메뉴 건너뛰기




Volumn 20, Issue 6, 2010, Pages 1597-1611

A novel DCT domain CRT-based watermarking scheme for image authentication surviving JPEG compression

Author keywords

Chinese remainder theorem; Digital image watermarking; Discrete cosine transform; JPEG compression

Indexed keywords

AUTHENTICATION; COPYRIGHTS; DISCRETE COSINE TRANSFORMS; IMAGE WATERMARKING; SINGULAR VALUE DECOMPOSITION; WATERMARKING;

EID: 77955417038     PISSN: 10512004     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.dsp.2010.03.010     Document Type: Article
Times cited : (168)

References (34)
  • 3
    • 0032625842 scopus 로고    scopus 로고
    • Watermarking as communication with side information
    • I.J. Cox, M.L. Miller, and A.L. Mckellips Watermarking as communication with side information Proc. IEEE 87 7 Jul. 1999 1127 1141
    • (1999) Proc. IEEE , vol.87 , Issue.7 , pp. 1127-1141
    • Cox, I.J.1    Miller, M.L.2    McKellips, A.L.3
  • 4
    • 0032075445 scopus 로고    scopus 로고
    • Robust image watermarking in the spatial domain
    • N. Nikolaidis, and I. Pitas Robust image watermarking in the spatial domain Signal Process. 66 Sep. 1997 385 403
    • (1997) Signal Process. , vol.66 , pp. 385-403
    • Nikolaidis, N.1    Pitas, I.2
  • 5
    • 0035473831 scopus 로고    scopus 로고
    • Secret and public key image watermarking schemes for image authentication and ownership verification
    • P.W. Wong, and N. Memon Secret and public key image watermarking schemes for image authentication and ownership verification IEEE Trans. Image Process. 10 10 Oct. 2001 1593 1601
    • (2001) IEEE Trans. Image Process. , vol.10 , Issue.10 , pp. 1593-1601
    • Wong, P.W.1    Memon, N.2
  • 6
    • 33646415682 scopus 로고    scopus 로고
    • Owner-customer right protection mechanism using a watermarking scheme and a watermarking protocol
    • T.H. Chen, and D.S. Tsai Owner-customer right protection mechanism using a watermarking scheme and a watermarking protocol Pattern Recogn. 39 8 Aug. 2006 1530 1541
    • (2006) Pattern Recogn. , vol.39 , Issue.8 , pp. 1530-1541
    • Chen, T.H.1    Tsai, D.S.2
  • 7
    • 0035248504 scopus 로고    scopus 로고
    • A robust image authentication method distinguishing JPEG compression from malicious manipulation
    • C.Y. Lin, and S.F. Chang A robust image authentication method distinguishing JPEG compression from malicious manipulation IEEE Trans. Circuits Systems Video Technol. 11 2 Feb. 2001 153 168
    • (2001) IEEE Trans. Circuits Systems Video Technol. , vol.11 , Issue.2 , pp. 153-168
    • Lin, C.Y.1    Chang, S.F.2
  • 8
    • 0032785523 scopus 로고    scopus 로고
    • Hidden digital watermarks in images
    • C.T. Hsu, and J.L. Wu Hidden digital watermarks in images IEEE Trans. Image Process. 8 1 Jan. 1999 58 68
    • (1999) IEEE Trans. Image Process. , vol.8 , Issue.1 , pp. 58-68
    • Hsu, C.T.1    Wu, J.L.2
  • 10
    • 34548561714 scopus 로고    scopus 로고
    • Human visual system based adaptive digital image watermarking
    • H. Qi, D. Zheng, and J. Zhao Human visual system based adaptive digital image watermarking Signal Process. 88 Jul. 2007 174 188
    • (2007) Signal Process. , vol.88 , pp. 174-188
    • Qi, H.1    Zheng, D.2    Zhao, J.3
