메뉴 건너뛰기




Volumn 7, Issue 3, 2011, Pages

Protecting the content integrity of digital imagery with fidelity preservation

Author keywords

Security; Verification

Indexed keywords

AUTHENTICATION BITS; AUTHENTICATION CODES; CONTENT INTEGRITY; DETECTION ABILITY; DIGITAL IMAGE; DIGITAL IMAGERY; FRAGILE WATERMARKING; IMAGE CONTENT; IMAGE FIDELITY; NOVEL ALGORITHM; SECURITY; TAMPERPROOF; WATERMARKED IMAGES; WATERMARKING TECHNIQUES; WEIGHTED-SUM;

EID: 80053006913     PISSN: 15516857     EISSN: 15516865     Source Type: Journal    
DOI: 10.1145/2000486.2000489     Document Type: Article
Times cited : (48)

References (31)
  • 1
    • 33750303836 scopus 로고    scopus 로고
    • An efficient image authentication method based on hamming code
    • CHAN, C. S. AND CHANG, C. C. 2007. An efficient image authentication method based on hamming code. Patt. Recogn. 40, 2, 681-690.
    • (2007) Patt. Recogn. , vol.40 , Issue.2 , pp. 681-690
    • Chan, C.S.1    Chang, C.C.2
  • 2
    • 32644434350 scopus 로고    scopus 로고
    • A watermarking-based image ownership and tampering authentication scheme
    • CHANG, C. C., HU, Y. S., AND LU, T. C. 2006. A watermarking-based image ownership and tampering authentication scheme. Patt. Recogn. Lett. 27, 5, 439-446.
    • (2006) Patt. Recogn. Lett. , vol.27 , Issue.5 , pp. 439-446
    • Chang, C.C.1    Hu, Y.S.2    Lu, T.C.3
  • 3
    • 35349002199 scopus 로고    scopus 로고
    • A fragile watermarking scheme for digital images authentication using pixel-difference
    • CHANG, C. C., LIN, P. Y., AND CHUANG, J. C. 2007. A fragile watermarking scheme for digital images authentication using pixel-difference. Imaging Sci. J. 55, 3, 140-147.
    • (2007) Imaging Sci. J. , vol.55 , Issue.3 , pp. 140-147
    • Chang, C.C.1    Lin, P.Y.2    Chuang, J.C.3
  • 4
    • 0024753284 scopus 로고
    • A binary single-key-lock system for access control
    • CHANG, C. K. AND JIANG, T. M. 1989. A binary single-key-lock system for access control. IEEE Trans. Computers 38, 10, 1462-1466.
    • (1989) IEEE Trans. Computers , vol.38 , Issue.10 , pp. 1462-1466
    • Chang, C.K.1    Jiang, T.M.2
  • 5
    • 67651102858 scopus 로고    scopus 로고
    • A secure and improved self-embedding algorithm to combat digital document forgery
    • CHEDDAD, A., CONDELL, J., CURRAN, K., AND KEVITT, P. M. 2009. A secure and improved self-embedding algorithm to combat digital document forgery. Signal Process. 89, 12, 2324-2332.
    • (2009) Signal Process. , vol.89 , Issue.12 , pp. 2324-2332
    • Cheddad, A.1    Condell, J.2    Curran, K.3    Kevitt, P.M.4
  • 6
    • 33644995185 scopus 로고    scopus 로고
    • Analysis and design of secure watermark-based authentication systems
    • CHUHONG, F., KUNDUR, D., AND KWONG, R. H. 2006. Analysis and design of secure watermark-based authentication systems. IEEE Trans. Inf. Forensics Security 1, 1, 43-55.
    • (2006) IEEE Trans. Inf. Forensics Security , vol.1 , Issue.1 , pp. 43-55
    • Chuhong, F.1    Kundur, D.2    Kwong, R.H.3
  • 9
    • 49549116187 scopus 로고    scopus 로고
    • Fragile watermarking based on encoding of the zeroes of the z-transform
    • HO, T. S., ZHU, X., SHEN, J., AND MARZILIANO, P. 2008. Fragile watermarking based on encoding of the zeroes of the z-transform. IEEE Trans. Inf. Forensic Security. 3, 3, 567-569.
    • (2008) IEEE Trans. Inf. Forensic Security. , vol.3 , Issue.3 , pp. 567-569
    • Ho, T.S.1    Zhu, X.2    Shen, J.3    Marziliano, P.4
  • 10
    • 0033872149 scopus 로고    scopus 로고
    • Counterfeiting attacks on oblivious block-wise independent invisible watermarking schemes
    • DOI 10.1109/83.826780
