메뉴 건너뛰기




Volumn 19, Issue 8, 2009, Pages 1169-1177

Dual digital watermarking for internet media based on hybrid strategies

Author keywords

Copyright protection; Dual; Removable; Robustness; Subsampling; Visible; Watermarking

Indexed keywords

COPYRIGHT PROTECTION; DUAL; REMOVABLE; ROBUSTNESS; SUBSAMPLING; VISIBLE;

EID: 69449106422     PISSN: 10518215     EISSN: None     Source Type: Journal    
DOI: 10.1109/TCSVT.2009.2020263     Document Type: Article
Times cited : (51)

References (26)
  • 1
    • 0031362116 scopus 로고    scopus 로고
    • Secure spread spectrum watermarking for multimedia
    • Dec.
    • I. J. Cox, J. Kilian, F. T. Leighton, and T. Shamoon, "Secure spread spectrum watermarking for multimedia," IEEE Trans. Image Process., vol.6, no.12, pp. 1673-1687, Dec. 1997.
    • (1997) IEEE Trans. Image Process. , vol.6 , Issue.12 , pp. 1673-1687
    • Cox, I.J.1    Kilian, J.2    Leighton, F.T.3    Shamoon, T.4
  • 2
    • 0032673448 scopus 로고    scopus 로고
    • A watermarking technique based on one-way hash functions
    • May
    • M. S. Hwang, C. C. Chang, and K. F. Hwang, "A watermarking technique based on one-way hash functions," IEEE Trans. Consumer Electron., vol.45, no.2, pp. 286-294, May 1999.
    • (1999) IEEE Trans. Consumer Electron. , vol.45 , Issue.2 , pp. 286-294
    • Hwang, M.S.1    Chang, C.C.2    Hwang, K.F.3
  • 3
    • 0035333285 scopus 로고    scopus 로고
    • Improved wavelet-based watermarking through pixel-wise masking
    • May
    • M. Barni, F. Bartolini, and A. Piva, "Improved wavelet-based watermarking through pixel-wise masking," IEEE Trans. Image Process., vol.10, no.5, pp. 783-79.1, May 2001.
    • (2001) IEEE Trans. Image Process. , vol.10 , Issue.5 , pp. 783-791
    • Barni, M.1    Bartolini, F.2    Piva, A.3
  • 4
    • 34547662251 scopus 로고    scopus 로고
    • Digital watermarking based on chaotic map and reference register
    • Dec.
    • Y. T. Wu and Y. Shih, "Digital watermarking based on chaotic map and reference register," Pattern Recognition, vol.40, no.12, pp. 3753-3763, Dec. 2007.
    • (2007) Pattern Recognition , vol.40 , Issue.12 , pp. 3753-3763
    • Wu, Y.T.1    Shih, Y.2
  • 5
    • 34848926024 scopus 로고    scopus 로고
    • Four-scanning attack on hierarchical digital watermarking method for image tamper detection and recovery
    • Feb.
    • C. C. Chang, Y. H. Fan and, W. L. Tai, "Four-scanning attack on hierarchical digital watermarking method for image tamper detection and recovery," Pattern Recognition, vol.41, no. 2, pp. 654-661, Feb. 2008.
    • (2008) Pattern Recognition , vol.41 , Issue.2 , pp. 654-661
    • Chang, C.C.1    Fan, Y.H.2    Tai, W.L.3
  • 6
    • 0038612961 scopus 로고    scopus 로고
    • DCT-based image watermarking using subsampling
    • Mar.
    • W. C. Chu, "DCT-based image watermarking using subsampling," IEEE Trans. Multimedia, vol.5, no.1, pp. 34-38, Mar. 2003.
    • (2003) IEEE Trans. Multimedia , vol.5 , Issue.1 , pp. 34-38
    • Chu, W.C.1
  • 7
    • 33646242245 scopus 로고    scopus 로고
    • Low power block-based watermarking algorithm
    • Apr.
    • Y. T. Pai and S. J. Ruan, "Low power block-based watermarking algorithm," IEICE Trans. Inform, and. Syst., vol.E89-D, no.4, pp. 1507-1514, Apr. 2006.
    • (2006) IEICE Trans. Inform, and Syst. , vol.E89-D , Issue.4 , pp. 1507-1514
    • Pai, Y.T.1    Ruan, S.J.2
  • 8
    • 33750491245 scopus 로고    scopus 로고
    • Robust digital image watermarking based on subsampling
    • Oct.
    • W. Lu, H. Lu, and F. L. Chung, "Robust digital image watermarking based on subsampling," Appl. Math. Comput., vol.181, no.2, pp. 886-893, Oct. 2006.
    • (2006) Appl. Math. Comput. , vol.181 , Issue.2 , pp. 886-893
