    • July
    • D. Kundur and D. Hatzinakos, "Digital watermarking for telltale amper proofing and authentication," Proc. IEEE , vol.87, no.7,pp. 1167-1180, July 1999.
    • (1999) Proc IEEE , vol.87 , Issue.7 , pp. 1167-1180
    • Kundur, D.1    Hatzinakos, D.2
  • 18
    • 4544371217 scopus 로고    scopus 로고
    • A multiscale fragile watermarking based on the Gaussian mixture model in the wavelet domain
    • Montreal, QC, Canada, May
    • H. Yuan and X.P. Zhang, "A multiscale fragile watermarking based on the Gaussian mixture model in the wavelet domain," Proc . 2004 Int. Conf. on Acoustics, Speech and Signal Processing, vol.3 pp. 413-416, Montreal, QC, Canada, May 2004.
    • (2004) Proc 2004 Int. Conf. on Acoustics, Speech and Signal Processing , vol.3 , pp. 413-416
    • Yuan, H.1    Zhang, X.P.2
  • 19
    • 24144466952 scopus 로고    scopus 로고
    • Wavelet-based semifragile watermarking with tamper detection
    • March
    • K. Ding, C. He, L.G. Jiang, and H.X. Wang, "Wavelet-based semifragile watermarking with tamper detection," IEICE Trans. Fundamentals, vol.E88-A, no.3, pp. 787-790, March 2005.
    • (2005) IEICE Trans. Fundamentals , vol.E88-A , Issue.3 , pp. 787-790
    • Ding, K.1    He, C.2    Jiang, L.G.3    Wang, H.X.4
  • 20
    • 0016079335 scopus 로고
    • The effects of a visual fidelity criterion on the encoding of images
    • July
    • J.L. Mannos and D.J. Sakrison, "The effects of a visual fidelity criterion on the encoding of images," IEEE Trans. Inf. Theory, vol.20, no.4, pp. 525-536, July 1974.
    • (1974) IEEE Trans. Inf. Theory , vol.20 , Issue.4 , pp. 525-536
    • Mannos, J.L.1    Sakrison, D.J.2
  • 22
    • 0034140111 scopus 로고    scopus 로고
    • Joint wavelet and spatial transformation for digital watermarking
    • Feb
    • M.J. Tsai, K.Y. Yu, and Y.Z. Chen, "Joint wavelet and spatial transformation for digital watermarking," IEEE Trans. Consum. Electron., vol.46, no.1, pp. 241-245, Feb. 2000.
    • (2000) IEEE Trans. Consum. Electron. , vol.46 , Issue.1 , pp. 241-245
    • Tsai, M.J.1    Yu, K.Y.2    Chen, Y.Z.3
  • 23
    • 85027203305 scopus 로고    scopus 로고
    • USC SIPI-The USC-SIPI Image Database [Online]
    • USC SIPI-The USC-SIPI Image Database [Online]:http://sipi.usc.edu/ services/database/Database.html
  • 24
    • 85027203978 scopus 로고    scopus 로고
    • AiS Watermark Pictures Protector
    • AiS Watermark Pictures Protector: http://www.watermarker.com
  • 25
    • 85027204485 scopus 로고    scopus 로고
    • JPEG 2000 compression, [Online]
    • JPEG 2000 compression, [Online]: http://www.ece.uvic.ca/mdadams/hasper.
  • 26
    • 85027201571 scopus 로고    scopus 로고
    • StirMark, [Online]
    • StirMark, [Online]: http://www.petitcolas.net/fabien/software/Stir- MarkBenchmark-4-0-129.zip
  • 28
    • 0742269025 scopus 로고    scopus 로고
    • Attacking visible watermarking
    • Feb
    • C.-H. Huang and J.-L. Wu, "Attacking visible watermarking," IEEE Trans. Multimed., vol.6, no.1, pp. 16-30, Feb. 2004.
    • (2004) IEEE Trans. Multimed. , vol.6 , Issue.1 , pp. 16-30
    • Huang, C.-H.1    Wu, J.-L.2
  • 29
    • 33845683390 scopus 로고    scopus 로고
    • A novel image recovery algorithm for visible watermarked image
    • Dec
    • S.C. Pei and Y.C. Zeng, "A novel image recovery algorithm for visible watermarked image," IEEE Trans. Information Forensics and Security, vol.1, no.4, pp. 543-550, Dec. 2006.
    • (2006) IEEE Trans. Information Forensics and Security , vol.1 , Issue.4 , pp. 543-550
    • Pei, S.C.1    Zeng, Y.C.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.