메뉴 건너뛰기




Volumn 91, Issue 4, 2011, Pages 728-739

Secure fragile watermarking method for image authentication with improved tampering localisation and self-recovery capabilities

Author keywords

Fragile watermarking; Security; Self recovery; Tampering localisation

Indexed keywords

COVER-IMAGE; FRAGILE WATERMARKING; IMAGE AUTHENTICATION; LARGE DATA; LOCALISATION; SECURITY; SELF-RECOVERY; WATERMARKED PIXEL;

EID: 78650903851     PISSN: 01651684     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.sigpro.2010.07.019     Document Type: Article
Times cited : (59)

References (19)
  • 2
    • 0032312612 scopus 로고    scopus 로고
    • A public key watermark for image verification and authentication
    • Chicago, IL, USA
    • P.W. Wong, A public key watermark for image verification and authentication, in: Proceedings of ICIP International Conference on Image Processing, vol. 1, Chicago, IL, USA, 1998, pp. 455459.
    • (1998) Proceedings of ICIP - International Conference on Image Processing , vol.1 , pp. 455-459
    • Wong, P.W.1
  • 3
    • 0033872149 scopus 로고    scopus 로고
    • Counterfeiting attacks on oblivious block-wise independent invisible watermarking schemes
    • M. Holliman, and N. Memon Counterfeiting attacks on oblivious block-wise independent invisible watermarking schemes IEEE Transactions on Image Processing 9 3 2000 432 441
    • (2000) IEEE Transactions on Image Processing , vol.9 , Issue.3 , pp. 432-441
    • Holliman, M.1    Memon, N.2
  • 5
    • 0035473831 scopus 로고    scopus 로고
    • Secret and public key image watermarking schemes for image authentication and ownership verification
    • P. Wong, and N. Memon Secret and public key image watermarking schemes for image authentication and ownership verification IEEE Transactions on Image Processing 10 10 2001 1593 1601
    • (2001) IEEE Transactions on Image Processing , vol.10 , Issue.10 , pp. 1593-1601
    • Wong, P.1    Memon, N.2
  • 6
    • 0036030626 scopus 로고    scopus 로고
    • Security of fragile authentication watermarks with localization
    • CA, USA
    • J. Fridrich, Security of fragile authentication watermarks with localization, in: Proceedings of SPIE Photonic West, vol. 4675, CA, USA, 2002, pp. 691700.
    • (2002) Proceedings of SPIE - Photonic West , vol.4675 , pp. 691-700
    • Fridrich, J.1
  • 8
    • 8344236008 scopus 로고    scopus 로고
    • Fragile image watermarking using a gradient image for improved localization and security
    • S. Suthaharan Fragile image watermarking using a gradient image for improved localization and security Pattern Recognition Letters 25 16 2004 1893 1903
    • (2004) Pattern Recognition Letters , vol.25 , Issue.16 , pp. 1893-1903
    • Suthaharan, S.1
  • 9
    • 34548765996 scopus 로고    scopus 로고
    • Statistical fragile watermarking capable of locating individual tampered pixels
    • X. Zhang, and S. Wang Statistical fragile watermarking capable of locating individual tampered pixels IEEE Signal Processing Letters 14 10 2007 727 730
    • (2007) IEEE Signal Processing Letters , vol.14 , Issue.10 , pp. 727-730
    • Zhang, X.1    Wang, S.2
  • 10
    • 64549124300 scopus 로고    scopus 로고
    • Adjacent-block based statistical detection method for self-embedding watermarking techniques
    • H.J. He, J.S. Zhang, and F. Chen Adjacent-block based statistical detection method for self-embedding watermarking techniques Signal Processing 89 8 2009 1557 1566
    • (2009) Signal Processing , vol.89 , Issue.8 , pp. 1557-1566
    • He, H.J.1    Zhang, J.S.2    Chen, F.3
  • 11
    • 25144448272 scopus 로고    scopus 로고
    • A hierarchical digital watermarking method for image tamper detection and recovery
    • P.-L. Lin, C.-K. Hsieh, and P.-W. Huang A hierarchical digital watermarking method for image tamper detection and recovery Pattern Recognition 38 12 2005 2519 2529
    • (2005) Pattern Recognition , vol.38 , Issue.12 , pp. 2519-2529
    • Lin, P.-L.1    Hsieh, C.-K.2    Huang, P.-W.3
  • 12
    • 48149100935 scopus 로고    scopus 로고
    • Dual watermark for image tamper detection and recovery
    • T.Y. Lee, and S.D. Lin Dual watermark for image tamper detection and recovery Pattern Recognition 41 11 2008 3497 3506
    • (2008) Pattern Recognition , vol.41 , Issue.11 , pp. 3497-3506
    • Lee, T.Y.1    Lin, S.D.2
  • 13
    • 51849125894 scopus 로고    scopus 로고
    • A self-recovery fragile watermarking scheme for image authentication with superior localization
    • H.J. He, J.S. Zhang, and F. Chen A self-recovery fragile watermarking scheme for image authentication with superior localization Science in China Series F: Information Sciences 51 10 2008 1487 1507
    • (2008) Science in China Series F: Information Sciences , vol.51 , Issue.10 , pp. 1487-1507
    • He, H.J.1    Zhang, J.S.2    Chen, F.3
  • 14
    • 57849140746 scopus 로고    scopus 로고
    • Fragile watermarking with error-free restoration capability
    • X. Zhang, and S. Wang Fragile watermarking with error-free restoration capability IEEE Transactions on Multimedia 10 8 2008 1490 1499
    • (2008) IEEE Transactions on Multimedia , vol.10 , Issue.8 , pp. 1490-1499
    • Zhang, X.1    Wang, S.2
  • 15
    • 57749202706 scopus 로고    scopus 로고
    • Fragile watermarking scheme using a hierarchical mechanism
    • X. Zhang, and S. Wang Fragile watermarking scheme using a hierarchical mechanism Signal Processing 89 4 2009 675 679
    • (2009) Signal Processing , vol.89 , Issue.4 , pp. 675-679
    • Zhang, X.1    Wang, S.2
  • 16
    • 78650891633 scopus 로고    scopus 로고
    • Self-embedding watermark with flexible restoration quality
    • Published on-line on 25 May, doi: 10.1007/s11042-010-0541-z.
    • X. Zhang, S. Wang, Z. Qian, G. Feng, Self-embedding watermark with flexible restoration quality, Multimedia Tools and Applications. Published on-line on 25 May, doi: 10.1007/s11042-010-0541-z.
    • Multimedia Tools and Applications
    • Zhang, X.1    Wang, S.2    Qian, Z.3    Feng, G.4
  • 17
    • 0003629990 scopus 로고    scopus 로고
    • Washington, URL: FederalInformationProcessingStandard
    • Secure Hash Standard, National Institute of Standards and Technology, Washington, URL: 〈 http://csrc.nist.gov/publications/fips/ 〉, Federal Information Processing Standard, 2002, pp. 180182.
    • (2002) Secure Hash Standard, National Institute of Standards and Technology , pp. 180-182


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.