메뉴 건너뛰기




Volumn 17, Issue 4, 2008, Pages

Authentication and cross-recovery for multiple images

Author keywords

[No Author keywords available]

Indexed keywords

CRYPTOGRAPHIC HASH FUNCTIONS; DIGITAL IMAGE; DISTRIBUTED STORAGE; IMAGE AUTHENTICATION; INFORMATION HIDING; MULTIPLE IMAGE; THRESHOLD SCHEMES; TWO LAYERS;

EID: 70350675383     PISSN: 10179909     EISSN: 1560229X     Source Type: Journal    
DOI: 10.1117/1.2991410     Document Type: Article
Times cited : (6)

References (33)
  • 1
    • 0037818310 scopus 로고    scopus 로고
    • Structural digital signature for image authentication: An incidental distortion resistant scheme
    • C. S. Lu and H. Y. M. Liao, "Structural digital signature for image authentication: An incidental distortion resistant scheme," IEEE Trans. Multimedia 5(2), 161-173 (2003).
    • (2003) IEEE Trans. Multimedia , vol.5 , Issue.2 , pp. 161-173
    • Lu, C.S.1    Liao, H.Y.M.2
  • 2
    • 0035248504 scopus 로고    scopus 로고
    • A robust image authentication method distinguishing JPEG compression from malicious manipulation
    • C. Y. Lin and S. F. Chang, "A robust image authentication method distinguishing JPEG compression from malicious manipulation," IEEE Trans. Circuits Syst. Video Technol 11(2), 153-168 (2001).
    • (2001) IEEE Trans. Circuits Syst. Video Technol , vol.11 , Issue.2 , pp. 153-168
    • Lin, C.Y.1    Chang, S.F.2
  • 3
    • 0142029533 scopus 로고    scopus 로고
    • Using set partitioning in hierarchical tree to authenticate digital images
    • P. Tsai, Y. C. Hu, and C. C. Chang, "Using set partitioning in hierarchical tree to authenticate digital images," Signal Process. Image Commun, 18(9), 813-822 (2003).
    • (2003) Signal Process. Image Commun , vol.18 , Issue.9 , pp. 813-822
    • Tsai, P.1    Hu, Y.C.2    Chang, C.C.3
  • 4
    • 32644434350 scopus 로고    scopus 로고
    • A watermarking-based image ownership and tampering authentication scheme
    • C. C. Chang, Y. S. Hu, and T. C. Lu, "A watermarking-based image ownership and tampering authentication scheme," Pattern Recogn. Lett. 27(5), 439-446 (2006).
    • (2006) Pattern Recogn. Lett , vol.27 , Issue.5 , pp. 439-446
    • Chang, C.C.1    Hu, Y.S.2    Lu, T.C.3
  • 5
    • 0036611838 scopus 로고    scopus 로고
    • Hierarchical, watermarking for secure image authentication with localization
    • M. U. Ceilk, G. Sharma, E. Saber, and A. M. Tekalp, "Hierarchical, watermarking for secure image authentication with localization," IEEE Trans. Image Process. 11(6), 585-594 (2002).
    • (2002) IEEE Trans. Image Process , vol.11 , Issue.6 , pp. 585-594
    • Ceilk, M.U.1    Sharma, G.2    Saber, E.3    Tekalp, A.M.4
  • 6
    • 0035473831 scopus 로고    scopus 로고
    • Secret and public key image watermarking schemes for image authentication and ownership verification
    • 1.0
    • P. W. Wong and N. Memon, "Secret and public key image watermarking schemes for image authentication and ownership verification," IEEE Trans. Image Process. 10(1.0), 1593-1601 (2001).
    • (2001) IEEE Trans. Image Process , vol.10 , pp. 1593-1601
    • Wong, P.W.1    Memon, N.2
  • 7
    • 0347927731 scopus 로고    scopus 로고
    • Detection and restoration of tampered JPEG compressed images
    • H. C. Wu and C. C. Chang, "Detection and restoration of tampered JPEG compressed images," J. Syst. Softw. 64(2), 151-161 (2002).
    • (2002) J. Syst. Softw , vol.64 , Issue.2 , pp. 151-161
    • Wu, H.C.1    Chang, C.C.2
  • 8
    • 25144448272 scopus 로고    scopus 로고
    • A hierarchical digital watermarking method for image tamper detection and recovery
    • P. L. Lin, C. K. Hsieh, and P. W. Huang, "A hierarchical digital watermarking method for image tamper detection and recovery," Pattern Recogn. 38(12), 2519-2529 (2005).
