메뉴 건너뛰기




Volumn 180, Issue 24, 2010, Pages 4909-4928

Digital image authentication and recovery: Employing integer transform based information embedding and extraction

Author keywords

Authentication; BCH coding; Embedding and extraction; Huffman Coding; Integer Discrete Cosine Transform (IDCT); Integer Wavelet Transform (IWT); self recovery and tamper localization; Watermarking

Indexed keywords

BCH CODING; EMBEDDING AND EXTRACTION; HUFFMAN CODING; INTEGER DISCRETE COSINE TRANSFORM; INTEGER WAVELET TRANSFORMS; SELF-RECOVERY;

EID: 77957684678     PISSN: 00200255     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.ins.2010.08.039     Document Type: Article
Times cited : (61)

References (44)
  • 1
    • 0002500694 scopus 로고    scopus 로고
    • Image authentication techniques for surveillance applications
    • F. Bartolini, A. Tefas, M. Barni, and I. Pitas Image authentication techniques for surveillance applications Proceeding of the IEEE 89 10 2001 1403 1418
    • (2001) Proceeding of the IEEE , vol.89 , Issue.10 , pp. 1403-1418
    • Bartolini, F.1    Tefas, A.2    Barni, M.3    Pitas, I.4
  • 2
    • 0036611838 scopus 로고    scopus 로고
    • Hierarchical watermarking for secure image authentication with localization
    • M.U. Celik, G. Sharma, E. Sabir, and A. Murat Hierarchical watermarking for secure image authentication with localization IEEE Transaction on Image Processing 11 6 2002 585 595
    • (2002) IEEE Transaction on Image Processing , vol.11 , Issue.6 , pp. 585-595
    • Celik, M.U.1    Sharma, G.2    Sabir, E.3    Murat, A.4
  • 4
    • 34848926024 scopus 로고    scopus 로고
    • Four-scanning attack on hierarchical digital watermarking method for image tamper detection and recovery
    • C.C. Chang, Y.H. Fan, and W.L. Tai Four-scanning attack on hierarchical digital watermarking method for image tamper detection and recovery Pattern Recognition, Elsevier Sciences 41 2008 654 661
    • (2008) Pattern Recognition, Elsevier Sciences , vol.41 , pp. 654-661
    • Chang, C.C.1    Fan, Y.H.2    Tai, W.L.3
  • 5
    • 64749113298 scopus 로고    scopus 로고
    • Preserving robustness and removability for digital watermarks using subsampling and difference correlation
    • C-C. Chang, P-Y. Lin, and J-S. Yeh Preserving robustness and removability for digital watermarks using subsampling and difference correlation Information Sciences, Elsevier Science 179 13 2009 2283 2293
    • (2009) Information Sciences, Elsevier Science , vol.179 , Issue.13 , pp. 2283-2293
    • Chang, C.-C.1    Lin, P.-Y.2    Yeh, J.-S.3
  • 7
    • 1842421975 scopus 로고    scopus 로고
    • Comparative Evaluation of semi-fragile watermarking algorithms
    • Ö. Ekici, B. Sankur, and M. Akay Comparative Evaluation of semi-fragile watermarking algorithms Journal of Electronic Imaging 13 1 2004 209 216
    • (2004) Journal of Electronic Imaging , vol.13 , Issue.1 , pp. 209-216
    • Ekici, Ö.1    Sankur, B.2    Akay, M.3
  • 9
    • 0033872149 scopus 로고    scopus 로고
    • Counterfeiting attacks on oblivious block-wise independent invisible watermarking schemes
    • M. Holiman, and N. Memon Counterfeiting attacks on oblivious block-wise independent invisible watermarking schemes IEEE Transactions on Image Processing 9 3 2000 432 441
    • (2000) IEEE Transactions on Image Processing , vol.9 , Issue.3 , pp. 432-441
    • Holiman, M.1    Memon, N.2
  • 10
    • 0035471787 scopus 로고    scopus 로고
    • Hiding digital watermarks using multiresolution wavelet transform
    • M.S. Hsieh, and D.C. Tseng Hiding digital watermarks using multiresolution wavelet transform IEEE Transactions on Industrial Electronics 48 7 2001 875 882
    • (2001) IEEE Transactions on Industrial Electronics , vol.48 , Issue.7 , pp. 875-882
    • Hsieh, M.S.1    Tseng, D.C.2
  • 11
    • 58049110896 scopus 로고    scopus 로고
    • Fidelity-guaranteed robustness enhancement of blind-detection watermarking schemes
    • C-H. Huang, and J-L. Wu Fidelity-guaranteed robustness enhancement of blind-detection watermarking schemes Information Sciences, Elsevier Science 179 6 2009 791 808
    • (2009) Information Sciences, Elsevier Science , vol.179 , Issue.6 , pp. 791-808
