메뉴 건너뛰기




Volumn , Issue , 2010, Pages 394-398

Multipurpose image watermarking scheme based on self-embedding and data hiding into halftone image

Author keywords

[No Author keywords available]

Indexed keywords

CONTENT AUTHENTICATION; COPYRIGHT PROTECTIONS; DATA HIDING; EMBEDDING ALGORITHMS; HALFTONE IMAGES; HALFTONING METHODS; IMAGE WATERMARKING; INTEGER WAVELET TRANSFORMS; ORIGINAL IMAGES; QUANTIZATION INDEX MODULATION; WATERMARK IMAGES; WATERMARK SEQUENCES;

EID: 79951608149     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/CERMA.2010.112     Document Type: Conference Paper
Times cited : (2)

References (8)
  • 1
    • 79951607702 scopus 로고    scopus 로고
    • TheNationalArchives, http://www.nationalarchives.gov.uk/news/stories/195. htm?homepage=newsS, 2008.
    • (2008) TheNationalArchives
  • 2
    • 0031362116 scopus 로고    scopus 로고
    • Secure spread spectrum watermarking for multimedia
    • PII S1057714997084601
    • I. J. Cox, J. Kilian, F. T. Leighton and T. Shamoon. "Secure Spread Spectrum Watermarking for Multimedia", IEEE Transactions on Image Processing, 6 (12), pp. 1673-1687, 1997. (Pubitemid 127770522)
    • (1997) IEEE Transactions on Image Processing , vol.6 , Issue.12 , pp. 1673-1687
    • Cox, I.J.1    Kilian, J.2    Leighton, F.T.3    Shamoon, T.4
  • 3
    • 0036611838 scopus 로고    scopus 로고
    • Hierarchical watermarking for secure image authentication with localization
    • DOI 10.1109/TIP.2002.1014990, PII S1057714902047917
    • M. Celik, G. Sharma, E. Saber and A. Tekalp, "Hierarchical Watermarking for Secure Image Authentication with Localization", IEEE Trans. on Image Processing, 11(6), pp. 585-595, 2002. (Pubitemid 34814383)
    • (2002) IEEE Transactions on Image Processing , vol.11 , Issue.6 , pp. 585-595
    • Celik, M.U.1    Sharma, G.2    Saber, E.3    Tekalp, A.M.4
  • 4
    • 31344433959 scopus 로고    scopus 로고
    • New semi-fragile image authentication watermarking techniques using random bias and nonuniform quantization
    • DOI 10.1109/TMM.2005.861293
    • K. Maeno, Q. Sun, S. Chang and M. Suto, "New Semi-Fragile Image Authentication Watermarking Techniques using Random Bias and Nonuniform Quantization", IEEE Trans. on Multimedia, 8(1), pp. 32-45, 2006. (Pubitemid 43146128)
    • (2006) IEEE Transactions on Multimedia , vol.8 , Issue.1 , pp. 32-45
    • Maeno, K.1    Sun, Q.2    Chang, S.-F.3    Suto, M.4
  • 5
    • 0035473830 scopus 로고    scopus 로고
    • Multipurpose watermarking for image authentication and protection
    • DOI 10.1109/83.951542, PII S1057714901082100
    • C-S. Lu and H-Y Liao, "Multipurpose Watermarking for Image authentication and Protection", IEEE Trans. on Image Processing, 10(10), pp. 1579-1592, 2001. (Pubitemid 32981830)
    • (2001) IEEE Transactions on Image Processing , vol.10 , Issue.10 , pp. 1579-1592
    • Lu, C.-S.1    Liao, H.-Y.M.2
  • 7
    • 3242759877 scopus 로고    scopus 로고
    • Data hiding in binary image for authentication and annotation
    • M. Wu, N. Liu, "Data Hiding in Binary Image for Authentication and Annotation", IEEE Trans on Multimedia, 6(4), pp. 528-538, 2004.
    • (2004) IEEE Trans on Multimedia , vol.6 , Issue.4 , pp. 528-538
    • Wu, M.1    Liu, N.2
  • 8
    • 0035120998 scopus 로고    scopus 로고
    • Adaptive threshold modulation for error diffusion halftoning
    • DOI 10.1109/83.892447
    • N. Venkata, B. Evans, "Adaptive Threshold Modulation for Error Diffusion Halftoning", IEEE Trans. on Image Processing, 10(1), pp. 104-116, 2001. (Pubitemid 32136885)
    • (2001) IEEE Transactions on Image Processing , vol.10 , Issue.1 , pp. 104-116
    • Damera-Venkata, N.1    Evans, B.L.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.