    • HOLLIMAN, M. AND MEMON, N. 2000. Counterfeiting attacks on oblivious block-wise independent invisible watermarking schemes. IEEE Trans. Image Process. 9, 3, 432-441. (Pubitemid 30572357)
    • (2000) IEEE Transactions on Image Processing , vol.9 , Issue.3 , pp. 432-441
    • Holliman, M.1    Memon, N.2
  • 12
    • 0032648596 scopus 로고    scopus 로고
    • Digital watermarking for telltale tamper proofing and authentication
    • KUNDUR, D. AND HATZINAKOS, D. 1999. Digital watermarking for telltale tamper proofing and authentication. IEEE Proc. 87, 7, 1167-1180.
    • (1999) IEEE Proc. , vol.87 , Issue.7 , pp. 1167-1180
    • Kundur, D.1    Hatzinakos, D.2
  • 13
    • 80053038221 scopus 로고    scopus 로고
    • Copyright © photo T. Lankerd
    • LANKERD, T. BRANDY ROSE. Copyright © photo T. Lankerd, http://www.petitcolas.net/fabien/watermarking/image-database.
    • Lankerd, T.1    Rose, B.2
  • 14
    • 4444342040 scopus 로고    scopus 로고
    • Secret image sharing with steganography and authentication
    • Lin, C. C. and Tsai, W. H. 2004. Secret image sharing with steganography and authentication. J. Syst. Softw. 73, 3, 405-414.
    • (2004) J. Syst. Softw. , vol.73 , Issue.3 , pp. 405-414
    • Lin, C.C.1    Tsai, W.H.2
  • 15
    • 0037818310 scopus 로고    scopus 로고
    • Structural digital signature for image authentication: An incidental distortion resistant scheme
    • LU, C. S. AND LIAO, H. Y. 2003. Structural digital signature for image authentication: An incidental distortion resistant scheme. IEEE Trans. Multimedia 5, 2, 161-173.
    • (2003) IEEE Trans. Multimedia , vol.5 , Issue.2 , pp. 161-173
    • Lu, C.S.1    Liao, H.Y.2
  • 16
    • 0032165133 scopus 로고    scopus 로고
    • Objective picture quality scale (PQS) for image coding
    • MAKOTO, M. 1998. Objective picture quality scale (PQS) for image coding. IEEE Trans. Comm. 46, 9, 1215-1226.
    • (1998) IEEE Trans. Comm. , vol.46 , Issue.9 , pp. 1215-1226
    • Makoto, M.1
  • 17
    • 48149104075 scopus 로고    scopus 로고
    • Tampering with a watermarking-based image authentication scheme
    • PHAN, R. C. W. 2008. Tampering with a watermarking-based image authentication scheme. Patt. Recogn. 41, 11, 3493-3496.
    • (2008) Patt. Recogn. , vol.41 , Issue.11 , pp. 3493-3496
    • Phan, R.C.W.1
  • 18
    • 0036627368 scopus 로고    scopus 로고
    • A survey of watermarking algorithms for image authentication
    • REY, C. AND DUGELAY, J. L. 2002. A survey of watermarking algorithms for image authentication. EURASIP J. Appl. Signal Process. 6, 613-621.
    • (2002) EURASIP J. Appl. Signal Process. , vol.6 , pp. 613-621
    • Rey, C.1    Dugelay, J.L.2
  • 20
    • 8344236008 scopus 로고    scopus 로고
    • Fragile image watermarking using a gradient image for improved localization and security
    • SUTHAHARAN, S. 2004. Fragile image watermarking using a gradient image for improved localization and security. Patt. Recogn. Lett. 25, 16, 1893-1903.
    • (2004) Patt. Recogn. Lett. , vol.25 , Issue.16 , pp. 1893-1903
    • Suthaharan, S.1
  • 21
    • 0142057129 scopus 로고    scopus 로고
    • A simple and high-hiding capacity method for hiding digit-by-digit data in images based on modulus function
    • THIEN, C. C. AND LIN, J. C. 2003. A simple and high-hiding capacity method for hiding digit-by-digit data in images based on modulus function. Patt. Recogn.36, 12, 2875-2881.
    • (2003) Patt. Recogn. , vol.36 , Issue.12 , pp. 2875-2881
    • Thien, C.C.1    Lin, J.C.2
  • 22
    • 0142029533 scopus 로고    scopus 로고
    • Using set partitioning in hierarchical trees to authenticate digital images
