메뉴 건너뛰기




Volumn 22, Issue 5, 2011, Pages 440-449

An adaptive image authentication scheme for vector quantization compressed image

Author keywords

Image authentication; Image compression; Index table; Random seed; Random values; Tamper detection; Vector quantization; Watermark

Indexed keywords

IMAGE AUTHENTICATION; INDEX TABLE; RANDOM SEEDS; RANDOM VALUES; TAMPER DETECTION; WATERMARK;

EID: 79957706020     PISSN: 10473203     EISSN: 10959076     Source Type: Journal    
DOI: 10.1016/j.jvcir.2011.03.011     Document Type: Article
Times cited : (57)

References (26)
  • 2
    • 0032206554 scopus 로고    scopus 로고
    • An effective codebook search algorithm for vector quantization
    • C.C. Chang, and Y.C. Hu An effective codebook search algorithm for vector quantization IEEE Transactions on Consumer Electronics 44 4 1998 1201 1208
    • (1998) IEEE Transactions on Consumer Electronics , vol.44 , Issue.4 , pp. 1201-1208
    • Chang, C.C.1    Hu, Y.C.2
  • 3
    • 0348225868 scopus 로고    scopus 로고
    • An effective codebook search algorithm for vector quantization
    • Y.C. Hu, and C.C. Chang An effective codebook search algorithm for vector quantization Imaging Science Journal 51 4 2003 221 234
    • (2003) Imaging Science Journal , vol.51 , Issue.4 , pp. 221-234
    • Hu, Y.C.1    Chang, C.C.2
  • 4
    • 39749177817 scopus 로고    scopus 로고
    • Fast VQ codebook search algorithm for grayscale image coding
    • Y.C. Hu, B.H. Su, and C.C. Tsoug Fast VQ codebook search algorithm for grayscale image coding Image and Vision Computing 26 5 2008 657 666
    • (2008) Image and Vision Computing , vol.26 , Issue.5 , pp. 657-666
    • Hu, Y.C.1    Su, B.H.2    Tsoug, C.C.3
  • 5
    • 58149508179 scopus 로고    scopus 로고
    • Fast VQ codebook generation method using codeword stability check and finite state concept
    • P.Y. Tsai, Y.C. Hu, and H.L. Yeh Fast VQ codebook generation method using codeword stability check and finite state concept Fundamenta Informaticae 87 3-4 2008 447 463
    • (2008) Fundamenta Informaticae , vol.87 , Issue.34 , pp. 447-463
    • Tsai, P.Y.1    Hu, Y.C.2    Yeh, H.L.3
  • 6
    • 78650747940 scopus 로고    scopus 로고
    • Efficient grayscale image compression technique based on VQ
    • Y.C. Hu, J.C. Chuang, C.C. Lo, and C.Y. Lee Efficient grayscale image compression technique based on VQ Opto-Electronics Review 19 1 2011 104 113
    • (2011) Opto-Electronics Review , vol.19 , Issue.1 , pp. 104-113
    • Hu, Y.C.1    Chuang, J.C.2    Lo, C.C.3    Lee, C.Y.4
  • 7
    • 0017930809 scopus 로고
    • Method for obtaining digital signatures and public-key cryptosystems
    • DOI 10.1145/359340.359342
    • R.L. Riverst, A. Shamir, and L. Adleman A method for obtaining digital signatures and public-key cryptosystems ACM Truncation on Communications 21 2 1978 120 126 (Pubitemid 8591219)
    • (1978) Communications of the ACM , vol.21 , Issue.2 , pp. 120-126
    • Rivest, R.L.1    Shamir, A.2    Adleman, L.3
  • 8
    • 0002500694 scopus 로고    scopus 로고
    • Image authentication techniques for surveillance applications
    • PII S0018921901084298
    • F. Bartolini, A. Tefas, M. Bami, and I. Pitas Pitas, Image authentication techniques for surveillance applications Proceedings of the IEEE 89 10 2001 1403 1418 (Pubitemid 33766629)
    • (2001) Proceedings of the IEEE , vol.89 , Issue.10 , pp. 1403-1418
    • Bartolini, F.1    Tefas, A.2    Barni, M.3    Pitas, I.4
  • 9
    • 0034140535 scopus 로고    scopus 로고
