메뉴 건너뛰기




Volumn 90, Issue 1, 2010, Pages 331-343

Recover the tampered image based on VQ indexing

Author keywords

Image recovery; Tamper detection; Vector quantization; Watermark

Indexed keywords

EDGE REGION; IMAGE AUTHENTICATION; IMAGE PROCESS; IMAGE RECOVERY; IMAGE WATERMARKING; INDEX TABLE; ORIGINAL IMAGES; OWNERSHIP VERIFICATION; PUBLIC KEYS; TAMPER DETECTION; TAMPERED IMAGES; WATERMARK; WATERMARKING SCHEMES;

EID: 69249216337     PISSN: 01651684     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.sigpro.2009.07.007     Document Type: Article
Times cited : (111)

References (31)
  • 1
    • 11244266383 scopus 로고    scopus 로고
    • The trustworthy digital camera: Restoring credibility to the photographic image
    • Chicago, IL, USA
    • G.I. Friedman, The trustworthy digital camera: restoring credibility to the photographic image, in: Proceedings of the IEEE International Conference on Image Processing, vol. II, Chicago, IL, USA, 1998, pp. 409-413.
    • (1998) Proceedings of the IEEE International Conference on Image Processing , vol.2 , pp. 409-413
    • Friedman, G.I.1
  • 3
    • 0032223822 scopus 로고    scopus 로고
    • A robust image authentication method surviving JPEG lossy compression
    • Lin C.Y., and Chang S.F. A robust image authentication method surviving JPEG lossy compression. SPIE Storage Retr. Image/Video Databases (1998) 296-307
    • (1998) SPIE Storage Retr. Image/Video Databases , pp. 296-307
    • Lin, C.Y.1    Chang, S.F.2
  • 4
    • 0035248504 scopus 로고    scopus 로고
    • A robust image authentication method distinguishing JPEG compression from malicious manipulation
    • Lin C.Y., and Chang S.F. A robust image authentication method distinguishing JPEG compression from malicious manipulation. IEEE Trans. Circuits Syst. Video Technol. 11 2 (2001) 153-168
    • (2001) IEEE Trans. Circuits Syst. Video Technol. , vol.11 , Issue.2 , pp. 153-168
    • Lin, C.Y.1    Chang, S.F.2
  • 5
    • 0036611838 scopus 로고    scopus 로고
    • Hierarchical watermarking for secure image authentication with localization
    • Celik M.U., Sharma G., Saber E., and Tekalp A.M. Hierarchical watermarking for secure image authentication with localization. IEEE Trans. Image Process. 11 6 (2002) 585-594
    • (2002) IEEE Trans. Image Process. , vol.11 , Issue.6 , pp. 585-594
    • Celik, M.U.1    Sharma, G.2    Saber, E.3    Tekalp, A.M.4
  • 6
    • 33645152302 scopus 로고    scopus 로고
    • Lossless watermarking for image authentication: a new framework and an implementation
    • Celik M.U., Sharma G., and Tekalp A.M. Lossless watermarking for image authentication: a new framework and an implementation. IEEE Trans. Image Process. 15 4 (2006) 1042-1049
    • (2006) IEEE Trans. Image Process. , vol.15 , Issue.4 , pp. 1042-1049
    • Celik, M.U.1    Sharma, G.2    Tekalp, A.M.3
  • 9
    • 0035473830 scopus 로고    scopus 로고
    • Multipurpose watermarking for image authentication and protection
    • Lu C.S., and Liao H.Y.M. Multipurpose watermarking for image authentication and protection. IEEE Trans. Image Process. 10 (2001) 435-439
    • (2001) IEEE Trans. Image Process. , vol.10 , pp. 435-439
    • Lu, C.S.1    Liao, H.Y.M.2
  • 10
    • 31344433959 scopus 로고    scopus 로고
    • New semi-fragile images authentication watermarking techniques using random bias and nonuniform quantization
    • Maeno K., Sun Q., and Chang S.F. New semi-fragile images authentication watermarking techniques using random bias and nonuniform quantization. IEEE Trans. Multimed. 8 1 (2006) 32-45
    • (2006) IEEE Trans. Multimed. , vol.8 , Issue.1 , pp. 32-45
    • Maeno, K.1    Sun, Q.2    Chang, S.F.3
  • 12
    • 0035473831 scopus 로고    scopus 로고
    • Secret and public key image watermarking schemes for image authentication and ownership verification
    • Wong P.W., and Memon N. Secret and public key image watermarking schemes for image authentication and ownership verification. IEEE Trans. Image Process. 10 10 (2001) 1593-1601
    • (2001) IEEE Trans. Image Process. , vol.10 , Issue.10 , pp. 1593-1601
    • Wong, P.W.1    Memon, N.2
  • 13
    • 0033688392 scopus 로고    scopus 로고
    • C.Y. Lin, S.F. Chang, Semi-fragile watermarking for authenticating JPEG visual content, in: SPIE International Conference on Security and Watermarking of Multimedia Contents II, 3971 (13), EI '00, San Jose, USA, January 2000.
    • C.Y. Lin, S.F. Chang, Semi-fragile watermarking for authenticating JPEG visual content, in: SPIE International Conference on Security and Watermarking of Multimedia Contents II, vol. 3971 (13), EI '00, San Jose, USA, January 2000.
