메뉴 건너뛰기




Volumn 5806 LNCS, Issue , 2009, Pages 132-145

Self-recovery fragile watermarking using block-neighborhood tampering characterization

Author keywords

Block neighborhood characterization; Constant average attack; Fragile watermarking; Self recovery

Indexed keywords

BLOCK-NEIGHBORHOOD CHARACTERIZATION; CONSTANT-AVERAGE ATTACK; FRAGILE WATERMARKING; IMAGE AUTHENTICATION; IMAGE BLOCKS; LEAST SIGNIFICANT BITS; SELF-RECOVERY; TAMPER DETECTION; TAMPER RECOVERY; VARIOUS ATTACKS;

EID: 70350440468     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-642-04431-1_10     Document Type: Conference Paper
Times cited : (34)

References (13)
  • 1
    • 0035473831 scopus 로고    scopus 로고
    • Secret and public key image watermarking schemes for image authentication and ownership verification
    • Wong, P., Memon, N.: Secret and public key image watermarking schemes for image authentication and ownership verification. IEEE Trans. Image process. 10(10), 1593-1601 (2001)
    • (2001) IEEE Trans. Image process , vol.10 , Issue.10 , pp. 1593-1601
    • Wong, P.1    Memon, N.2
  • 2
    • 33749166906 scopus 로고    scopus 로고
    • Multiscale fragile watermarking based on the Gaussian mixture model
    • Yuan, H., Zhang, X.-P.: Multiscale fragile watermarking based on the Gaussian mixture model. IEEE Trans. Image process. 15(10), 3189-3200 (2006)
    • (2006) IEEE Trans. Image process , vol.15 , Issue.10 , pp. 3189-3200
    • Yuan, H.1    Zhang, X.-P.2
  • 3
    • 34548765996 scopus 로고    scopus 로고
    • Statistical fragile watermarking capable of locating individual tampered pixels
    • Zhang, X., Wang, S.: Statistical fragile watermarking capable of locating individual tampered pixels. IEEE Signal Process. Lett. 14(10), 727-731 (2007)
    • (2007) IEEE Signal Process. Lett , vol.14 , Issue.10 , pp. 727-731
    • Zhang, X.1    Wang, S.2
  • 4
    • 56749105694 scopus 로고    scopus 로고
    • He, H.-J., Zhang, J.-S., Tai, H.-M.: Block-chain Based fragial watermarking Scheme with Superior Localization. In: Solanki, K., Sullivan, K., Madhow, U. (eds.) IH 2008. LNCS, 5284, pp. 147-160. Springer, Heidelberg (2008)
    • He, H.-J., Zhang, J.-S., Tai, H.-M.: Block-chain Based fragial watermarking Scheme with Superior Localization. In: Solanki, K., Sullivan, K., Madhow, U. (eds.) IH 2008. LNCS, vol. 5284, pp. 147-160. Springer, Heidelberg (2008)
  • 5
    • 0032648596 scopus 로고    scopus 로고
    • Digital watermarking for telltale tamper proofing and authentication
    • Kundur, D., Hatzinakos, D.: Digital watermarking for telltale tamper proofing and authentication. Proceedings of IEEE 87(7), 1167-1180 (1999)
    • (1999) Proceedings of IEEE , vol.87 , Issue.7 , pp. 1167-1180
    • Kundur, D.1    Hatzinakos, D.2
  • 7
    • 25144448272 scopus 로고    scopus 로고
    • A hierarchical digital watermarking method for image tamper detection and recovery
    • Lin, P.L., Hsieh, C.K., Huang, P.W.: A hierarchical digital watermarking method for image tamper detection and recovery. Pattern Recognition 38(12), 2519-2529 (2005)
    • (2005) Pattern Recognition , vol.38 , Issue.12 , pp. 2519-2529
    • Lin, P.L.1    Hsieh, C.K.2    Huang, P.W.3
  • 8
    • 34248661818 scopus 로고    scopus 로고
    • A majority-voting based watermarking scheme for color image tamper detection and recovery
    • Wang, M.S., Chen, W.C.: A majority-voting based watermarking scheme for color image tamper detection and recovery. Computer Standards & Interfaces 29(5), 561-570 (2007)
    • (2007) Computer Standards & Interfaces , vol.29 , Issue.5 , pp. 561-570
    • Wang, M.S.1    Chen, W.C.2
  • 9
    • 48149100935 scopus 로고    scopus 로고
    • Dual watermark for image tamper detection and recovery
    • Lee, T.-Y., Lin, S.D.: Dual watermark for image tamper detection and recovery. Pattern Recognition 41, 3497-3506 (2008)
    • (2008) Pattern Recognition , vol.41 , pp. 3497-3506
    • Lee, T.-Y.1    Lin, S.D.2
  • 10
    • 0033872149 scopus 로고    scopus 로고
    • Counterfeiting attacks on oblivious block-wise independent invisible watermarking schemes
    • Holliman, M., Memon, N.: Counterfeiting attacks on oblivious block-wise independent invisible watermarking schemes. IEEE Trans. Image Processing 9(3), 432-441 (2000)
    • (2000) IEEE Trans. Image Processing , vol.9 , Issue.3 , pp. 432-441
    • Holliman, M.1    Memon, N.2
  • 11
    • 0036530306 scopus 로고    scopus 로고
    • Cryptanalysis of the Yeung-Mintzer fragile watermarking technique
    • Fridrich, J., Goljan, M., Memon, N.: Cryptanalysis of the Yeung-Mintzer fragile watermarking technique. J. Electronic Imaging 11, 262-274 (2002)
    • (2002) J. Electronic Imaging , vol.11 , pp. 262-274
    • Fridrich, J.1    Goljan, M.2    Memon, N.3
  • 12
    • 34848926024 scopus 로고    scopus 로고
    • Four-scanning attack on hierarchical digital watermark-ing method for image tamper detection and recovery
    • Chang, C., Fan, Y.-H., Tai, W.-L.: Four-scanning attack on hierarchical digital watermark-ing method for image tamper detection and recovery. Pattern Recognition 41(2), 654-661 (2008)
    • (2008) Pattern Recognition , vol.41 , Issue.2 , pp. 654-661
    • Chang, C.1    Fan, Y.-H.2    Tai, W.-L.3
  • 13
    • 70350475349 scopus 로고    scopus 로고
    • He, H.J., Zhang, J.S., Wang, H.X.: Synchronous counterfeiting attacks on selfembedding watermarking schemes. Intern. J. Comput. Sci. Network Security 6(1), 251-257 (2006)
    • He, H.J., Zhang, J.S., Wang, H.X.: Synchronous counterfeiting attacks on selfembedding watermarking schemes. Intern. J. Comput. Sci. Network Security 6(1), 251-257 (2006)


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.