메뉴 건너뛰기




Volumn 84, Issue 9, 2011, Pages 1462-1470

A secure fragile watermarking scheme based on chaos-and-hamming code

Author keywords

Authentication; Burst bits; Chaotic map; Fragile watermarking; Hamming code; Logistic map; VQ attack

Indexed keywords

BURST BITS; CHAOTIC MAP; FRAGILE WATERMARKING; HAMMING CODE; LOGISTIC MAP; VQ ATTACKS;

EID: 79960457002     PISSN: 01641212     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.jss.2011.02.029     Document Type: Conference Paper
Times cited : (78)

References (24)
  • 1
    • 0036611838 scopus 로고    scopus 로고
    • Hierarchical watermarking for secure image authentication with localization
    • June
    • M.U. Celik, G. Sharmar, and A.M. Tekalp Hierarchical watermarking for secure image authentication with localization IEEE Transactions on Image Processing 11 June (6) 2002 585 594
    • (2002) IEEE Transactions on Image Processing , vol.11 , Issue.6 , pp. 585-594
    • Celik, M.U.1    Sharmar, G.2    Tekalp, A.M.3
  • 2
    • 33750303836 scopus 로고    scopus 로고
    • An efficient image authentication method based on Hamming code
    • February
    • C.S. Chan, and C.C. Chang An efficient image authentication method based on Hamming code Pattern Recognition 40 February (2) 2007 681 690
    • (2007) Pattern Recognition , vol.40 , Issue.2 , pp. 681-690
    • Chan, C.S.1    Chang, C.C.2
  • 4
    • 1842528982 scopus 로고    scopus 로고
    • A chaos-based robust wavelet-domain watermarking algorithm
    • Z. Dawei, C. Guanrong, and L. Wenbo A chaos-based robust wavelet-domain watermarking algorithm Chaos, Solitons and Fractals 22 October 2004 47 54
    • (2004) Chaos, Solitons and Fractals , vol.22 , pp. 47-54
    • Dawei, Z.1    Guanrong, C.2    Wenbo, L.3
  • 6
    • 0036030626 scopus 로고    scopus 로고
    • Security of fragile authentication watermarks with localization
    • DOI 10.1117/12.465330
    • J. Fridrich Security of fragile authentication watermarks with localization Proceedings of SPIE Conference on Security and Watermarking of Multimedia Contents, vol. 4675 San Jose, California, April 2002 2002 691 700 (Pubitemid 35229742)
    • (2002) Proceedings of SPIE - The International Society for Optical Engineering , vol.4675 , pp. 691-700
    • Fridrich, J.1
  • 8
    • 84943817322 scopus 로고
    • Error detecting and error correcting codes
    • April
    • R.W. Hamming Error detecting and error correcting codes Bell System Technical Journal 26 April (2) 1950 147 160
    • (1950) Bell System Technical Journal , vol.26 , Issue.2 , pp. 147-160
    • Hamming, R.W.1
  • 9
    • 77449085413 scopus 로고    scopus 로고
    • Probability-based tampering detection scheme for digital images
    • C.S. Hsu, and S.F. Tu Probability-based tampering detection scheme for digital images Optics Communications 283 May 2010 May 1737 1743
    • (2010) Optics Communications , vol.283 , Issue.MAY , pp. 1737-1743
    • Hsu, C.S.1    Tu, S.F.2
  • 11
    • 0035248504 scopus 로고    scopus 로고
    • A robust image authentication method distinguishing JPEG compression from malicious manipulation
    • February
    • C.Y. Lin, and S.F. Chang A robust image authentication method distinguishing JPEG compression from malicious manipulation IEEE Transactions on Circuits and Systems for Video Technology 11 February (2) 2001 153 168
    • (2001) IEEE Transactions on Circuits and Systems for Video Technology , vol.11 , Issue.2 , pp. 153-168
    • Lin, C.Y.1    Chang, S.F.2
  • 12
    • 25144448272 scopus 로고    scopus 로고
    • A hierarchical digital watermarking method for image tamper detection and recovery
    • DOI 10.1016/j.patcog.2005.02.007, PII S0031320305000890
    • P.L. Lin, C.K. Hsieh, and P.W. Huang A hierarchical digital watermarking method for image tamper detection and recovery Pattern Recognition 38 December (12) 2005 2519 2529 (Pubitemid 41336720)
    • (2005) Pattern Recognition , vol.38 , Issue.12 , pp. 2519-2529
    • Lin, P.L.1    Hsieh, C.-K.2    Huang, P.-W.3
  • 14
    • 33847280382 scopus 로고    scopus 로고
    • An image fragile watermark scheme based on chaotic image pattern and pixel-pairs
    • February