    • (2005) Pattern Recogn , vol.38 , Issue.12 , pp. 2519-2529
    • Lin, P.L.1    Hsieh, C.K.2    Huang, P.W.3
  • 9
    • 33749378971 scopus 로고    scopus 로고
    • Content-based watermarking in image authentication allowing remedying of tampered images
    • F. H. Yen and G. C. Lee, "Content-based watermarking in image authentication allowing remedying of tampered images," Opt. Eng. 45(7), 077004 (2006).
    • (2006) Opt. Eng , vol.45 , Issue.7 , pp. 077004
    • Yen, F.H.1    Lee, G.C.2
  • 10
    • 33750303836 scopus 로고    scopus 로고
    • An efficient image authentication method based on Hamming code
    • C. S. Chan and C. C. Chang, "An efficient image authentication method based on Hamming code," Pattern Recogn. 40(2), 681-690 (2007).
    • (2007) Pattern Recogn , vol.40 , Issue.2 , pp. 681-690
    • Chan, C.S.1    Chang, C.C.2
  • 11
    • 0036794537 scopus 로고    scopus 로고
    • Secret image sharing
    • C. C. Thien and J. C. Lin, "Secret image sharing," Comput. Graphics 26(5), 765-770 (2002).
    • (2002) Comput. Graphics , vol.26 , Issue.5 , pp. 765-770
    • Thien, C.C.1    Lin, J.C.2
  • 12
    • 0018545449 scopus 로고
    • How to share a secret
    • A. Shamir, "How to share a secret," Commun. ACM 22(4), 612-613 (1979).
    • (1979) Commun. ACM , vol.22 , Issue.4 , pp. 612-613
    • Shamir, A.1
  • 14
    • 0032204204 scopus 로고    scopus 로고
    • Sharing secret images using shadow codebooks
    • C. C. Chang and R. J. Huang, "Sharing secret images using shadow codebooks," Inf. Sci. (N. Y.) 111(1-4), 335-345 (1998).
    • (1998) Inf. Sci. (N. Y.) , vol.111 , Issue.1-4 , pp. 335-345
    • Chang, C.C.1    Huang, R.J.2
  • 15
    • 0347946754 scopus 로고    scopus 로고
    • An image-sharing method with userfriendly shadow images
    • C. C. Thien and J. C. Lin, "An image-sharing method with userfriendly shadow images," IEEE Trans. Circuits Syst. Video Technol. 13(12), 1161-1169 (2003).
    • (2003) IEEE Trans. Circuits Syst. Video Technol , vol.13 , Issue.12 , pp. 1161-1169
    • Thien, C.C.1    Lin, J.C.2
  • 16
    • 4444342040 scopus 로고    scopus 로고
    • Secret image sharing with steganography and authentication
    • C. C. Lin and W. H. Tsai, "Secret image sharing with steganography and authentication," J. Syst. Softw. 73(3), 405-414 (2004).
    • (2004) J. Syst. Softw , vol.73 , Issue.3 , pp. 405-414
    • Lin, C.C.1    Tsai, W.H.2
  • 17
    • 25144517338 scopus 로고    scopus 로고
    • Fault-tolerant and progressive transmission of images
    • S. K. Chen and J. C. Lin, "Fault-tolerant and progressive transmission of images," Pattern Recogn. 38(12), 2466-2471 (2005).
    • (2005) Pattern Recogn , vol.38 , Issue.12 , pp. 2466-2471
    • Chen, S.K.1    Lin, J.C.2
  • 18
    • 34247221093 scopus 로고    scopus 로고
    • Scalable secret image sharing
    • R. Z. Wang and S. J. Shyu, "Scalable secret image sharing," Signal Process. Image Commun. 22(4), 363-373 (2007).
    • (2007) Signal Process. Image Commun , vol.22 , Issue.4 , pp. 363-373
    • Wang, R.Z.1    Shyu, S.J.2
  • 19
    • 34547689489 scopus 로고    scopus 로고
    • VCPSS: A two-in-one two-decoding-options image sharing method combining visual, cryptography (VC) and polynomial-style sharing (PSS) approaches
    • S. J. Lin and J. C. Lin, "VCPSS: A two-in-one two-decoding-options image sharing method combining visual, cryptography (VC) and polynomial-style sharing (PSS) approaches," Pattern Recogn, 40(12), 3652-3666 (2007).
    • (2007) Pattern Recogn , vol.40 , Issue.12 , pp. 3652-3666
    • Lin, S.J.1    Lin, J.C.2
  • 20
    • 0141741345 scopus 로고    scopus 로고
    • Secret image sharing with capability of share data reduction
    • C. C. Lin and W. H. Tsai, "Secret image sharing with capability of share data reduction," Opt. Eng. 42(8), 2340-2345 (2003).