    • Lu, W.1    Lu, H.2    Chung, F.L.3
  • 9
    • 44049085895 scopus 로고    scopus 로고
    • Adaptive watermark mechanism for rightful ownership protection
    • Jul.
    • C. C. Chang and P. Y. Lin, "Adaptive watermark mechanism for rightful ownership protection," J. Syst. Software, vol.81, no.7, pp. 1118-1129, Jul. 2008.
    • (2008) J. Syst. Software , vol.81 , Issue.7 , pp. 1118-1129
    • Chang, C.C.1    Lin, P.Y.2
  • 10
    • 0742269025 scopus 로고    scopus 로고
    • Attacking visible watermarking schemes
    • Feb.
    • C. H. Huang and J. L. Wu, "Attacking visible watermarking schemes," IEEE Trans. Multimedia, vol.6, no.1, pp. 16-30, Feb. 2004.
    • (2004) IEEE Trans. Multimedia , vol.6 , Issue.1 , pp. 16-30
    • Huang, C.H.1    Wu, J.L.2
  • 11
    • 33845683390 scopus 로고    scopus 로고
    • A novel image recovery algorithm for visible watermarked image
    • Dec.
    • S. C. Pei and Y. C. Zeng, "A novel image recovery algorithm for visible watermarked image," IEEE Trans. Inform. Forensics Security, vol.1, no.4, pp. 543-550, Dec. 2006.
    • (2006) IEEE Trans. Inform. Forensics Security , vol.1 , Issue.4 , pp. 543-550
    • Pei, S.C.1    Zeng, Y.C.2
  • 12
    • 0036556071 scopus 로고    scopus 로고
    • Combinational image watermarking in the spatial and frequency domains
    • Apr.
    • Y. Shih and Y. T. Wu, "Combinational image watermarking in the spatial and frequency domains," Pattern Recognition, vol.36, no.4, pp. 969-975, Apr. 2003.
    • (2003) Pattern Recognition , vol.36 , Issue.4 , pp. 969-975
    • Shih, Y.1    Wu, Y.T.2
  • 14
    • 4344620970 scopus 로고    scopus 로고
    • Using invisible watermarks to protect visibly watermarked images
    • Y. Hu, S. Kwong, and J. Huang, "Using invisible watermarks to protect visibly watermarked images," in Proc. 2004 Int. Symp. Circuits Syst., vol.5. pp. 584-587.
    • Proc. 2004 Int. Symp. Circuits Syst. , vol.5 , pp. 584-587
    • Hu, Y.1    Kwong, S.2    Huang, J.3
  • 15
    • 0141862029 scopus 로고    scopus 로고
    • Reversible data embedding using difference expansion
    • Aug.
    • J. Tian, "Reversible data embedding using difference expansion," IEEE Trans. Circuits Syst. Video Technol., vol.13, no.8, pp. 890-896, Aug. 2003.
    • (2003) IEEE Trans. Circuits Syst. Video Technol. , vol.13 , Issue.8 , pp. 890-896
    • Tian, J.1
  • 16
    • 3843102623 scopus 로고    scopus 로고
    • Reversible watermark using the difference expansion of a generalized integer transform
    • Aug.
    • A. M. Alattar, "Reversible watermark using the difference expansion of a generalized integer transform," IEEE Trans. Image Process., vol.13, no.8, pp. 1147-1156, Aug. 2004.
    • (2004) IEEE Trans. Image Process. , vol.13 , Issue.8 , pp. 1147-1156
    • Alattar, A.M.1
  • 17
    • 33645152302 scopus 로고    scopus 로고
    • Lossless watermarking for image authentication: A new framework and an implementation
    • Apr.
    • M. U. Celik, G. Sharma, and A. M. Tekalp, "Lossless watermarking for image authentication: A new framework and an implementation," IEEE Trans. Image Process., vol.15, no.4, pp. 1042-1049, Apr. 2006.
    • (2006) IEEE Trans. Image Process. , vol.15 , Issue.4 , pp. 1042-1049
    • Celik, M.U.1    Sharma, G.2    Tekalp, A.M.3
  • 18
    • 33751501445 scopus 로고    scopus 로고
    • A reversible data hiding scheme based on side match vector quantization
    • Oct.
    • C. C. Chang, W. L. Tai, and C. C. Lin, "A reversible data hiding scheme based on side match vector quantization," IEEE Trans. Circuits Syst. Video Technol., vol.16, no.10, pp. 1301-1308, Oct. 2006.
    • (2006) IEEE Trans. Circuits Syst. Video Technol. , vol.16 , Issue.10 , pp. 1301-1308
    • Chang, C.C.1    Tai, W.L.2    Lin, C.C.3
  • 19