    • Huang, C.-H.1    Wu, J.-L.2
  • 13
    • 0035454036 scopus 로고    scopus 로고
    • Secure discrete cosine transform based technique for recoverable tamper proofing
    • K.L. Hung, C.C. Chang, and T.S. Chen Secure discrete cosine transform based technique for recoverable tamper proofing Optical Engineering 40 2001 1950 1958
    • (2001) Optical Engineering , vol.40 , pp. 1950-1958
    • Hung, K.L.1    Chang, C.C.2    Chen, T.S.3
  • 14
    • 67949091920 scopus 로고    scopus 로고
    • A Semi fragile watermarking scheme using weighted vote with sieve and emphasis for image authentication
    • N. Ishihara, and Koki ABE A Semi fragile watermarking scheme using weighted vote with sieve and emphasis for image authentication IEICE Transaction Fundamentals E90-A 5 2007 1045 1054
    • (2007) IEICE Transaction Fundamentals , vol.90 , Issue.5 , pp. 1045-1054
    • Ishihara, N.1    Abe, K.2
  • 15
    • 67949090392 scopus 로고    scopus 로고
    • PhD thesis, Faculty of Computer Science and Engineering, Ghulam Ishaq Khan Institute of Engineering Sciences and Technology
    • A. Khan, Intelligent perceptual shaping of a digital watermark, PhD thesis, Faculty of Computer Science and Engineering, Ghulam Ishaq Khan Institute of Engineering Sciences and Technology, 2006.
    • (2006) Intelligent Perceptual Shaping of A Digital Watermark
    • Khan, A.1
  • 16
    • 85013615185 scopus 로고    scopus 로고
    • A Novel approach to decoding: Exploiting anticipated attack information using genetic programming
    • A. Khan A Novel approach to decoding: exploiting anticipated attack information using genetic programming International Journal of Knowledge-Based Intelligent Engineering System 10 5 2006 337 347
    • (2006) International Journal of Knowledge-Based Intelligent Engineering System , vol.10 , Issue.5 , pp. 337-347
    • Khan, A.1
  • 17
    • 34249668816 scopus 로고    scopus 로고
    • Genetic perceptual shaping: Utilizing cover image and conceivable attack information during watermark embedding
    • A. Khan, and Anwar M. Mirza Genetic perceptual shaping: Utilizing cover image and conceivable attack information during watermark embedding Information Fusion, Elsevier Science 8 4 2007 354 365
    • (2007) Information Fusion, Elsevier Science , vol.8 , Issue.4 , pp. 354-365
    • Khan, A.1    Mirza, A.M.2
  • 19
    • 43049171623 scopus 로고    scopus 로고
    • Machine learning based adaptive watermark decoding in view of an anticipated attack
    • A. Khan, S.F. Tahir, A. Majid, and Tae-Sun Choi Machine learning based adaptive watermark decoding in view of an anticipated attack Pattern Recognition, Elsevier Science 41 2008 2594 2610
    • (2008) Pattern Recognition, Elsevier Science , vol.41 , pp. 2594-2610
    • Khan, A.1    Tahir, S.F.2    Majid, A.3    Choi, T.-S.4
  • 22
    • 0032648596 scopus 로고    scopus 로고
    • Digital watermarking for telltale tamper proofing and authentication
    • D. Kundur and D. Hatzinakos, Digital watermarking for telltale tamper proofing and authentication, in: Proceeding of IEEE 87, vol. 7, 1999, pp. 1167-1180.
    • (1999) Proceeding of IEEE 87 , vol.7 , pp. 1167-1180
    • Kundur, D.1    Hatzinakos, D.2
  • 23
    • 14344265162 scopus 로고    scopus 로고
    • Digital Fragile Watermarking Scheme for Authentication of JPEG Images
    • C.-T. Li Digital Fragile Watermarking Scheme for Authentication of JPEG Images IEE Proceedings-Vision, Image, and Signal Processing 151 6 2004 60 466
    • (2004) IEE Proceedings-Vision, Image, and Signal Processing , vol.151 , Issue.6 , pp. 60-466
    • Li, C.-T.1
  • 24
    • 34248667015 scopus 로고    scopus 로고
    • Wavelet-based fragile watermarking scheme for image authentication
    • C.-T. Li, and H. Si Wavelet-based fragile watermarking scheme for image authentication Journal of Electronic Imaging 16 1 2007 013009-1-013009-9
    • (2007) Journal of Electronic Imaging , vol.16 , Issue.1
    • Li, C.-T.1    Si, H.2
  • 25
    • 33947277938 scopus 로고    scopus 로고
    • Digital watermarking scheme exploiting non-deterministic dependence for image authentication
    • C.-T. Li, and Y. Yuan Digital watermarking scheme exploiting non-deterministic dependence for image authentication Optical Engineering 45 12 2006 127001-1 127001-6