  • 16
    • 0037426973 scopus 로고    scopus 로고
    • Semi-fragile image watermarking method based on index constrained vector quantization
    • Lu Z.M., Liu C.H., and Xu D.G. Semi-fragile image watermarking method based on index constrained vector quantization. Electron Lett. 39 1 (2003) 35-36
    • (2003) Electron Lett. , vol.39 , Issue.1 , pp. 35-36
    • Lu, Z.M.1    Liu, C.H.2    Xu, D.G.3
  • 17
    • 0035927557 scopus 로고    scopus 로고
    • Efficient and robust watermarking algorithm with vector quantization
    • Huang H.C., Wang F.H., and Pan J.S. Efficient and robust watermarking algorithm with vector quantization. Electron. Lett. 37 13 (2001) 826-828
    • (2001) Electron. Lett. , vol.37 , Issue.13 , pp. 826-828
    • Huang, H.C.1    Wang, F.H.2    Pan, J.S.3
  • 18
    • 0032075445 scopus 로고    scopus 로고
    • Robust image watermarking in the spatial domain
    • Nikolaidis N., and Pitas I. Robust image watermarking in the spatial domain. Signal Process. 66 3 (1998) 385-403
    • (1998) Signal Process. , vol.66 , Issue.3 , pp. 385-403
    • Nikolaidis, N.1    Pitas, I.2
  • 19
    • 0141638482 scopus 로고    scopus 로고
    • A DWT-DFT composite watermarking scheme robust to both affine transform and JPEG compression
    • Kang X., Huang J., Shi Y.Q., and Lin Y. A DWT-DFT composite watermarking scheme robust to both affine transform and JPEG compression. IEEE Trans. Circuits Syst. Video Technol. 13 8 (2003) 776-786
    • (2003) IEEE Trans. Circuits Syst. Video Technol. , vol.13 , Issue.8 , pp. 776-786
    • Kang, X.1    Huang, J.2    Shi, Y.Q.3    Lin, Y.4
  • 20
    • 10644225222 scopus 로고    scopus 로고
    • A robust watermarking scheme using phase shift keying with the combination of amplitude boost and low amplitude block selection
    • Chen W.Y., and Chen C.H. A robust watermarking scheme using phase shift keying with the combination of amplitude boost and low amplitude block selection. Pattern Recognition 38 4 (2005) 587-598
    • (2005) Pattern Recognition , vol.38 , Issue.4 , pp. 587-598
    • Chen, W.Y.1    Chen, C.H.2
  • 23
    • 25144448272 scopus 로고    scopus 로고
    • A hierarchical digital watermarking method for image tamper detection and recovery
    • Lin P.L., Hsieh C.K., and Huang P.W. A hierarchical digital watermarking method for image tamper detection and recovery. Pattern Recognition 38 (2005) 2519-2529
    • (2005) Pattern Recognition , vol.38 , pp. 2519-2529
    • Lin, P.L.1    Hsieh, C.K.2    Huang, P.W.3
  • 25
    • 48149100935 scopus 로고    scopus 로고
    • Dual watermark for image tamper detection and recovery
    • Lee T.Y., and Lin S.D. Dual watermark for image tamper detection and recovery. Pattern Recognition 41 (2008) 3497-3506
    • (2008) Pattern Recognition , vol.41 , pp. 3497-3506
    • Lee, T.Y.1    Lin, S.D.2
  • 26
    • 34848924292 scopus 로고    scopus 로고
    • Automatic image authentication and recovery using fractal code embedding and image inpainting
    • Wang S.S., and Tsai S.L. Automatic image authentication and recovery using fractal code embedding and image inpainting. Pattern Recognition 41 (2008) 701-712
    • (2008) Pattern Recognition , vol.41 , pp. 701-712
    • Wang, S.S.1    Tsai, S.L.2
  • 27
    • 34848926024 scopus 로고    scopus 로고
    • Four-scanning attack on hierarchical digital watermarking method for image tamper detection and recovery
    • Chang C.C., Fan Y.H., and Tai W.L. Four-scanning attack on hierarchical digital watermarking method for image tamper detection and recovery. Pattern Recognition 41 (2008) 654-661
    • (2008) Pattern Recognition , vol.41 , pp. 654-661
    • Chang, C.C.1    Fan, Y.H.2    Tai, W.L.3
  • 28
    • 0003602325 scopus 로고
    • The MD5 message digest algorithm
    • Technical Report
    • R.L. Rivest, The MD5 message digest algorithm, Technical Report, 1992.
    • (1992)
    • Rivest, R.L.1
  • 29
    • 0017930809 scopus 로고
    • A method for obtaining digital signatures and public-key cryptosystems
    • Rivest R.L., Shamir A., and Adleman L. A method for obtaining digital signatures and public-key cryptosystems. Commun. ACM 21 (February 1978) 120-126
    • (1978) Commun. ACM , vol.21 , pp. 120-126
    • Rivest, R.L.1    Shamir, A.2    Adleman, L.3
  • 30
    • 0018918171 scopus 로고
    • An algorithm for vector quantizer design
    • Linde Y., Buzo A., and Gray R.M. An algorithm for vector quantizer design. IEEE Trans. Commun. 28 1 (1980) 84-95
    • (1980) IEEE Trans. Commun. , vol.28 , Issue.1 , pp. 84-95
    • Linde, Y.1    Buzo, A.2    Gray, R.M.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.