    • TSAI, P., HU, Y. C, AND CHANG, C. C. 2003. Using set partitioning in hierarchical trees to authenticate digital images. Signal Process. Image Comm. 18, 9, 813-822.
    • (2003) Signal Process. Image Comm. , vol.18 , Issue.9 , pp. 813-822
    • Tsai, P.1    Hu, Y.C.2    Chang, C.C.3
  • 23
    • 14844354093 scopus 로고    scopus 로고
    • Steganography of capacity required using modulo operator for embedding secret image
    • WANG, S. J. 2005. Steganography of capacity required using modulo operator for embedding secret image. Appl. Math. Comput. 164, 1, 99-116.
    • (2005) Appl. Math. Comput. , vol.164 , Issue.1 , pp. 99-116
    • Wang, S.J.1
  • 24
    • 1942436689 scopus 로고    scopus 로고
    • Image quality assessment: From error visibility to structural similarity
    • WANG, Z., BOVIK, A. C., SHEIKH, H. R., AND SIMONCELLI, E. P. 2004. Image quality assessment: From error visibility to structural similarity. IEEE Trans. Image Process.13, 4, 600-612.
    • (2004) IEEE Trans. Image Process. , vol.13 , Issue.4 , pp. 600-612
    • Wang, Z.1    Bovik, A.C.2    Sheikh, H.R.3    Simoncelli, E.P.4
  • 25
    • 0035473831 scopus 로고    scopus 로고
    • Secret and public key image watermarking schemes for image authentication and ownership verification
    • DOI 10.1109/83.951543, PII S1057714901082094
    • WONG, P. W AND MEMON, N. 2001. Secret and public key image watermarking schemes for image authentication and ownership verification. IEEE Trans. Image Process. 10, 10, 1593-1601. (Pubitemid 32981831)
    • (2001) IEEE Transactions on Image Processing , vol.10 , Issue.10 , pp. 1593-1601
    • Wong, P.W.1    Memon, N.2
  • 26
    • 0021386722 scopus 로고
    • Access control with single-key-lock
    • WU, M. AND HWANG, T 1984. Access control with single-key-lock. IEEE Trans. Softw. Eng.10, 2, 185-191.
    • (1984) IEEE Trans. Softw. Eng. , vol.10 , Issue.2 , pp. 185-191
    • Wu, M.1    Hwang, T.2
  • 28
    • 33947611402 scopus 로고    scopus 로고
    • Pattern-based data hiding for binary image authentication by connectivity-preserving
    • DOI 10.1109/TMM.2006.887990
    • YANG, H. AND KOT, A. C. 2007. Pattern-based data hiding for binary image authentication by connectivity-preserving. IEEE Trans. Multimedia 9, 3, 475-486. (Pubitemid 46479781)
    • (2007) IEEE Transactions on Multimedia , vol.9 , Issue.3 , pp. 475-486
    • Yang, H.1    Kot, A.C.2
  • 29
    • 36248978560 scopus 로고    scopus 로고
    • A double layered "Plus-minus one" data embedding scheme
    • DOI 10.1109/LSP.2007.903255
    • ZHANG, W, ZHANG, X. AND WANG, S. 2007. A double layered "plus-minus one" data embedding scheme. IEEE Signal Process. Lett. 14, 11, 848-851. (Pubitemid 350130777)
    • (2007) IEEE Signal Processing Letters , vol.14 , Issue.11 , pp. 848-851
    • Zhang, W.1    Zhang, X.2    Wang, S.3
  • 30
    • 34548765996 scopus 로고    scopus 로고
    • Statistical fragile watermarking capable of locating individual tampered pixels
    • DOI 10.1109/LSP.2007.896436
    • ZHANG, X. AND WANG, S. 2007. Statistical fragile watermarking capable of locating individual tampered pixels. IEEE Signal Process. Lett. 14, 10, 727-730. (Pubitemid 47434095)
    • (2007) IEEE Signal Processing Letters , vol.14 , Issue.10 , pp. 727-730
    • Zhang, X.1    Wang, S.2
  • 31
    • 57749202706 scopus 로고    scopus 로고
    • Fragile watermarking scheme using hierarchical mechanism
    • ZHANG, X. AND WANG, S. 2009. Fragile watermarking scheme using hierarchical mechanism. Signal Process. 89, 4, 675-679.
    • (2009) Signal Process. , vol.89 , Issue.4 , pp. 675-679
    • Zhang, X.1    Wang, S.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.