    • (2006) Optical Engineering , vol.45 , Issue.12 , pp. 1270011-1270016
    • Li, C.-T.1    Yuan, Y.2
  • 27
    • 0033688392 scopus 로고    scopus 로고
    • Semi-fragile watermarking for authentication JPEG visual content
    • San Jose, CA 3971
    • C.Y. Lin and S.F. Chang, Semi-fragile watermarking for authentication JPEG visual content, Proceeding of the SPIE, San Jose, CA 3971, 2000, pp. 140-151.
    • (2000) Proceeding of the SPIE , pp. 140-151
    • Lin, C.Y.1    Chang, S.F.2
  • 28
    • 67650963693 scopus 로고    scopus 로고
    • Wavelet-based copyright-protection scheme for digital images based on local features
    • T-C. Lin, and M-C. Lin Wavelet-based copyright-protection scheme for digital images based on local features Information Sciences, Elsevier Science 179 19 2009 3349 3358
    • (2009) Information Sciences, Elsevier Science , vol.179 , Issue.19 , pp. 3349-3358
    • Lin, T.-C.1    Lin, M.-C.2
  • 31
    • 3042596485 scopus 로고    scopus 로고
    • A digital watermarking algorithm using correlation of the tree structure of DWT coefficients
    • Y.H. Seo, S.Y. Choi, S.H. Park, and D.W. Kim A digital watermarking algorithm using correlation of the tree structure of DWT coefficients IEICE Transactions Fundamentals E87-A 6 2004 1354 1374
    • (2004) IEICE Transactions Fundamentals , vol.87 , Issue.6 , pp. 1354-1374
    • Seo, Y.H.1    Choi, S.Y.2    Park, S.H.3    Kim, D.W.4
  • 33
    • 24144463679 scopus 로고    scopus 로고
    • Robust watermarking and compression for medical images based on genetic algorithms
    • F.Y. Shih, and Yi-Ta Wu Robust watermarking and compression for medical images based on genetic algorithms Information Sciences, Elsevier Science 175 2005 200 216
    • (2005) Information Sciences, Elsevier Science , vol.175 , pp. 200-216
    • Shih, F.Y.1    Wu, Y.-T.2
  • 34
  • 36
    • 8344236008 scopus 로고    scopus 로고
    • Fragile image watermarking using a gradient image for improved localization and security
    • S. Suthaharan Fragile image watermarking using a gradient image for improved localization and security Pattern Recognition Letters, Elsevier Science 25 16 2004 1893 1903
    • (2004) Pattern Recognition Letters, Elsevier Science , vol.25 , Issue.16 , pp. 1893-1903
    • Suthaharan, S.1
  • 39
    • 0033689971 scopus 로고    scopus 로고
    • Secure digital photograph handling with watermarking technique in insurance claim process
    • K. Toyokawa, N. Morimoto, S. Tonegawa, K. Kamijo, and A. Koide, Secure digital photograph handling with watermarking technique in insurance claim process, in: Proceedings of the SPIE, 3971 2000, pp. 438-445.
    • (2000) Proceedings of the SPIE , vol.3971 , pp. 438-445
    • Toyokawa, K.1    Morimoto, N.2    Tonegawa, S.3    Kamijo, K.4    Koide, A.5
  • 40
    • 0038729637 scopus 로고    scopus 로고
    • Detecting and restoring the tampered images based on iteration-free fractal compression
    • C.T. Wang, T.S. Chen, and S.H. He Detecting and restoring the tampered images based on iteration-free fractal compression Journal of Systems and Software 67 2003 131 140
    • (2003) Journal of Systems and Software , vol.67 , pp. 131-140
    • Wang, C.T.1    Chen, T.S.2    He, S.H.3
  • 42
    • 0242414172 scopus 로고
    • Visual optimization of DCT quantization matrices for individual images
    • San Diego, CA
    • A.B. Watson, Visual optimization of DCT quantization matrices for individual images, in: Proceedings of the AIAA Computing in Aerospace 9, San Diego, CA, 1993, pp. 286-291.
    • (1993) Proceedings of the AIAA Computing in Aerospace 9 , pp. 286-291
    • Watson, A.B.1
  • 43
    • 33244461499 scopus 로고    scopus 로고
    • Multiresolution fragile watermarking using complex chirp signals for content authentication
    • D. Yu, F. Sattar, and B. Barkat Multiresolution fragile watermarking using complex chirp signals for content authentication Pattern Recognition, Elsevier Science 39 5 2006 935 952
    • (2006) Pattern Recognition, Elsevier Science , vol.39 , Issue.5 , pp. 935-952
    • Yu, D.1    Sattar, F.2    Barkat, B.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.