메뉴 건너뛰기




Volumn 11, Issue 10, 2011, Pages 9717-9731

Authenticity preservation with histogram-based reversible data hiding and quadtree concepts

Author keywords

Capacity; Histogram; Imperceptibility; Quadtree; Reversible data hiding; Side information

Indexed keywords

ALGORITHM; ARTICLE; BIOMETRY; COMPUTER SECURITY; COMPUTER SIMULATION; HUMAN; IMAGE PROCESSING; INFORMATION PROCESSING; METHODOLOGY;

EID: 80054990869     PISSN: 14248220     EISSN: None     Source Type: Journal    
DOI: 10.3390/s111009717     Document Type: Article
Times cited : (45)

References (13)
  • 1
    • 77955495427 scopus 로고    scopus 로고
    • Cryptanalysis and security improvements of 'two-factor user authentication in wireless sensor networks'
    • Khan, M.K.; Alghathbar, K. Cryptanalysis and security improvements of 'two-factor user authentication in wireless sensor networks'. Sensors 2010, 10, 2450-2459.
    • (2010) Sensors , vol.10 , pp. 2450-2459
    • Khan, M.K.1    Alghathbar, K.2
  • 2
    • 77953508241 scopus 로고    scopus 로고
    • Intelligent sensors security
    • Bialas, A. Intelligent sensors security. Sensors 2010, 10, 822-859.
    • (2010) Sensors , vol.10 , pp. 822-859
    • Bialas, A.1
  • 3
    • 77952499383 scopus 로고    scopus 로고
    • Secure many-to-one communications in wireless sensor networks
    • Viejo, A.; Domingo-Ferrer, J.; Sebé, F.; Castellà-Roca, J. Secure many-to-one communications in wireless sensor networks. Sensors 2009, 9, 5324-5338.
    • (2009) Sensors , vol.9 , pp. 5324-5338
    • Viejo, A.1    Domingo-Ferrer, J.2    Sebé, F.3    Castellà-Roca, J.4
  • 4
    • 79957702363 scopus 로고    scopus 로고
    • A secured authentication protocol for wireless sensor networks using elliptic curves cryptography
    • Yeh, H.L.; Chen, T.H.; Liu, P.C.; Kim, T.H.; Wei, H.W. A secured authentication protocol for wireless sensor networks using elliptic curves cryptography. Sensors 2011, 11, 4767-4779.
    • (2011) Sensors , vol.11 , pp. 4767-4779
    • Yeh, H.L.1    Chen, T.H.2    Liu, P.C.3    Kim, T.H.4    Wei, H.W.5
  • 5
    • 76949084765 scopus 로고    scopus 로고
    • Metadata-based image watermarking for copyright protection
    • Huang, H.C.; Fang, W.C. Metadata-based image watermarking for copyright protection. Simul. Model. Pract. Theory 2010, 18, 436-445.
    • (2010) Simul. Model. Pract. Theory , vol.18 , pp. 436-445
    • Huang, H.C.1    Fang, W.C.2
  • 9
    • 3843102623 scopus 로고    scopus 로고
    • Reversible watermark using the difference expansion of a generalized integer transform
    • Alattar, A.M. Reversible watermark using the difference expansion of a generalized integer transform. IEEE Trans. Image Process. 2004, 13, 1147-1156.
    • (2004) IEEE Trans. Image Process , vol.13 , pp. 1147-1156
    • Alattar, A.M.1
  • 10
  • 11
    • 78650557610 scopus 로고    scopus 로고
    • A new histogram modification based reversible data hiding algorithm considering the human visual system
    • Jung, S.W.; Ha, L.T.; Ko, S.J. A new histogram modification based reversible data hiding algorithm considering the human visual system. IEEE Signal Process. Lett. 2011, 18, 95-98.
    • (2011) IEEE Signal Process. Lett , vol.18 , pp. 95-98
    • Jung, S.W.1    Ha, L.T.2    Ko, S.J.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.