메뉴 건너뛰기




Volumn 59, Issue 1, 2010, Pages 221-228

Reversible watermarking by modulation and security enhancement

Author keywords

3 d geometry; Authentication; Modulation; Reversible watermarking; Security

Indexed keywords

3-D GEOMETRY; MODULATION INFORMATION; POINT NUMBERS; PSEUDO RANDOM; RECOVERY INFORMATION; REVERSIBLE WATERMARKING; SECURITY ENHANCEMENTS; VIRTUAL REALITY MODELING LANGUAGE; WATERMARKING ALGORITHMS;

EID: 72349100046     PISSN: 00189456     EISSN: None     Source Type: Journal    
DOI: 10.1109/TIM.2009.2022453     Document Type: Conference Paper
Times cited : (42)

References (29)
  • 1
    • 0031362116 scopus 로고    scopus 로고
    • Secure spread spectrum watermarking for multimedia
    • I. J. Cox, J. Killian, T. Leighton, and T. Shamoon, "Secure spread spectrum watermarking for multimedia," IEEE Trans. Image Process.,vol.6, no. 12, pp. 1673-1687, Dec. 1997.
    • (1997) IEEE Trans. Image Process , vol.6 , Issue.12 , pp. 1673-1687
    • Cox, I.J.1    Killian, J.2    Leighton, T.3    Shamoon, T.4
  • 2
    • 0035333687 scopus 로고    scopus 로고
    • Quantization index modulation: A class of provably good methods for digital watermarking and information embedding
    • DOI 10.1109/18.923725, PII S0018944801028346
    • B. Chen and G. W. Wornell, "Quantization index modulation: A class of provably good methods for digital watermarking and information embedding," IEEE Trans. Inf. Theory, vol. 47, no. 4, pp. 1423-1443, May 2001. (Pubitemid 32508483)
    • (2001) IEEE Transactions on Information Theory , vol.47 , Issue.4 , pp. 1423-1443
    • Chen, B.1    Wornell, G.W.2
  • 4
    • 0242551677 scopus 로고    scopus 로고
    • Digital watermarking-based DCT and JPEG model
    • M. A. Suhail and M. S. Obaidat, "Digital watermarking-based DCT and JPEG model," IEEE Trans. Instrum. Meas., vol. 52, no. 5, pp. 1640-1647, Oct. 2003.
    • (2003) IEEE Trans. Instrum. Meas. , vol.52 , Issue.5 , pp. 1640-1647
    • Suhail, M.A.1    Obaidat, M.S.2
  • 5
    • 27644511220 scopus 로고    scopus 로고
    • An adaptive compressed MPEG-2 video watermarking scheme
    • S. Biswas, S. R. Das, and E. M. Petriu, "An adaptive compressed MPEG-2 video watermarking scheme," IEEE Trans. Instrum. Meas., vol. 54, no. 5, pp. 1853-1861, Oct. 2005.
    • (2005) IEEE Trans. Instrum. Meas. , vol.54 , Issue.5 , pp. 1853-1861
    • Biswas, S.1    Das, S.R.2    Petriu, E.M.3
  • 6
    • 33847625511 scopus 로고    scopus 로고
    • Speech quality evaluation: A new application of digital watermarking
    • DOI 10.1109/TIM.2006.887773
    • L. Cai, R. Tu, J. Zhao, and Y. Mao, "Speech quality evaluation: A new application of digital watermarking," IEEETrans. Instrum. Meas., vol. 56, no. 1, pp. 45-55, Feb. 2007. (Pubitemid 46349924)
    • (2007) IEEE Transactions on Instrumentation and Measurement , vol.56 , Issue.1 , pp. 45-55
    • Cai, L.1    Tu, R.2    Zhao, J.3    Mao, Y.4
  • 12
    • 84947260449 scopus 로고    scopus 로고
    • Distortion-free data embedding for images
    • New York, Apr
    • M. Goljan, J. Fridrich, and R. Du, "Distortion-free data embedding for images," in Proc. 4th Inf. Hiding Workshop, New York, Apr. 2001, vol. 2137, pp. 27-41.
    • (2001) Proc. 4th Inf. Hiding Workshop , vol.2137 , pp. 27-41
    • Goljan, M.1    Fridrich, J.2    Du, R.3
  • 13
    • 0141862029 scopus 로고    scopus 로고
    • Reversible data embedding using a difference expansion
    • J. Tian, "Reversible data embedding using a difference expansion," IEEE Trans. Circuits Syst. Video Technol., vol. 13, no. 8, pp. 890-896, Aug. 2003.
    • (2003) IEEE Trans. Circuits Syst. Video Technol , vol.13 , Issue.8 , pp. 890-896
    • Tian, J.1
  • 14
    • 20444476732 scopus 로고    scopus 로고
    • Prediction-error based reversible watermarking
    • D. M. Thodi and J. J. Rodriguez, "Prediction-error based reversible watermarking," in Proc. IEEE Int. Conf. Image Process., Oct. 2004, vol. 3, pp. 1549-1552.