    • Fault resilient and compression tolerant digital signature for image authentication
    • D.C. Lou, and J.L. Liu Fault resilient and compression tolerant digital signature for image authentication IEEE Transactions on Consumer Electronics 46 1 2000 31 39
    • (2000) IEEE Transactions on Consumer Electronics , vol.46 , Issue.1 , pp. 31-39
    • Lou, D.C.1    Liu, J.L.2
  • 11
    • 27844494781 scopus 로고    scopus 로고
    • A novel image authentication scheme based on quadtree segmentation
    • P.Y. Tsai, Y.C. Hu, and C.C. Chang A novel image authentication scheme based on quadtree segmentation Imaging Science Journal 53 3 2005 149 162
    • (2005) Imaging Science Journal , vol.53 , Issue.3 , pp. 149-162
    • Tsai, P.Y.1    Hu, Y.C.2    Chang, C.C.3
  • 12
    • 33750303836 scopus 로고    scopus 로고
    • An efficient image authentication method based on Hamming code
    • C.S. Chan, and C.C. Chang An efficient image authentication method based on Hamming code Pattern Recognition 40 2007 681 691
    • (2007) Pattern Recognition , vol.40 , pp. 681-691
    • Chan, C.S.1    Chang, C.C.2
  • 13
    • 0035248504 scopus 로고    scopus 로고
    • A robust image authentication method distinguish JPEG compression from malicious manipulation
    • C.Y. Lin, and S.F. Chang A robust image authentication method distinguish JPEG compression from malicious manipulation IEEE Transactions on Circuits and Systems of Video Technology 11 2 2001 153 168
    • (2001) IEEE Transactions on Circuits and Systems of Video Technology , vol.11 , Issue.2 , pp. 153-168
    • Lin, C.Y.1    Chang, S.F.2
  • 14
    • 0035473830 scopus 로고    scopus 로고
    • Multipurpose watermarking for image authentication and protection
    • C.S. Lu, and H.Y.M. Laio Multipurpose watermarking for image authentication and protection IEEE Transactions on Image Processing 10 10 2001 435 439
    • (2001) IEEE Transactions on Image Processing , vol.10 , Issue.10 , pp. 435-439
    • Lu, C.S.1    Laio, H.Y.M.2
  • 15
    • 0035473831 scopus 로고    scopus 로고
    • Secret and public key image watermarking schemes for image authentication and ownership verification
    • DOI 10.1109/83.951543, PII S1057714901082094
    • P.W. Wong, and N. Memon Secret and public key image watermarking schemes for image authentication and ownership verification IEEE Transactions on Image Processing 10 10 2001 1593 1601 (Pubitemid 32981831)
    • (2001) IEEE Transactions on Image Processing , vol.10 , Issue.10 , pp. 1593-1601
    • Wong, P.W.1    Memon, N.2
  • 16
    • 33748119112 scopus 로고    scopus 로고
    • Dual protection of JPEG images based on informed embedding and two-stage watermark extraction techniques
    • W.N. Lie, G.S. Lin, and S.L. Chen Dual protection of JPEG images based on informed embedding and two-stage watermark extraction techniques IEEE Transactions on Information Forensics and Security 1 3 2006 330 341
    • (2006) IEEE Transactions on Information Forensics and Security , vol.1 , Issue.3 , pp. 330-341
    • Lie, W.N.1    Lin, G.S.2    Chen, S.L.3
  • 17
    • 32644434350 scopus 로고    scopus 로고
    • A watermarking-based image ownership and tampering authentication scheme
    • C.C. Chang, Y.S. Hu, and T.C. Lu A watermarking-based image ownership and tampering authentication scheme Pattern Recognition Letters 27 5 2006 439 446
    • (2006) Pattern Recognition Letters , vol.27 , Issue.5 , pp. 439-446
    • Chang, C.C.1    Hu, Y.S.2    Lu, T.C.3
  • 18
    • 40549093361 scopus 로고    scopus 로고
    • Fragility and robustness of binary-phase-only-filter-based fragile/ semifragile digital image watermarking
