메뉴 건너뛰기




Volumn 36, Issue 3, 2010, Pages 578-584

Authentication and recovery of images using multiple watermarks

Author keywords

Authentication; Discrete Cosine Transform (DCT) self recovery; Integer Wavelet Transform (IWT); Multimedia Security; Watermarking

Indexed keywords

BLOCK-BASED APPROACHES; DIGITAL CONTENTS; EXPERIMENTAL INVESTIGATIONS; HOST IMAGES; INTEGER WAVELET TRANSFORMS; JPEG COMPRESSION; MALICIOUS ATTACK; MULTIMEDIA SECURITY; MULTIPLE WATERMARKS; REMOTE SENSING APPLICATIONS; SECURITY WEAKNESS; SELF-RECOVERY; SEMI-FRAGILE WATERMARKING; SEMIFRAGILE WATERMARK; SUB-BANDS; VIDEO SURVEILLANCE; WATERMARK BITS; WAVELET COEFFICIENTS; WAVELET DOMAIN;

EID: 77950629796     PISSN: 00457906     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.compeleceng.2009.12.003     Document Type: Article
Times cited : (76)

References (19)
  • 1
    • 84899293880 scopus 로고    scopus 로고
    • Li CT. Digital watermarking schemes for multimedia authentication. In: Digital watermarking for digital media. J. Seitz Idea Group Publishing; 2005. p. 30-51.
    • Li CT. Digital watermarking schemes for multimedia authentication. In: Digital watermarking for digital media. J. Seitz Idea Group Publishing; 2005. p. 30-51.
  • 2
    • 33644995185 scopus 로고    scopus 로고
    • Analysis and design of secure watermark-based authentication system
    • Fei C., Kundur D., and Kwong R.H. Analysis and design of secure watermark-based authentication system. IEEE Trans Inform Forensics Security 1 1 (2006) 43-55
    • (2006) IEEE Trans Inform Forensics Security , vol.1 , Issue.1 , pp. 43-55
    • Fei, C.1    Kundur, D.2    Kwong, R.H.3
  • 3
    • 59849106523 scopus 로고    scopus 로고
    • Dual purpose FWT domain spread spectrum image watermarking in real time
    • Maity S.P., Kundu M.K., and Maity S. Dual purpose FWT domain spread spectrum image watermarking in real time. Comput Electr Eng Elsevier Sci 35 2 (2008) 415-433
    • (2008) Comput Electr Eng Elsevier Sci , vol.35 , Issue.2 , pp. 415-433
    • Maity, S.P.1    Kundu, M.K.2    Maity, S.3
  • 4
    • 43049171623 scopus 로고    scopus 로고
    • Machine learning based adaptive watermark decoding in view of anticipated attack
    • Khan A., Tahir S.F., Majid A., and Choi T.S. Machine learning based adaptive watermark decoding in view of anticipated attack. Pattern Recogn Elsevier Sci 41 8 (2008) 2594-2610
    • (2008) Pattern Recogn Elsevier Sci , vol.41 , Issue.8 , pp. 2594-2610
    • Khan, A.1    Tahir, S.F.2    Majid, A.3    Choi, T.S.4
  • 5
    • 34249668816 scopus 로고    scopus 로고
    • Genetic perceptual shaping: utilizing cover image and conceivable attack information using genetic programming
    • Khan A., and Mirza A.M. Genetic perceptual shaping: utilizing cover image and conceivable attack information using genetic programming. Inform Fusion Elsevier Sci 8 4 (2007) 354-365
    • (2007) Inform Fusion Elsevier Sci , vol.8 , Issue.4 , pp. 354-365
    • Khan, A.1    Mirza, A.M.2
  • 6
    • 57849113106 scopus 로고    scopus 로고
    • Robust watermarking based on DWT and nonnegative matrix factorization
    • Lu W., Sun W., and Lu H. Robust watermarking based on DWT and nonnegative matrix factorization. Comput Electr Eng Elsevier Sci 35 1 (2009) 183-188
    • (2009) Comput Electr Eng Elsevier Sci , vol.35 , Issue.1 , pp. 183-188
    • Lu, W.1    Sun, W.2    Lu, H.3
  • 7
    • 0032648596 scopus 로고    scopus 로고
    • Digital watermarking for telltale tamper proofing and authentication
    • Kundur D., and Hatzinakos D. Digital watermarking for telltale tamper proofing and authentication. Proc IEEE 87 7 (1999) 1167-1180
    • (1999) Proc IEEE , vol.87 , Issue.7 , pp. 1167-1180