    • (2004) Proc. IEEE Int. Conf. Image Process , vol.3 , pp. 1549-1552
    • Thodi, D.M.1    Rodriguez, J.J.2
  • 15
    • 0037028254 scopus 로고    scopus 로고
    • Distortionless data hiding based on integer wavelet transform
    • G. Xuan, J. Zhu, J. Chen, Y. Q. Shi, Z. Ni, and W. Su, "Distortionless data hiding based on integer wavelet transform," Electron. Lett., vol. 38, no. 25, pp. 1646-1648, Dec. 2002.
    • (2002) Electron. Lett. , vol.38 , Issue.25 , pp. 1646-1648
    • Xuan, G.1    Zhu, J.2    Chen, J.3    Shi, Y.Q.4    Ni, Z.5    Su, W.6
  • 16
    • 0038273964 scopus 로고    scopus 로고
    • Circular interpretation of bijective transformations in lossless watermarking for media asset management
    • C. De Vleeschouwer, J. E. Delaigle, and B. Macq, "Circular interpretation of bijective transformations in lossless watermarking for media asset management," IEEE Trans. Multimedia, vol. 5, no. 1, pp. 97-105, Mar. 2003.
    • (2003) IEEE Trans. Multimedia , vol.5 , Issue.1 , pp. 97-105
    • De Vleeschouwer, C.1    Delaigle, J.E.2    MacQ, B.3
  • 19
    • 84855673304 scopus 로고    scopus 로고
    • [Online]. Available
    • High Dynamic Range Imaging. [Online]. Available: http://en.wikipedia. org/wiki/High-dynamic-range-imaging
    • High Dynamic Range Imaging
  • 20
    • 33748879610 scopus 로고    scopus 로고
    • A reversible data hiding approach to mesh authentication
    • H. T. Wu and Y. M. Cheung, "A reversible data hiding approach to mesh authentication," in Proc. IEEE/WIC/ACM Int. Conf. WI, Sep. 2005, pp. 774-777.
    • (2005) Proc. IEEE/WIC/ACM Int. Conf. WI , pp. 774-777
    • Wu, H.T.1    Cheung, Y.M.2
  • 21
    • 34548289815 scopus 로고    scopus 로고
    • A sequential quantization strategy for data embedding and integrity verification
    • Y. M. Cheung and H. T. Wu, "A sequential quantization strategy for data embedding and integrity verification," IEEE Trans. Circuits Syst. Video Technol., vol. 17, no. 8, pp. 1007-1016, Aug. 2007.
    • (2007) IEEE Trans. Circuits Syst. Video Technol , vol.17 , Issue.8 , pp. 1007-1016
    • Cheung, Y.M.1    Wu, H.T.2
  • 24
    • 0032754443 scopus 로고    scopus 로고
    • Watermarking 3D objects for verification
    • B. L. Yeo and M. M. Yeung, "Watermarking 3D objects for verification," IEEE Comput. Graph. Appl., vol. 19, no. 1, pp. 36-45, Jan./Feb. 1999.
    • (1999) IEEE Comput. Graph. Appl. , vol.19 , Issue.1 , pp. 36-45
    • Yeo, B.L.1    Yeung, M.M.2
  • 25
    • 0342903151 scopus 로고    scopus 로고
    • Towards blind detection of robust watermarks in polygonal models
    • O. Benedens and C. Busch, "Towards blind detection of robust watermarks in polygonal models," in Proc. EUROGRAPHICS Comput. Graph. Forum, Aug. 2000, vol. 19, pp. 199-208.
    • (2000) Proc. EUROGRAPHICS Comput. Graph. Forum , vol.19 , pp. 199-208
    • Benedens, O.1    Busch, C.2
  • 27
    • 29044433393 scopus 로고    scopus 로고
    • Fragile watermarking for authenticating 3-D polygonal meshes
    • H. Y. S. Lin, H. Y. M. Liao, C. S. Lu, and J. C. Lin, "Fragile watermarking for authenticating 3-D polygonal meshes," IEEE Trans. Multimedia, vol. 7, no. 6, pp. 997-1006, Dec. 2005.
    • (2005) IEEE Trans. Multimedia , vol.7 , Issue.6 , pp. 997-1006
    • Lin, H.Y.S.1    Liao, H.Y.M.2    Lu, C.S.3    Lin, J.C.4
  • 28
    • 42549131775 scopus 로고    scopus 로고
    • Public Authentication of 3-D Mesh Models
    • Hong Kong
    • H. T. Wu and Y. M. Cheung, "Public Authentication of 3-D Mesh Models," in Proc. IEEE/WIC/ACM Int. Conf. WI, Hong Kong, Dec. 2006, pp. 940-948.
    • (2006) Proc. IEEE/WIC/ACM Int. Conf. WI , pp. 940-948
    • Wu, H.T.1    Cheung, Y.M.2
  • 29
    • 72349087752 scopus 로고    scopus 로고
    • [Online]. Available
    • The WinRAR Software. [Online]. Available: http://www.rarlab.com/
    • The WinRAR Software


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.