    • DOI 10.1109/TIM.2007.911585
    • S. Jun, and M.S. Alam Fragility and robustness of binary-phase-only- filter-based fragile/semifragile digital image watermarking IEEE Transactions on Instrumentation and Measurement 57 3 2008 595 606 (Pubitemid 351359254)
    • (2008) IEEE Transactions on Instrumentation and Measurement , vol.57 , Issue.3 , pp. 595-606
    • Sang, J.1    Alam, M.S.2
  • 19
    • 48149100935 scopus 로고    scopus 로고
    • Dual watermark for image tamper detection and recovery
    • T.Y. Lee, and S.D. Lin Dual watermark for image tamper detection and recovery Pattern Recognition 41 11 2008 3497 3506
    • (2008) Pattern Recognition , vol.41 , Issue.11 , pp. 3497-3506
    • Lee, T.Y.1    Lin, S.D.2
  • 20
    • 48149104075 scopus 로고    scopus 로고
    • Tampering with a watermarking-based image authentication
    • R.C.W. Phan Tampering with a watermarking-based image authentication Pattern Recognition 41 11 2008 2493 3496
    • (2008) Pattern Recognition , vol.41 , Issue.11 , pp. 2493-3496
    • Phan, R.C.W.1
  • 21
    • 56349129392 scopus 로고    scopus 로고
    • A fuzzy c-means clustering-based fragile watermarking scheme for image authentication
    • W.C. Chen, and M.S. Wang A fuzzy c-means clustering-based fragile watermarking scheme for image authentication Expert Systems with Applications 36 2 Part 1 2009 1300 1307
    • (2009) Expert Systems with Applications , vol.36 , Issue.2 PART 1 , pp. 1300-1307
    • Chen, W.C.1    Wang, M.S.2
  • 22
    • 77955417038 scopus 로고    scopus 로고
    • A novel DCT domain CRT-based watermarking scheme for image authentication surviving JPEG compression
    • J.C. Patra, J.E. Phua, and C. Bornand A novel DCT domain CRT-based watermarking scheme for image authentication surviving JPEG compression Digital Signal Processing 20 6 2010 1597 1611
    • (2010) Digital Signal Processing , vol.20 , Issue.6 , pp. 1597-1611
    • Patra, J.C.1    Phua, J.E.2    Bornand, C.3
  • 23
    • 79551680643 scopus 로고    scopus 로고
    • A quantization-based semi-fragile watermarking scheme for image content authentication
    • X. Qi, and X. Xin A quantization-based semi-fragile watermarking scheme for image content authentication Journal of Visual Communication and Image Representation 22 2 2011 187 200
    • (2011) Journal of Visual Communication and Image Representation , vol.22 , Issue.2 , pp. 187-200
    • Qi, X.1    Xin, X.2
  • 24
    • 77449085413 scopus 로고    scopus 로고
    • Probability-based tampering detection scheme for digital images
    • C.S. Hsu, and S.F. Tu Probability-based tampering detection scheme for digital images Optical Communications 283 9 2010 1737 1743
    • (2010) Optical Communications , vol.283 , Issue.9 , pp. 1737-1743
    • Hsu, C.S.1    Tu, S.F.2
  • 25
    • 69249216337 scopus 로고    scopus 로고
    • Recover the tampered image based on VQ indexing
    • C.W. Yang, and J.J. Shen Recover the tampered image based on VQ indexing Signal Processing 90 1 2010 331 343
    • (2010) Signal Processing , vol.90 , Issue.1 , pp. 331-343
    • Yang, C.W.1    Shen, J.J.2
  • 26
    • 75249099043 scopus 로고    scopus 로고
    • A secure and robust hash-based scheme for image authentication
    • F. Ahmed, and NM.Y. Siyal A secure and robust hash-based scheme for image authentication Signal Processing 90 5 2010 1456 1470
    • (2010) Signal Processing , vol.90 , Issue.5 , pp. 1456-1470
    • Ahmed, F.1    Siyal, N.Y.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.