메뉴 건너뛰기




Volumn 42, Issue 1, 2011, Pages 82-88

FPGA and ASIC implementation of robust invisible binary image watermarking algorithm using connectivity preserving criteria

Author keywords

ASIC; FPGA; Low power VLSI; Multimedia; Watermarking

Indexed keywords

ASIC; DIGITAL DATAS; DIGITAL SIGNALS; FPGA; IMAGE WATERMARKING ALGORITHM; LOW POWER; MULTIMEDIA; SPATIAL DOMAINS; WATERMARKING ALGORITHMS; XILINX FPGA;

EID: 78650686444     PISSN: 00262692     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.mejo.2010.08.023     Document Type: Article
Times cited : (21)

References (38)
  • 3
    • 33646886925 scopus 로고    scopus 로고
    • M.S. Thesis, Department of Electrical Engineering, Indian Institute of Science, Bangalore, India
    • S.P. Mohanty, Digital watermarking of images M.S. Thesis, Department of Electrical Engineering, Indian Institute of Science, Bangalore, India, 1999.
    • (1999) Digital Watermarking of Images
    • Mohanty, S.P.1
  • 4
    • 84947943261 scopus 로고    scopus 로고
    • Protecting digital media content
    • N. Memon, and P.W. Wong Protecting digital media content Communications of the ACM 41 7 1998 35 43
    • (1998) Communications of the ACM , vol.41 , Issue.7 , pp. 35-43
    • Memon, N.1    Wong, P.W.2
  • 8
    • 0031271793 scopus 로고    scopus 로고
    • Watermarking cyberspace
    • H. Berghel Watermarking cyberspace Communications of the ACM 40 11 1997 19 24
    • (1997) Communications of the ACM , vol.40 , Issue.11 , pp. 19-24
    • Berghel, H.1
  • 9
    • 0032095654 scopus 로고    scopus 로고
    • Multimedia data embedding and watermarking technologies
    • M. Swanson, M. Kobayashi, and A. Tewfik Multimedia data embedding and watermarking technologies Proceedings of the IEEE 86 6 1998 1064 1087
    • (1998) Proceedings of the IEEE , vol.86 , Issue.6 , pp. 1064-1087
    • Swanson, M.1    Kobayashi, M.2    Tewfik, A.3
  • 10
    • 0032074580 scopus 로고    scopus 로고
    • Resolving rightful ownerships with invisible watermarking techniques: Limitations, attacks and implications
    • S. Craver, N. Memon, B.L. Yeo, and M.M. Yeung Resolving rightful ownerships with invisible watermarking techniques: limitations, attacks and implications IEEE Journal on Selected Areas in Communications 16 4 1998 573 586
    • (1998) IEEE Journal on Selected Areas in Communications , vol.16 , Issue.4 , pp. 573-586
    • Craver, S.1    Memon, N.2    Yeo, B.L.3    Yeung, M.M.4
  • 12
    • 14344265162 scopus 로고    scopus 로고
    • Digital fragile watermarking scheme for authentication of JPEG images
    • C.T. Li, Digital fragile watermarking scheme for authentication of JPEG images, in: IEE Proceedings-Vision, Image and Signal Processing, vol. 151(6), 2004, pp. 460-466.
    • (2004) IEE Proceedings-Vision, Image and Signal Processing , vol.151 , Issue.6 , pp. 460-466
    • Li, C.T.1
  • 14
    • 0035417219 scopus 로고    scopus 로고
    • Attacks on digital watermarks: Classification, estimation-based attacks and benchmarks
    • S. Voloshynovskiy, S. Pereira, T. Pun, J.J. Eggers, and J.K. Su Attacks on digital watermarks: classification, estimation-based attacks and benchmarks IEEE Communications Magazine 39 9 2001 118 126
    • (2001) IEEE Communications Magazine , vol.39 , Issue.9 , pp. 118-126
    • Voloshynovskiy, S.1    Pereira, S.2    Pun, T.3    Eggers, J.J.4    Su, J.K.5
  • 20
    • 0019021287 scopus 로고
    • Cross-correlation of Pseudorandom and Related Sequences
    • D.V. Sarwate, M.B. Pursley, Cross-correlation of Pseudorandom and Related Sequences, in: Proceedings of the IEEE, vol. 68(5), 1980, pp. 593-619.
    • (1980) Proceedings of the IEEE , vol.68 , Issue.5 , pp. 593-619
    • Sarwate, D.V.1    Pursley, M.B.2
  • 23
    • 0002500694 scopus 로고    scopus 로고
    • Image authentication techniques for surveillance applications
    • F. Bartolini, A. Tefas, M. Barni, and I. Pitas Image authentication techniques for surveillance applications Proceedings of the IEEE 89 10 2001 1403 1418
    • (2001) Proceedings of the IEEE , vol.89 , Issue.10 , pp. 1403-1418
    • Bartolini, F.1    Tefas, A.2    Barni, M.3    Pitas, I.4
  • 25
    • 34548736493 scopus 로고    scopus 로고
    • VLSI architecture and chip for combined invisible robust and fragile watermarking
    • S.P. Mohanty, E. Kougianos, and N. Ranganathan VLSI architecture and chip for combined invisible robust and fragile watermarking IET computers and digital Techniques 1 5 2007 600 611
    • (2007) IET Computers and Digital Techniques , vol.1 , Issue.5 , pp. 600-611
    • Mohanty, S.P.1    Kougianos, E.2    Ranganathan, N.3
  • 26
    • 33947611402 scopus 로고    scopus 로고
    • Pattern-based data hiding for binary image authentication by connectivity-preserving
    • DOI 10.1109/TMM.2006.887990
    • H. Yang, and A.C. Kot Pattern based data hiding for binary image authentication by connectivity-preserving IEEE Transactions on multimedia 9 3 2007 475 486 (Pubitemid 46479781)
    • (2007) IEEE Transactions on Multimedia , vol.9 , Issue.3 , pp. 475-486
    • Yang, H.1    Kot, A.C.2
  • 33
    • 34548736493 scopus 로고    scopus 로고
    • VLSI architecture and chip for combined invisible robust and fragile watermarking
    • S.P. Mohanty, E. Kougianos, and N. Ranganathan VLSI architecture and chip for combined invisible robust and fragile watermarking IETComput Digital Tech (CDT) 1 5 2007 600 611
    • (2007) IETComput Digital Tech (CDT) , vol.1 , Issue.5 , pp. 600-611
    • Mohanty, S.P.1    Kougianos, E.2    Ranganathan, N.3
  • 36
    • 0034245404 scopus 로고    scopus 로고
    • VLSI design of an efficient embedded zerotree wavelet coder with function of digital watermarking
    • S.F. Hsiao, Y.C. Tai, and K.H. Chang VLSI design of an efficient embedded zerotree wavelet coder with function of digital watermarking IEEE Transactions on Consumer Electronics 46 3 2000 628 636
    • (2000) IEEE Transactions on Consumer Electronics , vol.46 , Issue.3 , pp. 628-636
    • Hsiao, S.F.1    Tai, Y.C.2    Chang, K.H.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.