    • S.H. Liu, H.X. Yao, W. Gao, and Y.L. Liu An image fragile watermark scheme based on chaotic image pattern and pixel-pairs Applied Mathematics and Computation 185 February (2) 2007 869 882
    • (2007) Applied Mathematics and Computation , vol.185 , Issue.2 , pp. 869-882
    • Liu, S.H.1    Yao, H.X.2    Gao, W.3    Liu, Y.L.4
  • 15
    • 33750491245 scopus 로고    scopus 로고
    • Robust digital image watermarking based on subsampling
    • DOI 10.1016/j.amc.2006.02.012, PII S0096300306001688
    • W. Lu, H. Lu, and F.L. Chung Robust digital image watermarking based on subsampling Applied Mathematics and Computation 181 October (2) 2006 886 893 (Pubitemid 44646566)
    • (2006) Applied Mathematics and Computation , vol.181 , Issue.2 , pp. 886-893
    • Lu, W.1    Lu, H.2    Chung, F.-L.3
  • 16
    • 27644475510 scopus 로고    scopus 로고
    • Generation and detection of watermarks derived from chaotic functions
    • DOI 10.1117/12.605983, 07, Opto-Ireland 2005: Imaging and Vision
    • A. Mooney, and J.G. Keating Generation and detection of watermarks derived from chaotic functions Proceedings of Opto-Ireland 2005: Imaging and Vision, vol. 5823 Dublin, June 2005 2005 58 69 (Pubitemid 41565733)
    • (2005) Proceedings of SPIE - The International Society for Optical Engineering , vol.5823 , pp. 58-69
    • Mooney, A.1    Keating, J.G.2
  • 17
    • 35248861265 scopus 로고    scopus 로고
    • A comparative study of chaotic and white noise signals in digital watermarking
    • DOI 10.1016/j.chaos.2006.05.073, PII S0960077906005340
    • A. Mooney, J.G. Keating, and I. Pitas A comparative study of chaotic and white noise signals in digital watermarking Chaos, Solitons and Fractals 35 March (5) 2008 913 921 (Pubitemid 47562749)
    • (2008) Chaos, Solitons and Fractals , vol.35 , Issue.5 , pp. 913-921
    • Mooney, A.1    Keating, J.G.2    Pitas, I.3
  • 18
    • 0042823356 scopus 로고    scopus 로고
    • Wavelet packets-based digital watermarking for image verification and authentication
    • October
    • A.H. Paquet, R.K. Ward, and I. Pitas Wavelet packets-based digital watermarking for image verification and authentication Signal Processing l83 October (10) 2003 2117 2132
    • (2003) Signal Processing , vol.83 L , Issue.10 , pp. 2117-2132
    • Paquet, A.H.1    Ward, R.K.2    Pitas, I.3
  • 19
    • 38349119511 scopus 로고    scopus 로고
    • Color image authentication based on spatiotemporal chaos and SVD
    • May
    • Z. Peng, and W. Liu Color image authentication based on spatiotemporal chaos and SVD Chaos, Solitons and Fractals 36 May (4) 2008 946 952
    • (2008) Chaos, Solitons and Fractals , vol.36 , Issue.4 , pp. 946-952
    • Peng, Z.1    Liu, W.2
  • 21
    • 0037513449 scopus 로고    scopus 로고
    • A feature-based robust digital image watermarking scheme
    • April
    • C.W. Tang, and H.M. Hang A feature-based robust digital image watermarking scheme IEEE Transactions on Signal Processing 51 April (4) 2003 950 958
    • (2003) IEEE Transactions on Signal Processing , vol.51 , Issue.4 , pp. 950-958
    • Tang, C.W.1    Hang, H.M.2
  • 22
    • 0035369792 scopus 로고    scopus 로고
    • Attack modelling: Towards a second generation watermarking benchmark
    • DOI 10.1016/S0165-1684(01)00039-1, PII S0165168401000391
    • S. Voloshynovskiy, S. Pereira, V. Iquise, and T. Pun Attack modeling: toward a second generation watermarking benchmark Signal Processing 81 June (6) 2001 1177 1214 (Pubitemid 32509289)
    • (2001) Signal Processing , vol.81 , Issue.6 , pp. 1177-1214
    • Voloshynovskiy, S.1    Pereira, S.2    Iquise, V.3    Pun, T.4
  • 23
    • 0033682895 scopus 로고    scopus 로고
    • Secret and public key authentication watermarking schemes that resist vector quantization attack
    • San Jose, California, USA, January 2000
    • P. Wong, and N. Memon Secret and public key authentication watermarking schemes that resist vector quantization attack Proceedings of SPIE on Security and Watermarking of Multimedia Contents, vol. 3971 San Jose, California, USA, January 2000 2000 417 427
    • (2000) Proceedings of SPIE on Security and Watermarking of Multimedia Contents, Vol. 3971 , pp. 417-427
    • Wong, P.1    Memon, N.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.