메뉴 건너뛰기




Volumn 179, Issue 22, 2009, Pages 3866-3884

A new data hiding scheme for binary image authentication with small image distortion

Author keywords

Authentication codes; Digital watermarking; Image authentication; Information hiding; Security

Indexed keywords

AUTHENTICATION CODES; AUTHENTICATION INFORMATION; COVER-IMAGE; DATA HIDING; DATA-EMBEDDING ALGORITHMS; DESIGNATED RECEIVERS; EDGE LINES; HAMMING CODE; IMAGE AUTHENTICATION; IMAGE DISTORTIONS; INFORMATION HIDING; MISS DETECTION; PEAK SIGNAL-TO-NOISE RATIO; SECURITY; SIMILARITY MEASURE; STEGANALYSIS; SYMMETRIC KEYS; VISUAL DISTORTION;

EID: 69549116445     PISSN: 00200255     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.ins.2009.07.014     Document Type: Article
Times cited : (49)

References (33)
  • 1
    • 84950772943 scopus 로고
    • A fast pseudo random permutation generator with applications for cryptology
    • Proc. Advances in Cryptology: CRYPTO
    • S. Akl, H. Meijer, A fast pseudo random permutation generator with applications for cryptology, in: Proc. Advances in Cryptology: CRYPTO, LNCS, vol. 196, 1985, pp. 269-275.
    • (1985) LNCS , vol.196 , pp. 269-275
    • Akl, S.1    Meijer, H.2
  • 2
    • 3042519430 scopus 로고    scopus 로고
    • An information-theoretic model for steganography
    • Cachin C. An information-theoretic model for steganography. Information and Computation 192 1 (2004) 41-56
    • (2004) Information and Computation , vol.192 , Issue.1 , pp. 41-56
    • Cachin, C.1
  • 3
    • 46749107047 scopus 로고    scopus 로고
    • Joint coding and embedding techniques for multimedia images
    • Chang C.-C., Wu W.-C., and Chen Y.-H. Joint coding and embedding techniques for multimedia images. Information Sciences 178 18 (2008) 3543-3556
    • (2008) Information Sciences , vol.178 , Issue.18 , pp. 3543-3556
    • Chang, C.-C.1    Wu, W.-C.2    Chen, Y.-H.3
  • 4
    • 27944495266 scopus 로고    scopus 로고
    • Objective distortion measure for binary images
    • J. Cheng, A.C. Kot, Objective distortion measure for binary images, in: Proc. IEEE TENCON, 2004, pp. 355-358.
    • (2004) Proc. IEEE TENCON , pp. 355-358
    • Cheng, J.1    Kot, A.C.2
  • 5
    • 34249000011 scopus 로고    scopus 로고
    • Objective distortion measure for binary text image based on edge line segment similarity
    • Cheng J., and Kot A.C. Objective distortion measure for binary text image based on edge line segment similarity. IEEE Transactions on Image Processing 16 6 (2007) 1691-1695
    • (2007) IEEE Transactions on Image Processing , vol.16 , Issue.6 , pp. 1691-1695
    • Cheng, J.1    Kot, A.C.2
  • 9
    • 69549096285 scopus 로고    scopus 로고
    • FIPS 140-2, Security requirements for cryptographic modules: compromising the security of the key establishment method, NIST.
    • FIPS 140-2, Security requirements for cryptographic modules: compromising the security of the key establishment method, NIST.
  • 11
    • 33749679756 scopus 로고    scopus 로고
    • Chaining watermarks for detecting malicious modifications to streaming data
    • Guo H., Li Y., and Jajodia S. Chaining watermarks for detecting malicious modifications to streaming data. Information Sciences 177 1 (2007) 281-298
    • (2007) Information Sciences , vol.177 , Issue.1 , pp. 281-298
    • Guo, H.1    Li, Y.2    Jajodia, S.3
  • 12
    • 84937438364 scopus 로고    scopus 로고
    • Provably secure steganography
    • Proc. Advances in Cryptology: CRYPTO
    • N. Hopper, J. Langford, L. von Ahn, Provably secure steganography, in: Proc. Advances in Cryptology: CRYPTO, LNCS, vol. 2442, 2002, pp. 77-92.