    • Kundur, D.1    Hatzinakos, D.2
  • 8
    • 68249151679 scopus 로고    scopus 로고
    • Alteration detection apparatus and method thereof
    • US patent, 6963655 B1
    • Tonegawa S, Morimoto N, Kamijoh K. Alteration detection apparatus and method thereof. US patent 2005; (6963655 B1).
    • (2005)
    • Tonegawa, S.1    Morimoto, N.2    Kamijoh, K.3
  • 9
    • 34047136082 scopus 로고    scopus 로고
    • Multiuser-based shadow watermark extraction system
    • Wang F.H., Yen K.K., Jain L.C., and Pan J.S. Multiuser-based shadow watermark extraction system. Inform Sci Elsevier Sci 177 12 (2007) 2522-2532
    • (2007) Inform Sci Elsevier Sci , vol.177 , Issue.12 , pp. 2522-2532
    • Wang, F.H.1    Yen, K.K.2    Jain, L.C.3    Pan, J.S.4
  • 10
    • 3042694654 scopus 로고    scopus 로고
    • Semi-fragile watermarking scheme for authentication of JPEG images
    • Ho C.K., and Li C.T. Semi-fragile watermarking scheme for authentication of JPEG images. Proc Int Conf Inform Technol: Coding Comput l.1 (2004) 7-11
    • (2004) Proc Int Conf Inform Technol: Coding Comput , Issue.l.1 , pp. 7-11
    • Ho, C.K.1    Li, C.T.2
  • 12
    • 34249002876 scopus 로고    scopus 로고
    • Self-recovery authentication of images in the DWT domain
    • Piva A., Bartolini F., and Caldelli R. Self-recovery authentication of images in the DWT domain. Int J Image Graphics 5 1 (2005) 149-165
    • (2005) Int J Image Graphics , vol.5 , Issue.1 , pp. 149-165
    • Piva, A.1    Bartolini, F.2    Caldelli, R.3
  • 14
    • 36548999210 scopus 로고    scopus 로고
    • Wavelet based image authentication and recovery
    • Chamlawi R., Khan A., and Idris A. Wavelet based image authentication and recovery. J Comput Sci Technol 22 6 (2007) 795-804
    • (2007) J Comput Sci Technol , vol.22 , Issue.6 , pp. 795-804
    • Chamlawi, R.1    Khan, A.2    Idris, A.3
  • 15
    • 25944478731 scopus 로고    scopus 로고
    • MS thesis Graduate, Department of Electrical and Computer Engineering, University of Toronto;
    • Zhao Y. Dual domain semi-fragile watermarking for image authentication. MS thesis Graduate, Department of Electrical and Computer Engineering, University of Toronto; 2003.
    • (2003) Dual domain semi-fragile watermarking for image authentication
    • Zhao, Y.1
  • 16
    • 67949091920 scopus 로고    scopus 로고
    • A semi fragile watermarking scheme using weighted vote with sieve and emphasis for image authentication
    • Ishihara N., and Koki A.B.E. A semi fragile watermarking scheme using weighted vote with sieve and emphasis for image authentication. IEICE Trans Fund E90-A 5 (2007) 1045-1054
    • (2007) IEICE Trans Fund , vol.E90-A , Issue.5 , pp. 1045-1054
    • Ishihara, N.1    Koki, A.B.E.2
  • 17
    • 0033872149 scopus 로고    scopus 로고
    • Counterfeiting attacks on oblivious block-wise independent invisible watermarking schemes
    • Holiman M., and Memon N. Counterfeiting attacks on oblivious block-wise independent invisible watermarking schemes. IEEE Trans Image Process 9 3 (2000) 432-441
    • (2000) IEEE Trans Image Process , vol.9 , Issue.3 , pp. 432-441
    • Holiman, M.1    Memon, N.2
  • 18
    • 33845568061 scopus 로고    scopus 로고
    • A secure semi-fragile watermarking for image authentication based on integer wavelet transform with parameters
    • New Castle, Australia;
    • Wu X, Hu J, Gu Z, Huang J. A secure semi-fragile watermarking for image authentication based on integer wavelet transform with parameters. Australian Information Security Workshop, New Castle, Australia; 2005. p. 75-80.
    • (2005) Australian Information Security Workshop , pp. 75-80
    • Wu, X.1    Hu, J.2    Gu, Z.3    Huang, J.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.