    • 34548056717 scopus 로고    scopus 로고
    • Lossless data embedding with high embedding capacity based on declustering for VQ-compressed codes
    • Sep.
    • C. C. Chang, Y. P. Hsieh, and C. Y. Lin, "Lossless data embedding with high embedding capacity based on declustering for VQ-compressed codes," IEEE Trans. Inform. Forensics Security, vol.2, no.3, pp. 341-349, Sep. 2007.
    • (2007) IEEE Trans. Inform. Forensics Security , vol.2 , Issue.3 , pp. 341-349
    • Chang, C.C.1    Hsieh, Y.P.2    Lin, C.Y.3
  • 20
    • 33947247978 scopus 로고    scopus 로고
    • Expansion embedding techniques for reversible watermarking
    • Mar.
    • D. M. Thodi and J. J. Rodriguez, "Expansion embedding techniques for reversible watermarking," IEEE Trans. Image Process., vol.16, no.3, pp. 721-730, Mar. 2007.
    • (2007) IEEE Trans. Image Process. , vol.16 , Issue.3 , pp. 721-730
    • Thodi, D.M.1    Rodriguez, J.J.2
  • 21
    • 38949136659 scopus 로고    scopus 로고
    • Adaptive lossless steganographic scheme with centralized difference expansion
    • Jun.
    • C. C. Lee, H. C. Wu, C. S. Tsai, and Y. P. Chu, "Adaptive lossless steganographic scheme with centralized difference expansion," Pattern Recognition, vol.41, no.6, pp. 2097-2106, Jun. 2008.
    • (2008) Pattern Recognition , vol.41 , Issue.6 , pp. 2097-2106
    • Lee, C.C.1    Wu, H.C.2    Tsai, C.S.3    Chu, Y.P.4
  • 22
    • 64349085584 scopus 로고    scopus 로고
    • Robust lossless image data hiding designed for semi-fragile image authentication
    • Apr.
    • Z. Ni, Y. Q. Shi, N. Ansari, W. Su, Q. Sun, and X. Lin, "Robust lossless image data hiding designed for semi-fragile image authentication," IEEE Trans. Circuits Syst. Video Technol., vol.18, no.4, pp. 497-509, Apr. 2008.
    • (2008) IEEE Trans. Circuits Syst. Video Technol. , vol.18 , Issue.4 , pp. 497-509
    • Ni, Z.1    Shi, Y.Q.2    Ansari, N.3    Su, W.4    Sun, Q.5    Lin, X.6
  • 23
    • 31644441170 scopus 로고    scopus 로고
    • An algorithm for removable visible watermarking
    • Jan.
    • Y. Hu, S. Kwong, and J. Huang, "An algorithm for removable visible watermarking," IEEE Trans. Circuits Syst. Video Technol., vol.16, no.1, pp. 129-133, Jan. 2006.
    • (2006) IEEE Trans. Circuits Syst. Video Technol. , vol.16 , Issue.1 , pp. 129-133
    • Hu, Y.1    Kwong, S.2    Huang, J.3
  • 24
    • 33751540118 scopus 로고    scopus 로고
    • Reversible visible watermarking and lossless recovery of original images
    • Nov.
    • Y. Hu and B. Jeon, "Reversible visible watermarking and lossless recovery of original images," IEEE Trans. Circuits Syst. Video Technol., vol.16, no.11, pp. 1423-1429, Nov. 2006.
    • (2006) IEEE Trans. Circuits Syst. Video Technol. , vol.16 , Issue.11 , pp. 1423-1429
    • Hu, Y.1    Jeon, B.2
  • 25
    • 85076054853 scopus 로고
    • DCT quantization matrices visually optimized for individual images
    • Bellingham, WA: SPIE, Feb.
    • A. B. Watson, "DCT quantization matrices visually optimized for individual images," in Human vision, Visual Process., Digital Display IV, vol.1913, Bellingham, WA: SPIE, Feb. 1993, pp. 202-216.
    • (1993) Human Vision, Visual Process., Digital Display IV , vol.1913 , pp. 202-216
    • Watson, A.B.1
  • 26
    • 34248661818 scopus 로고    scopus 로고
    • A majority-voting based watermarking scheme for color image tamper detection and recovery
    • Jul.
    • M. S. Wang and W. C. Chen, "A majority-voting based watermarking scheme for color image tamper detection and recovery," Comput. Standards Interfaces, vol.29, no.5, pp. 561-570, Jul. 2007.
    • (2007) Comput. Standards Interfaces , vol.29 , Issue.5 , pp. 561-570
    • Wang, M.S.1    Chen, W.C.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.