    • (2002) LNCS , vol.2442 , pp. 77-92
    • Hopper, N.1    Langford, J.2    von Ahn, L.3
  • 13
    • 40949091443 scopus 로고    scopus 로고
    • A color image watermarking scheme based on secret sharing and wavelet transform
    • Man and Cybernetics
    • S. Hsieh, J. Jian, I. Tsai, B. Huang, A color image watermarking scheme based on secret sharing and wavelet transform, in: Proc. IEEE International Conference on Systems, Man and Cybernetics, 2007, pp. 2143-2148.
    • (2007) Proc. IEEE International Conference on Systems , pp. 2143-2148
    • Hsieh, S.1    Jian, J.2    Tsai, I.3    Huang, B.4
  • 14
    • 33749597759 scopus 로고    scopus 로고
    • A new public-key authentication watermarking for binary document images resistant to parity checks
    • H. Kim, A new public-key authentication watermarking for binary document images resistant to parity checks, in: Proc: IEEE International Conferences on Image Processing (ICIP), vol. 2, 2005, pp. 1074-1077.
    • (2005) Proc: IEEE International Conferences on Image Processing (ICIP) , vol.2 , pp. 1074-1077
    • Kim, H.1
  • 16
    • 12344293379 scopus 로고    scopus 로고
    • A secure authentication watermarking for halftone and binary images
    • Kim H., and Afif A. A secure authentication watermarking for halftone and binary images. International Journal of Imaging Systems and Technology 14 4 (2004) 147-152
    • (2004) International Journal of Imaging Systems and Technology , vol.14 , Issue.4 , pp. 147-152
    • Kim, H.1    Afif, A.2
  • 17
    • 23944519396 scopus 로고    scopus 로고
    • Alteration-locating authentication watermarking for binary images
    • Proc. International Workshop on Digital Watermarking IWDW
    • H. Kim, R. Queiroz, Alteration-locating authentication watermarking for binary images, in: Proc. International Workshop on Digital Watermarking (IWDW), LNCS, vol. 3304, 2005, pp. 125-136.
    • (2005) LNCS , vol.3304 , pp. 125-136
    • Kim, H.1    Queiroz, R.2
  • 18
    • 38149087416 scopus 로고    scopus 로고
    • Message authentication on 64-bit architectures
    • Proc. Selected Areas in Cryptography
    • T. Krovetz, Message authentication on 64-bit architectures, in: Proc. Selected Areas in Cryptography, LNCS, vol. 4356, 2007, pp. 327-341.
    • (2007) LNCS , vol.4356 , pp. 327-341
    • Krovetz, T.1
  • 19
    • 58449112847 scopus 로고    scopus 로고
    • A new binary image authentication scheme with small distortion and low false negative rates
    • Lee Y., Hur J., Kim H., Park Y., and Yoon H. A new binary image authentication scheme with small distortion and low false negative rates. IEICE Transactions on Communications E90-B 11 (2007) 3259-3261
    • (2007) IEICE Transactions on Communications , vol.E90-B , Issue.11 , pp. 3259-3261
    • Lee, Y.1    Hur, J.2    Kim, H.3    Park, Y.4    Yoon, H.5
  • 20
    • 34248160605 scopus 로고    scopus 로고
    • A steganographic method based upon JPEG and particle swarm optimization algorithm
    • Li X., and Wang J. A steganographic method based upon JPEG and particle swarm optimization algorithm. Information Sciences 177 15 (2007) 3099-3109
    • (2007) Information Sciences , vol.177 , Issue.15 , pp. 3099-3109
    • Li, X.1    Wang, J.2
  • 22
    • 0442311212 scopus 로고    scopus 로고
    • Distance-reciprocal distortion measure for binary document images
    • Lu H., Kot A.C., and Shi Y. Distance-reciprocal distortion measure for binary document images. IEEE Signal Processing Letters 11 2 (2004) 228-231
    • (2004) IEEE Signal Processing Letters , vol.11 , Issue.2 , pp. 228-231
    • Lu, H.1    Kot, A.C.2    Shi, Y.3
  • 23
    • 0023984964 scopus 로고