  • 11
    • 72249103415 scopus 로고    scopus 로고
    • Wavelet-based watermarking for color images through visual masking
    • K.-C. Liu Wavelet-based watermarking for color images through visual masking AEU Int. J. Electronics Commun. 64 2 Feb. 2010 112 124
    • (2010) AEU Int. J. Electronics Commun. , vol.64 , Issue.2 , pp. 112-124
    • Liu, K.-C.1
  • 12
    • 47049094180 scopus 로고    scopus 로고
    • A simple ICA-based watermarking scheme
    • T.V. Nguyen, and J.C. Patra A simple ICA-based watermarking scheme Digital Signal Process. 18 2008 762 776
    • (2008) Digital Signal Process. , vol.18 , pp. 762-776
    • Nguyen, T.V.1    Patra, J.C.2
  • 13
    • 34547663506 scopus 로고    scopus 로고
    • Circularly orthogonal moments for geometrically robust image watermarking
    • Y. Xin, S. Liao, and M. Pawlak Circularly orthogonal moments for geometrically robust image watermarking Pattern Recogn. 40 May 2007 3740 3752
    • (2007) Pattern Recogn. , vol.40 , pp. 3740-3752
    • Xin, Y.1    Liao, S.2    Pawlak, M.3
  • 14
    • 7544229419 scopus 로고    scopus 로고
    • Applications of the naturalness preserving transform to image watermarking and data hiding
    • A.M. Ahmed, and D.D. Day Applications of the naturalness preserving transform to image watermarking and data hiding Digital Signal Process. 14 2004 531 549
    • (2004) Digital Signal Process. , vol.14 , pp. 531-549
    • Ahmed, A.M.1    Day, D.D.2
  • 15
    • 64549118174 scopus 로고    scopus 로고
    • A local Tchebichef moments-based robust image watermarking
    • C. Deng, X. Gao, X. Li, and D. Tao A local Tchebichef moments-based robust image watermarking Signal Process. 89 2009 1531 1539
    • (2009) Signal Process. , vol.89 , pp. 1531-1539
    • Deng, C.1    Gao, X.2    Li, X.3    Tao, D.4
  • 16
    • 0036502697 scopus 로고    scopus 로고
    • An SVD-based watermarking scheme for protecting rightful ownership
    • R. Liu, and T. Tan An SVD-based watermarking scheme for protecting rightful ownership IEEE Trans. Multimedia 4 1 Mar. 2002 121 128
    • (2002) IEEE Trans. Multimedia , vol.4 , Issue.1 , pp. 121-128
    • Liu, R.1    Tan, T.2
  • 17
    • 44649181049 scopus 로고    scopus 로고
    • An improved SVD-based watermarking scheme for protecting rightful ownership
    • A.A. Mohammad, A. Alhaj, and S. Shaltaf An improved SVD-based watermarking scheme for protecting rightful ownership Signal Process. 88 2008 2158 2180
    • (2008) Signal Process. , vol.88 , pp. 2158-2180
    • Mohammad, A.A.1    Alhaj, A.2    Shaltaf, S.3
  • 18
    • 33645221486 scopus 로고    scopus 로고
    • A semi-blind digital watermarking scheme based on singular value decomposition
    • J.M. Shieh, D.C. Lou, and M.C. Chang A semi-blind digital watermarking scheme based on singular value decomposition Comput. Stand. Interf. 28 4 Apr. 2006 428 440
    • (2006) Comput. Stand. Interf. , vol.28 , Issue.4 , pp. 428-440
    • Shieh, J.M.1    Lou, D.C.2    Chang, M.C.3
  • 19
    • 33646809377 scopus 로고    scopus 로고
    • An SVD-based watermarking method for image content authentication with improved security
    • March
    • S. Lee, D. Jang, C.D. Yoo, An SVD-based watermarking method for image content authentication with improved security, in: Proc. IEEE Int. Conf. on Acoustics, Speech, and Signal Process. vol. 2, March 2005, pp. 525-528