    • (2003) Opt. Eng , vol.42 , Issue.8 , pp. 2340-2345
    • Lin, C.C.1    Tsai, W.H.2
  • 21
    • 14744284326 scopus 로고    scopus 로고
    • A new multi-secret images sharing scheme using Largrange's .interpolation
    • J. B. Feng, H. C. Wu, and C. S. Tsai, "A new multi-secret images sharing scheme using Largrange's .interpolation," J. Syst. Softw. 76(3), 327-339 (2005).
    • (2005) J. Syst. Softw , vol.76 , Issue.3 , pp. 327-339
    • Feng, J.B.1    Wu, H.C.2    Tsai, C.S.3
  • 24
    • 19944404261 scopus 로고    scopus 로고
    • Sharing visual multi-secrets using circle shares
    • H. C. Wu and C. C. Chang, "Sharing visual multi-secrets using circle shares," Computer Standards Interfaces 28(1), 123-135 (2005).
    • (2005) Computer Standards Interfaces , vol.28 , Issue.1 , pp. 123-135
    • Wu, H.C.1    Chang, C.C.2
  • 25
    • 0142057129 scopus 로고    scopus 로고
    • A simple and high-hiding capacity method for hiding digit-by-digit data in images based on modulus function
    • C. C. Thien and J. C. Lin, "A simple and high-hiding capacity method for hiding digit-by-digit data in images based on modulus function," Pattern Recogn. 36(12), 2875-2881 (2003).
    • (2003) Pattern Recogn , vol.36 , Issue.12 , pp. 2875-2881
    • Thien, C.C.1    Lin, J.C.2
  • 26
    • 0035283377 scopus 로고    scopus 로고
    • Image hiding by optimal LSB substitution and genetic algorithm
    • R. Z. Wang, C. F. Lin, and J. C. Lin, "Image hiding by optimal LSB substitution and genetic algorithm," Pattern Recogn. 34(3), 671-683 (2001).
    • (2001) Pattern Recogn , vol.34 , Issue.3 , pp. 671-683
    • Wang, R.Z.1    Lin, C.F.2    Lin, J.C.3
  • 27
    • 2442604250 scopus 로고    scopus 로고
    • Sharing and hiding secret images with size constraint
    • Y. S. Wu, C. C. Thien, and J. C. Lin, "Sharing and hiding secret images with size constraint," Pattern Recogn. 37(7), 1377-1385 (2004).
    • (2004) Pattern Recogn , vol.37 , Issue.7 , pp. 1377-1385
    • Wu, Y.S.1    Thien, C.C.2    Lin, J.C.3
  • 28
    • 0037410595 scopus 로고    scopus 로고
    • A steganographic method for images by pixel-value differencing
    • D. C. Wu and W. H. Tsai, "A steganographic method for images by pixel-value differencing," Pattern Recogn, Lett. 24(10), 1613-1626 (2003).
    • (2003) Pattern Recogn, Lett , vol.24 , Issue.10 , pp. 1613-1626
    • Wu, D.C.1    Tsai, W.H.2
  • 29
    • 33744984189 scopus 로고    scopus 로고
    • High, capacity image hiding scheme based on vector quantization
    • Y. C. Hu, "High, capacity image hiding scheme based on vector quantization," Pattern Recogn, 39(9), 10715-1724 (2006).
    • (2006) Pattern Recogn , vol.39 , Issue.9 , pp. 10715-11724
    • Hu, Y.C.1
  • 30
    • 33847761058 scopus 로고    scopus 로고
    • Image hiding by base-oriented algorithm
    • 1.1, 117001-1-10
    • C. Y. Yang and J. C. Lin, "Image hiding by base-oriented algorithm," Opt. Eng. 45(1.1), 117001-(1-10) (2006).
    • (2006) Opt. Eng , vol.45
    • Yang, C.Y.1    Lin, J.C.2
  • 32
    • 0031599142 scopus 로고    scopus 로고
    • Mersenne twister: A 623-dimensionally equidistributed uniform pseudorandom number generator
    • M. Matsumoto and T. Nishimura, "Mersenne twister: a 623-dimensionally equidistributed uniform pseudorandom number generator," ACM Trans. Model. Comput. Simul. 8(1) 3-30 (1998).
    • (1998) ACM Trans. Model. Comput. Simul , vol.8 , Issue.1 , pp. 3-30
    • Matsumoto, M.1    Nishimura, T.2
  • 33
    • 0347927730 scopus 로고    scopus 로고
    • Sharing multiple secrets in digital images
    • C. S. Tsai, C. C. Chang, and T. S. Chen, "Sharing multiple secrets in digital images," J. Syst. Softw. 64(2), 163-170 (2002).
    • (2002) J. Syst. Softw , vol.64 , Issue.2 , pp. 163-170
    • Tsai, C.S.1    Chang, C.C.2    Chen, T.S.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.