    • How to construct pseudorandom permutations from pseudorandom functions
    • Luby M., and Rackoff C. How to construct pseudorandom permutations from pseudorandom functions. SIAM Journal on Computing 17 2 (1988) 373-386
    • (1988) SIAM Journal on Computing , vol.17 , Issue.2 , pp. 373-386
    • Luby, M.1    Rackoff, C.2
  • 24
    • 69549101781 scopus 로고    scopus 로고
    • Efficient-amplification of the security of weak pseudo-random function generators
    • Proc. Advances in Cryptology: EUROCRYPT
    • S. Myers, Efficient-amplification of the security of weak pseudo-random function generators, in: Proc. Advances in Cryptology: EUROCRYPT, LNCS, vol. 2045, 2001, pp. 358-372.
    • (2001) LNCS , vol.2045 , pp. 358-372
    • Myers, S.1
  • 26
    • 0036627368 scopus 로고    scopus 로고
    • A survey of watermarking algorithms for image authentication
    • Rey C., and Duglay R. A survey of watermarking algorithms for image authentication. EURASIP Journal on Applied Signal Processing 2002 6 (2002) 613-621
    • (2002) EURASIP Journal on Applied Signal Processing , vol.2002 , Issue.6 , pp. 613-621
    • Rey, C.1    Duglay, R.2
  • 27
    • 33750302031 scopus 로고    scopus 로고
    • Color image watermark extraction based on support vector machines
    • Tsai H., and Sun D. Color image watermark extraction based on support vector machines. Information Sciences 177 2 (2007) 550-569
    • (2007) Information Sciences , vol.177 , Issue.2 , pp. 550-569
    • Tsai, H.1    Sun, D.2
  • 28
    • 0141953943 scopus 로고    scopus 로고
    • A new approach to authentication of binary images for multimedia communication with distortion reduction and security enhancement
    • Tzeng C., and Tsai W. A new approach to authentication of binary images for multimedia communication with distortion reduction and security enhancement. IEEE Communications Letters 7 9 (2003) 443-445
    • (2003) IEEE Communications Letters , vol.7 , Issue.9 , pp. 443-445
    • Tzeng, C.1    Tsai, W.2
  • 29
    • 84937814312 scopus 로고    scopus 로고
    • A. Westfield, high capacity despite better steganalysis (F5-A steganographic algorithm), in: Proc. Information Hiding, 4th International Workshop, LNCS, 2137, 2001, pp. 289-302.
    • A. Westfield, high capacity despite better steganalysis (F5-A steganographic algorithm), in: Proc. Information Hiding, 4th International Workshop, LNCS, vol. 2137, 2001, pp. 289-302.
  • 30
    • 34047136082 scopus 로고    scopus 로고
    • Multiuser-based shadow watermark extraction system
    • Wang F., Yen K., Jain L., and Pan J. Multiuser-based shadow watermark extraction system. Information Sciences 177 12 (2007) 2522-2532
    • (2007) Information Sciences , vol.177 , Issue.12 , pp. 2522-2532
    • Wang, F.1    Yen, K.2    Jain, L.3    Pan, J.4
  • 32
    • 3242759877 scopus 로고    scopus 로고
    • Data hiding in binary images for authentication and annotation
    • Wu M., and Liu B. Data hiding in binary images for authentication and annotation. IEEE Transactions on Multimedia 6 4 (2004) 528-538
    • (2004) IEEE Transactions on Multimedia , vol.6 , Issue.4 , pp. 528-538
    • Wu, M.1    Liu, B.2
  • 33
    • 33947611402 scopus 로고    scopus 로고
    • Pattern-based data hiding for binary image authentication by connectivity-preserving
    • Yang H., and Kot A.C. Pattern-based data hiding for binary image authentication by connectivity-preserving. IEEE Transactions on Multimedia 9 3 (2007) 475-486
    • (2007) IEEE Transactions on Multimedia , vol.9 , Issue.3 , pp. 475-486
    • Yang, H.1    Kot, A.C.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.