    • (2005) Proc. IEEE Int. Conf. on Acoustics, Speech, and Signal Process. , vol.2 , pp. 525-528
    • Lee, S.1    Jang, D.2    Yoo, C.D.3
  • 21
    • 19744376440 scopus 로고    scopus 로고
    • SVD-based digital image watermarking scheme
    • C.-C. Chang, P. Tsai, and C.-C. Lin SVD-based digital image watermarking scheme Pattern Recogn. Lett. 26 2005 1577 1586
    • (2005) Pattern Recogn. Lett. , vol.26 , pp. 1577-1586
    • Chang, C.-C.1    Tsai, P.2    Lin, C.-C.3
  • 25
    • 0036396975 scopus 로고    scopus 로고
    • Hierarchical access control based on Chinese remainder theorem
    • T.-S. Chen, and Y.-F. Chung Hierarchical access control based on Chinese remainder theorem Comp. Security 2 6 2002 565 570
    • (2002) Comp. Security , vol.2 , Issue.6 , pp. 565-570
    • Chen, T.-S.1    Chung, Y.-F.2
  • 26
    • 45549098627 scopus 로고    scopus 로고
    • Sharing secrets in stego images with authentication
    • C.-C. Chang, Y.-P. Hsieh, and C.-H. Lin Sharing secrets in stego images with authentication Pattern Recogn. 41 2008 3130 3137
    • (2008) Pattern Recogn. , vol.41 , pp. 3130-3137
    • Chang, C.-C.1    Hsieh, Y.-P.2    Lin, C.-H.3
  • 27
    • 27844564305 scopus 로고    scopus 로고
    • A combining method of quasi-cyclic LDPC codes by Chinese remainder theorem
    • S. Myung, and K. Yang A combining method of quasi-cyclic LDPC codes by Chinese remainder theorem IEEE Commun. Lett. 9 9 Sep. 2005 823 825
    • (2005) IEEE Commun. Lett. , vol.9 , Issue.9 , pp. 823-825
    • Myung, S.1    Yang, K.2
  • 28
    • 0346146968 scopus 로고    scopus 로고
    • RNS sign detector based on Chinese remainder theorem II (CRT II)
    • E. Al-Radadi, and P. Siy RNS sign detector based on Chinese remainder theorem II (CRT II) Comp. Math. Appl. 46 2003 1559 1570
    • (2003) Comp. Math. Appl. , vol.46 , pp. 1559-1570
    • Al-Radadi, E.1    Siy, P.2
  • 29
    • 56149118070 scopus 로고    scopus 로고
    • Robust t-out-of-n oblivious transfer mechanism based on CRT
    • C.-C. Chang, and J.-S. Lee Robust t-out-of-n oblivious transfer mechanism based on CRT J. Network Comp. Appl. 32 1 Jan. 2009 226 235
    • (2009) J. Network Comp. Appl. , vol.32 , Issue.1 , pp. 226-235
    • Chang, C.-C.1    Lee, J.-S.2
  • 31
    • 76349090439 scopus 로고    scopus 로고
    • A novel CRT-based watermarking technique for authentication of multimedia contents
    • J.C. Patra, A. Karthik, and C. Bornand A novel CRT-based watermarking technique for authentication of multimedia contents Digital Signal Process. 20 2010 442 453
    • (2010) Digital Signal Process. , vol.20 , pp. 442-453
    • Patra, J.C.1    Karthik, A.2    Bornand, C.3
  • 34
    • 33646870762 scopus 로고    scopus 로고
    • Blind MPEG-2 video watermarking robust against geometric attacks: A set of approaches in DCT domain
    • Y. Wang, and A. Pearmain Blind MPEG-2 video watermarking robust against geometric attacks: A set of approaches in DCT domain IEEE Trans. Image Process. 15 June 2006 1536 1543
    • (2006) IEEE Trans. Image Process. , vol.15 , pp. 1536-1543
    • Wang, Y.1    Pearmain, A.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.